Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things
Abstract
:1. Introduction
2. Background
2.1. IoUT Network Model
2.2. Trust Modelling
- Direct Trust: This formation of trust is based on direct interaction between two entities. The computed trust value will be a result of the observation and experience based on past interactions. Mathematically, it can be seen as:
- Indirect Trust: This formation of trust relies on others’ beliefs about an entity. A trust value will be computed based on a third-party opinion on a particular node. This can be carried out through a recommendation from either a mutual one-hop node neighbour or a multi-hop node recommendation using the trust’s transitivity property. Mathematically, this can be represented as:
2.3. Recommendation Attacks
- Bad-mouthing attack: A malicious node undermines the reputation of another node by providing false negative feedback. This form of attack is particularly challenging to detect when the attacker has a history of providing unbiased, accurate recommendations.
- Ballot-stuffing attack: In this attack, a malicious node artificially boosts another node’s trust level by giving fake positive feedback, setting the stage for more complex and collaborative attacks.
- Selfish node behaviour: This involves a node refusing to participate in the network’s trust establishment by not responding to recommendation requests, thereby withholding necessary collaboration with peers.
2.4. Challenges of Dishonest Recommenders
- Dishonesty in recommendation is not always characterized by overtly negative behaviour or a generally low level of trustworthiness. Instead, a recommender, or node in this context, may exhibit seemingly normal behaviour in most interactions but engage in deceptive practices by deliberately providing false recommendations about others. This subtlety makes detecting dishonesty challenging because the overall behaviour of the node might not immediately arouse suspicion. For instance, the graph in Figure 2 illustrates the average trust score towards a dishonest recommender who continues to perform attacks as described in Section 2.3, following the model presented in [16]. In cases of trust manipulation, such as bad-mouthing and ballot stuffing, the trust towards the recommender might naively overlook the misbehaviour, resulting in a high trust score over time for the dishonest recommender. On the other hand, a selfish recommender can be detected if the frequency of its recommendation requests and responses significantly deviates from typical communication patterns. If the trust evaluation of the recommender takes into account the frequency of communication, unusual behaviour can be identified. Specifically, a selfish recommender who often refuses to provide recommendations will exhibit a lower frequency of outgoing recommendations compared to the norm. This deviation can be quantified and monitored over time, leading to a decrease in the trust score of the selfish recommender as their non-cooperative behaviour becomes evident.
- In the field of recommender systems, two predominant methods for detecting dishonest recommenders are the Majority Rule-based [17] and the Deviation from Personal Experience-based approaches [15]. While simple and effective in certain contexts, the Majority Rule-based method falls short in scenarios with collaborative attacks, where a dishonest majority can skew the results. It also risks false positives by mislabelling honest recommenders with unique perspectives. On the other hand, the Deviation from Personal Experience-based method, which compares recommendations against individual user experiences following a defined threshold to detect recommendations that deviate from the personal experience and thus is able to isolate unfair negatives and unfair positive recommendations, offers a more personalized assessment. However, it struggles in situations with limited personal experience and is susceptible to the decay of trust over time, especially when lacking direct interactions with certain nodes. Both methods, therefore, while useful in their respective contexts, exhibit distinct limitations that can impact their effectiveness in accurately identifying dishonest recommenders. These two methods have been defined in the literature under what is called endogenous discounting [18]. The inherent fallacy of endogenous discounting highlights the confirmation bias introduced when claims deviating from prior expectations are ignored.
3. Related Work
4. Proposed Model
4.1. Belief Assumptions
- Let the change between the current recommendation on j provided by Recommender node (k) known as and let the previous observed trust computed by i towards j (direct trust) known as , where represents the proportion of time elapsed between constructing direct trust and receiving recommendations. The smaller the absolute proportion of change , the easier it is for i to accept the recommendation. Thus, .
- The longer the time t that has passed since the last session of interaction between i and j, the more open i will be in accepting k’s recommendation. This is because of the trust decay; the longer the time goes by, the smaller the proportion of historical trust based on the last observation left. Thus, .
- The greater the trustworthiness of k, represented by the value of , the more likely one is to trust the recommendation received from k. While this assumption alone is not necessarily correct, as explained in Figure 2, more sophisticated attackers might exploit this by intermittently or even consistently behaving correctly to mask their malicious actions. Nevertheless, a lower trust rating of recommenders can still indicate a potentially bad recommendation. Thus, .
