Advertisement

Querying in Packs: Trustworthy Data Management in Ad Hoc Networks

  • Anand PatwardhanEmail author
  • Filip Perich
  • Anupam Joshi
  • Tim Finin
  • Yelena Yesha
Article

Abstract

We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing environments. Available resources include those in the fixed surrounding infrastructure as well as services offered by other nearby mobile devices. We take a holistic approach that considers data trust, security, and privacy and focus on the collaborative mechanisms providing a trustworthy data management platform in an ad hoc network. The framework is based on a pack formation mechanism that enables collaborative peer interactions using context information and landmarks. A pack provides a routing substrate allowing devices to find reliable information sources and coordinated pro-active and reactive mechanisms to detect and respond to malicious activity. Consequently, a pack forms a foundation for distributed trust management and data intensive interactions. We describe our data management framework with an emphasis on pack formation in mobile ad hoc networks and present preliminary results from simulation experiments.

Keywords

Trust reputation management mobile data management ad hoc networks collaborative querying. 

Notes

Acknowledgment

This research was supported by NSF awards IIS 0209001 and CNS 0203958.

References

  1. 1.
    M. Cherniak, E. Galvez, D. Brooks, M. Franklin, and S. Zdonik, Profile Driven Data Management, in 28th International Conference on Very Large Databases, August 2002Google Scholar
  2. 2.
    F. Perich, S. Avancha, D. Chakraborty, A. Joshi, and Y. Yesha, Profile driven data management for pervasive environments, in 13th International Conference on Database and Expert Systems Applications (DEXA 2002), Aix en Provence, France, September 2002Google Scholar
  3. 3.
    L. Kagal, T. Finin, and A. Joshi, A policy language for a pervasive computing environment, in IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003Google Scholar
  4. 4.
    F. Perich, MoGATU BDI Ontology, http://www.mogatu.umbc.edu/bdi/, 2004
  5. 5.
    F. Perich, A. Joshi, T. Finin, and Y. Yesha, On data management in pervasive computing environments, IEEE Transactions on Knowledge and Data Engineering 16(5): 621–634, 2004CrossRefGoogle Scholar
  6. 6.
    F. Perich, MoGATU: Data Management in Pervasive Computing Enviroments, http://www.mogatu.umbc.edu/, 2001–2005
  7. 7.
    N. Luhmann, '’Trust and Power”, 1st ed. John Wiley & Sons, Inc., 1979Google Scholar
  8. 8.
    S. Marsh, Formalising trust as a computational concept, 1994Google Scholar
  9. 9.
    R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, Propagation of trust and distrust, in WWW ’04: Proceedings of the 13th international conference on World Wide Web, ACM Press, New York, NY, USA, pp. 403–412, 2004Google Scholar
  10. 10.
    S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, The eigentrust algorithm for reputation management in p2p networks, in WWW ’03: Proceedings of the 12th international conference on World Wide Web, ACM Press, New York, NY, USA, pp. 640–651, 2003Google Scholar
  11. 11.
    S. Buchegger and J.-Y.L. Boudec, A robust reputation system for p2p and mobile ad-hoc networks, 2004Google Scholar
  12. 12.
    M. J. Franklin. Challenges in ubiquitous data management, in Informatics - 10 Years Back. 10 Years Ahead., Springer-Verlag, pp. 24–33, 2001Google Scholar
  13. 13.
    M. Cherniack, M. J. Franklin, and S. Zdonik. Expressing user profiles for data recharging, IEEE Personal Communications 8(4): 32–38, 2001 (see also IEEE Wireless Communications)CrossRefGoogle Scholar
  14. 14.
    g2dn: Gnutella2 developer’s network. http://www.gnutella2.com/
  15. 15.
  16. 16.
    I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, in Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications, ACM Press, pp. 149–160, 2001Google Scholar
  17. 17.
    J. B. Begole, J. C. Tang, R. B. Smith, and N. Yankelovich, Work rhythms: analyzing visualizations of awareness histories of distributed groups, in CSCW ’02: Proceedings of the 2002 ACM conference on Computer supported cooperative work, ACM Press, pp. 334–343, 2002Google Scholar
  18. 18.
    M. J. Covington, W. Long, S. Srinivasan, A. K. Dey, M. Ahamad, and G. D. Abowd, Securing context-aware applications using environment roles, in SACMAT ’01: Proceedings of the sixth ACM symposium on Access control models and technologies, ACM Press, pp. 10–20, 2001Google Scholar
  19. 19.
    T. Aura, Internet Draft: Cryptographically Generated Addresses (CGA). http://www.ietf.org/proceedings/04mar/I-D/draft-ietf-send-cga05.txt, February 2004
  20. 20.
    G. Montenegro and C. Castelluccia. Statistically Unique and Cryptographically Verifiable(SUCV) identifiers and addresses. http://www.citeseer.ist.psu.edu/montenegro02statistically.html, 2002
  21. 21.
    Dix A., Rodden T., Davies N., Trevor J., Friday A., and Palfreyman K.(2000). Exploiting space and location as a design framework for interactive mobile systems. ACM Transaction Computational-Human Interaction 7(3):285–321CrossRefGoogle Scholar
  22. 22.
    A. Roy, S. K. Das Bhaumik, A. Bhattacharya, K. Basu, D. J. Cook, and S. K. Das, Location aware resource management in smart homes, in Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, pp. 481–488, 2003Google Scholar
  23. 23.
    F. Perich, J. L. Undercoffer, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, In reputation we believe: query processing in mobile ad-hoc networks, in International Conference on Mobile and Ubiquitous Systems: Networking and Services, Boston, MA, August 2004Google Scholar
  24. 24.
    J. R. Douceur, The Sybil attack, in IPTPS, pp. 251–260, 2002Google Scholar
  25. 25.
    X. Zeng, R. Bagrodia, and M. Gerla. GloMoSim: A Library for Parallel Simulation of Large-Scale Wireless Networks, in Workshop on Parallel and Distributed Simulation, 1998Google Scholar
  26. 26.
    Web Ontology Language (OWL) http://www.w3.org/2004/OWL/, February 2005

Copyright information

© Springer Science + Business Media, Inc. 2006

Authors and Affiliations

  • Anand Patwardhan
    • 1
    Email author
  • Filip Perich
    • 1
  • Anupam Joshi
    • 1
  • Tim Finin
    • 1
  • Yelena Yesha
    • 1
  1. 1.Department of Computer Science and Electrical EngineeringUMBCBaltimoreUSA

Personalised recommendations