A Dynamic Trust Management Mechanism in Distributed CRNs

Author(s):  
Zhenyue Long ◽  
Linbin Zhan ◽  
Guiteng Chen
Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6174 ◽  
Author(s):  
Kamran Ahmad Awan ◽  
Ikram Ud Din ◽  
Ahmad Almogren ◽  
Hisham Almajed

Internet of Things (IoT) provides a diverse platform to automate things where smart agriculture is one of the most promising concepts in the field of Internet of Agriculture Things (IoAT). Due to the requirements of more processing power for computations and predictions, the concept of Cloud-based smart agriculture is proposed for autonomic systems. This is where digital innovation and technology helps to improve the quality of life in the area of urbanization expansion. For the integration of cloud in smart agriculture, the system is shown to have security and privacy challenges, and most significantly, the identification of malicious and compromised nodes along with a secure transmission of information between sensors, cloud, and base station (BS). The identification of malicious and compromised node among soil sensors communicating with the BS is a notable challenge in the BS to cloud communications. The trust management mechanism is proposed as one of the solutions providing a lightweight approach to identify these nodes. In this article, we have proposed a novel trust management mechanism to identify malicious and compromised nodes by utilizing trust parameters. The trust mechanism is an event-driven process that computes trust based on the pre-defined time interval and utilizes the previous trust degree to develop an absolute trust degree. The system also maintains the trust degree of a BS and cloud service providers using distinct approaches. We have also performed extensive simulations to evaluate the performance of the proposed mechanism against several potential attacks. In addition, this research helps to create friendlier environments and efficient agricultural productions for the migration of people to the cities.


Mobile Grid is the inter-networking of heterogeneous physical as well as virtualdevices. Each device transfer and share the information with each other. Trust management plays a significant role in network based applications for information collection, data mining, qualified services with context-awareness, upgraded client protection and data security. It assists individuals with beating impression of vulnerability, threat and participates in client acknowledgment to utilization on grid services and applications. In this paper a unique trust management protocol is proposed for network based mobile grid application to manage misbehaving nodes whose status or performance may change dynamically. Trust plays an important role for handling the security in the community based system. Trust management provides facilitate to identify malfunctions and also make legitimate collaboration and enhance the user privacy and information security.


2015 ◽  
Vol 12 (6) ◽  
Author(s):  
Karl Krukow ◽  
Andrew Twigg

Recently, Carbone, Nielsen and Sassone introduced the trust-structure framework; a semantic model for trust-management in global-scale distributed systems. The framework is based on the notion of trust structures; a set of ``trust-levels'' ordered by two distinct partial orderings. In the model, a unique global trust-state is defined as the least fixed-point of a collection of local policies assigning trust-levels to the entities of the system. However, the framework is a purely denotational model: it gives precise meaning to the global trust-state of a system, but without specifying a way to compute this abstract mathematical object.<br /> <br /> This paper complements q the denotational model of trust structures with operational techniques. It is shown how the least fixed-point can be computed using a simple, totally-asynchronous distributed algorithm. Two efficient protocols for approximating the least fixed-point are provided, enabling sound reasoning about the global trust-state without computing the exact fixed-point. Finally, dynamic algorithms are presented for safe reuse of information between computations, in face of dynamic trust-policy updates.


Author(s):  
Asma Lahbib ◽  
Khalifa Toumi ◽  
Anis Laouiti ◽  
Alexandre Laube ◽  
Steven Martin

Sign in / Sign up

Export Citation Format

Share Document