- The opinion computed by k is more valuable if it is recent, as newer opinions are generally more relevant than older ones. The freshness is defined as the duration between the present time and the moment when was formed. Thus, .
- In dynamic environments, it is often observed that nodes increasingly focus on others exhibiting similar behaviours over time [31]. Trust, drawn from social constructs, is interpreted through the lens of interaction consistency between two entities [13]. A relationship’s strength is presumed to be stronger with more consistent interactions over time. Furthermore, the relative duration or depth of a relationship compared to other peers indicates the level of similarities between entities. This is particularly evident in collaborative networks like IoUT, where all nodes are initially assumed to collaborate equally to achieve the needed coverage and maintain connectivity [32].Let represent the degree of similarity between i and k; the more similarity, the more likely it is for i to believe the opinion provided by k, and therefore, .
5. Recommendation Evaluation Process
5.1. Initial Filtering Process
Algorithm 1 Recommendation Evaluation Process |
Input: List of Received Recommendations Require: (Trust deviation threshold) Require: (violation threshold)
|
5.2. Definition of Similarity
5.2.1. Confidence Level as a Measure of Similarity
5.2.2. Familiarity as a Measure of Similarity
5.2.3. Similarity Computation
5.3. Belief Process
Algorithm 2 Belief Process |
Input: List of Received Recommendations Output: Weight of each Recommenders
|
5.4. Penalty Process
6. Conceptual Analysis
6.1. Property 1: Rejecting Recommendations from Malicious Recommenders and Accepting Recommendations from Honest Recommenders
- Claim 1: The proposed recommendation model can reject recommendations from malicious nodes.
- Rationale: CFFTM employs several conditions to process collected recommendations. However, we demonstrate that node i might inadvertently accept recommendations from malicious node k. In the CFFTM model, each recommendation is represented as , accompanied by two additional values, and . Here, denotes the communication status between the recommender node and the trustee node, while signifies the link status when the trust score is obtained. These values are gathered by the recommender and included in the packet sent to the trustor, who will use them to assess the recommendation.
- Claim 2: The proposed recommendation model can accept recommendations from honest nodes.
- Rationale: Both CFFTM and the proposed model succeed in accepting recommendations from honest recommenders if the nodes have a valid and current personal opinion on j. However, if is outdated and new information becomes available, CFFTM might misclassify honest recommendations as dishonest. Suppose and all neighbours send recommendations for j in the range of 0.8 to 0.9. Since the deviation test is the primary filter and if , then all honest nodes will be deemed dishonest, and their recommendations will be rejected.
6.2. Property 2: Punishment for Malicious Recommendations and Avoiding Punishment for Accurate Recommendations
- Claim 3: The proposed recommendation model correctly punishes dishonest recommenders and avoids unnecessary punishment for accurate recommendations.
- Rationale: In the CFFTM model, the is used to filter recommendations, identifying either dishonest recommenders or those struggling with communication. The model then identifies dishonest recommendations based on a threshold, such that those with good link quality yet providing recommendations that deviate from personal trust will be treated as malicious and punished accordingly. This approach can lead to inaccurate penalties since the recommenders provide the and may forge these values to avoid punishment. We contend that this decision should solely rely on the information obtained by i about k. Therefore, the proposed model employs a threshold of a number of violations based on the initial filter as well as evidence of lower belief compared to others to penalise a node. This punishment is reflected in the trust score towards k, addressing the issue illustrated in Figure 2, where a dishonest recommender could continue being perceived as trustworthy despite compromising the accuracy of the trust model through the propagation of dishonest recommendations. Revisiting the previous examples of discrepancies in the recommendations, we observe that an honest recommender might be flagged as dishonest despite having an accurate and good . This misclassification would result in an honest node being unfairly punished as a malicious recommender.
7. Experiments and Performance Evaluation
7.1. Effectiveness Evaluation of the Proposed Model
7.2. Attack Resistance
7.3. Comparison with Similar Works
- Accuracy rate: the number of malicious nodes detected as a percentage of the total number of malicious nodes.
- False detection rate: the number of misidentified normal nodes as a percentage of the total number of normal nodes.
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
i | Trustor node |
j | Trustee node |
k | Recommender node |
Trust score obtained by trustor i, toward trustee j | |
Trust score obtained by trustor i, toward recommender k | |
Trust score obtained by recommender k, toward trustee j | |
IoUT | Internet of Underwater Things |
MATMU | Mobility-Aware Trust Model for IoUT |
MAD | Median Absolute Deviation |
LOF | Local Outlier Factor |
AquaSim-NG | Aqua simulation new generation |
NS-3 | network simulators -3 |
References
- Tyagi, H.; Kumar, R.; Pandey, S.K. A detailed study on trust management techniques for security and privacy in IoT: Challenges, trends, and research directions. High-Confid. Comput. 2023, 3, 100127. [Google Scholar] [CrossRef]
- Abdul-Rahman, A.; Hailes, S. A distributed trust model. In Proceedings of the 1997 workshop on New Security Paradigms, Langdale, Cumbria, 23–26 September 1997; pp. 48–60. [Google Scholar]
- Yan, Z.; Zhang, P.; Vasilakos, A.V. A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 2014, 42, 120–134. [Google Scholar] [CrossRef]
- Fang, W.; Zhang, W.; Chen, W.; Pan, T.; Ni, Y.; Yang, Y. Trust-based attack and defense in wireless sensor networks: A survey. Wirel. Commun. Mob. Comput. 2020, 2020, 2643546. [Google Scholar] [CrossRef]
- Mohsan, S.A.H.; Mazinani, A.; Othman, N.Q.H.; Amjad, H. Towards the internet of underwater things: A comprehensive survey. Earth Sci. Inform. 2022, 15, 735–764. [Google Scholar] [CrossRef]
- Yisa, A.G.; Dargahi, T.; Belguith, S.; Hammoudeh, M. Security challenges of internet of underwater things: A systematic literature review. Trans. Emerg. Telecommun. Technol. 2021, 32, e4203. [Google Scholar] [CrossRef]
- Almutairi, A.; He, Y.; Furnell, S. A Multi-Level Trust Framework for the Internet of Underwater Things. In Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Virtual, 27–29 July 2022; pp. 370–375. [Google Scholar]
- Domingo, M.C. An overview of the internet of underwater things. J. Netw. Comput. Appl. 2012, 35, 1879–1890. [Google Scholar] [CrossRef]
- General Dynamics. Bluefin-21 Unmanned Underwater Vehicle (UUV). General Dynamics. 2023. Available online: https://gdmissionsystems.com/products/underwater-vehicles/bluefin-21-autonomous-underwater-vehicle (accessed on 20 March 2024).
- Valeport. MIDAS WLR Water Level Recorder; Teledyne Valeport Ltd: Totnes, UK, 2023; Available online: https://www.valeport.co.uk/products/midas-wlr-water-level-recorder/ (accessed on 20 March 2023).
- Lurton, X. An Introduction to Underwater Acoustics: Principles and Applications; Springer: Berlin/Heidelberg, Germany, 2002; Volume 2. [Google Scholar]
- Alam, S.; Zardari, S.; Noor, S.; Ahmed, S.; Mouratidis, H. Trust management in social internet of things (SIoT): A survey. IEEE Access 2022, 10, 108924–108954. [Google Scholar] [CrossRef]
- Marche, C.; Nitti, M. Trust-related attacks and their detection: A trust management model for the social IoT. IEEE Trans. Netw. Serv. Manag. 2020, 18, 3297–3308. [Google Scholar] [CrossRef]
- Tan, S.; Li, X.; Dong, Q. Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw. 2015, 30, 84–98. [Google Scholar] [CrossRef]
- Khedim, F.; Labraoui, N.; Lehsaini, M. Dishonest recommendation attacks in wireless sensor networks: A survey. In Proceedings of the 2015 12th International Symposium on Programming and Systems (ISPS), Algiers, Algeria, 28–30 April 2015; pp. 1–10. [Google Scholar]
- Jiang, J.; Hua, S.; Han, G.; Li, A.; Lin, C. Controversy-adjudication-based trust management mechanism in the internet of underwater things. IEEE Internet Things J. 2022, 10, 2603–2614. [Google Scholar] [CrossRef]
- Iltaf, N.; Ghafoor, A.; Zia, U. A mechanism for detecting dishonest recommendation in indirect trust computation. EURASIP J. Wirel. Commun. Netw. 2013, 2013, 189. [Google Scholar] [CrossRef]
- Muller, T.; Liu, Y.; Zhang, J. The fallacy of endogenous discounting of trust recommendations. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, Istanbul, Turkey, 4–8 May 2015; pp. 563–572. [Google Scholar]
- Hua, S.; Jiang, J.; Han, G. A lightweight Trust Management mechanism based on Conflict Adjudication in Underwater Acoustic Sensor Networks. In Proceedings of the 2021 Computing, Communications and IoT Applications (ComComAp), Shenzhen, China, 26–28 November 2021; pp. 258–262. [Google Scholar]
- Michiardi, P.; Molva, R. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the Advanced Communications and Multimedia Security: IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, Portorož, Slovenia, 26–27 September 2002; Springer: Boston, MA, USA, 2002; pp. 107–121. [Google Scholar]
- Buchegger, S.; Le Boudec, J.Y. Performance analysis of the CONFIDANT protocol. In Proceedings of the 3rd ACM International Symposium on Mobile ad Hoc Networking & Computing, Lausanne, Switzerland, 9–11 June 2002; pp. 226–236. [Google Scholar]
- Srinivasan, A.; Teitelbaum, J.; Wu, J. DRBTS: Distributed reputation-based beacon trust system. In Proceedings of the 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, Indianapolis, IN, USA, 29 September–1 October 2006; pp. 277–283. [Google Scholar]
- Zouridaki, C.; Mark, B.L.; Hejmo, M.; Thomas, R.K. E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks. Ad Hoc Netw. 2009, 7, 1156–1168. [Google Scholar] [CrossRef]
- Liang, W.; Long, J.; Weng, T.H.; Chen, X.; Li, K.C.; Zomaya, A.Y. TBRS: A trust based recommendation scheme for vehicular CPS network. Future Gener. Comput. Syst. 2019, 92, 383–398. [Google Scholar] [CrossRef]
- Mahmood, A.; Sheng, Q.Z.; Zhang, W.E.; Wang, Y.; Sagar, S. Toward a distributed trust management system for misbehavior detection in the internet of vehicles. ACM Trans. Cyber-Phys. Syst. 2023, 7, 1–25. [Google Scholar] [CrossRef]
- Huang, X.; Yu, R.; Kang, J.; Zhang, Y. Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 2017, 5, 25408–25420. [Google Scholar] [CrossRef]
- Shabut, A.M.; Dahal, K.P.; Bista, S.K.; Awan, I.U. Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans. Mob. Comput. 2014, 14, 2101–2115. [Google Scholar] [CrossRef]
- Adewuyi, A.A.; Cheng, H.; Shi, Q.; Cao, J.; MacDermott, Á.; Wang, X. CTRUST: A dynamic trust model for collaborative applications in the Internet of Things. IEEE Internet Things J. 2019, 6, 5432–5445. [Google Scholar] [CrossRef]
- Du, J.; Han, G.; Lin, C.; Martínez-García, M. LTrust: An adaptive trust model based on LSTM for underwater acoustic sensor networks. IEEE Trans. Wirel. Commun. 2022, 21, 7314–7328. [Google Scholar] [CrossRef]
- Zhang, M.; Feng, R.; Zhang, H.; Su, Y. A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks. Future Gener. Comput. Syst. 2023, 145, 466–477. [Google Scholar] [CrossRef]
- Cho, J.H.; Swami, A.; Chen, R. A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutorials 2010, 13, 562–583. [Google Scholar] [CrossRef]
- Mohsan, S.A.H.; Li, Y.; Sadiq, M.; Liang, J.; Khan, M.A. Recent advances, future trends, applications and challenges of internet of underwater things (iout): A comprehensive review. J. Mar. Sci. Eng. 2023, 11, 124. [Google Scholar] [CrossRef]
- Almutairi, A.; Carpent, X.; Furnell, S. Towards a Mobility-Aware Trust Model for the Internet of Underwater Things. In Proceedings of the IFIP International Conference on ICT Systems Security and Privacy Protection, Edinburgh, UK, 12–14 June 2024; Springer: Cham, Switzerland, 2024; pp. 1–15. [Google Scholar]
- Wang, H.; Bah, M.J.; Hammad, M. Progress in outlier detection techniques: A survey. IEEE Access 2019, 7, 107964–108000. [Google Scholar] [CrossRef]
- Domingues, R.; Filippone, M.; Michiardi, P.; Zouaoui, J. A comparative evaluation of outlier detection algorithms: Experiments and analyses. Pattern Recognit. 2018, 74, 406–421. [Google Scholar] [CrossRef]
- Commerce, B.E.; Jøsang, A.; Ismail, R. The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia, 17–19 June 2002; Volume 84. [Google Scholar]
- Jøsang, A. A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 2001, 9, 279–311. [Google Scholar] [CrossRef]
- Li, R.; Li, J.; Liu, P.; Kato, J. A novel hybrid trust management framework for MANETs. In Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops, Montreal, QC, Canada, 22–26 June 2009; pp. 251–256. [Google Scholar]
- Zouridaki, C.; Mark, B.L.; Hejmo, M.; Thomas, R.K. A quantitative trust establishment framework for reliable data packet delivery in MANETs. In Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, USA, 7 November 2005; pp. 1–10. [Google Scholar]
- Shabut, A.M.; Kaiser, M.S.; Dahal, K.P.; Chen, W. A multidimensional trust evaluation model for MANETs. J. Netw. Comput. Appl. 2018, 123, 32–41. [Google Scholar] [CrossRef]
- Martin, R.; Rajasekaran, S.; Peng, Z. Aqua-Sim Next generation: An NS-3 based underwater sensor network simulator. In Proceedings of the 12th International Conference on Underwater Networks & Systems, Halifax, NS, Canada, 6–8 November 2017; pp. 1–8. [Google Scholar]
- Campanile, L.; Gribaudo, M.; Iacono, M.; Marulli, F.; Mastroianni, M. Computer network simulation with ns-3: A systematic literature review. Electronics 2020, 9, 272. [Google Scholar] [CrossRef]
- Morozs, N.; Gorma, W.; Henson, B.T.; Shen, L.; Mitchell, P.D.; Zakharov, Y.V. Channel modeling for underwater acoustic network simulation. IEEE Access 2020, 8, 136151–136175. [Google Scholar] [CrossRef]
- Boyer, T.P.; García, H.E.; Locarnini, R.A.; Zweng, M.M.; Mishonov, A.V.; Reagan, J.R.; Weathers, K.A.; Baranova, O.K.; Paver, C.R.; Seidov, D. World Ocean Atlas 2018, Volume 3: Dissolved Oxygen, Apparent Oxygen Utilization, and Oxygen Saturation; NOAA National Centers for Environmental Information: Silver Spring, MD, USA, 2018. Available online: https://repository.library.noaa.gov/view/noaa/49137 (accessed on 20 March 2024).
- Yang, Z.; Li, L.; Gu, F.; Ling, X.; Hajiee, M. TADR-EAODV: A trust-aware dynamic routing algorithm based on extended AODV protocol for secure communications in wireless sensor networks. Internet Things 2022, 20, 100627. [Google Scholar] [CrossRef]
Simulation Variables | Node Variables | ||
Simulation Time | 1800 s | Number of Nodes | 20 |
Surface Wind | 8.5–27.2 knots | Initial Energy | (10,000–70,000) watt |
Propagation model | Range-based | Transmission Range | 100, 120 m |
Network Variables | Recommendation Variables | ||
Routing Protocol | Vector Forwarding | 0.1 | |
Data Rate | 1000 bps | 2 | |
Packet Size | 40 bytes | Attack % | 10–50% |
Carrier Frequency | 25 kHz | Recommendation request | each 60 s |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Almutairi, A.; Carpent, X.; Furnell, S. Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things. Future Internet 2024, 16, 346. https://doi.org/10.3390/fi16090346
Almutairi A, Carpent X, Furnell S. Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things. Future Internet. 2024; 16(9):346. https://doi.org/10.3390/fi16090346
Chicago/Turabian StyleAlmutairi, Abeer, Xavier Carpent, and Steven Furnell. 2024. "Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things" Future Internet 16, no. 9: 346. https://doi.org/10.3390/fi16090346
APA StyleAlmutairi, A., Carpent, X., & Furnell, S. (2024). Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things. Future Internet, 16(9), 346. https://doi.org/10.3390/fi16090346