A trust management model based on NSGA-II in mobile grid system

Author(s):  
Grantej Vinod Otari ◽  
Vijay Ram Ghorpade

Mobile Grid network connects large number of mobile devices like smartphones, tablets, PDAs, wireless digital medical equipment’s etc for the purpose of sharing their resources and performing the task collaboratively and cooperatively. The mobile nodes participating in the mobile grid are autonomous and open in nature making them more vulnerable to data and control attacks made by malicious or selfish nodes. Preventing these malicious or selfish nodes and identifying the trusted nodes to participate in the network is an NP-hard problem. To recognize trusted nodes in the mobile grid system a novel trust management model is proposed in this paper by applying an elitist multi objective optimization algorithm Non-dominated Sorting Genetic Algorithm-II (NSGA-II). The proposed trust management model assesses the trust index of each mobile node in the network using various evaluation factors or attributes and then obtains the non-dominated set of trusted nodes in each front. Comparative analysis of the proposed trust model shows that the proposed model can be a potential candidate for implementing trust management in mobile grid network.

Author(s):  
Bhalaji N

The autonomous mobile nodes framing an instantaneous network, utilizing the nearby available device that volunteer in establishing network is coined as the fly wire network. These adhoc type of network framed simultaneously are prone to various vulnerabilities, developing alterations in the information’s or hacking of information’s or the blocking of services. These security threats causing losses in the information transmitted, makes it necessary for the trust evaluation of the nodes to identify the selfish nodes. So the paper proposes the block chain trust management of nodes to avoid the vulnerabilities in the transmission path, enhancing the performance of the network. The performance of the proposed method is validated in the network simulator –II to ensure its capability in terms of the quality of service and the security (defense).


Symmetry ◽  
2019 ◽  
Vol 11 (9) ◽  
pp. 1118
Author(s):  
Manmeet Mahinderjit Singh ◽  
Lee Wern Shen ◽  
Mohammed Anbar

Location-based services (LBS) use real-time geo-data from a smartphone to provide information, entertainment or surveillance information. However, the reputations of LBS application have raised some privacy and security issues such as location tracked by third parties and creation of fake reviews and events through Sybil attack. Fake events on LBS such as congestion, accidents or police activity affect routes users and fake reviews caused nuisances and decreases trust towards this technology. The current trust model in LBS is single faceted and not personalized. The concept of both trust and distrust are essential criteria of any trust management model to measure the reliability of LBS applications. This paper explores the relationship between trust models and the distrust concept in LBS. By deriving a representation of the multi-faceted model and balance theory conceptualized in a MiniLBS prototype, trust in this technology is quantified. By adopting matrix factorization and probability algorithms on the survey results, the relationship between distrust and trust is further examined and tested. The result obtained from the experiment was nearly zero, the smallest one was 3.0253 × 10−95, and the largest value was only 4.967 × 10−43. The results show that distrust is not a negation of trust. Another crucial finding suggests that balance theory within distrust in the LBS trust model can enhance the trust management model in LBS and indirectly cater issues rise from fake event problem.


2015 ◽  
Vol 34 ◽  
pp. 693-704 ◽  
Author(s):  
Ugur Eray Tahta ◽  
Sevil Sen ◽  
Ahmet Burak Can

Author(s):  
Zhigang Yang ◽  
Ruyan Wang ◽  
Dapeng Wu ◽  
Boran Yang ◽  
Puning Zhang

Sign in / Sign up

Export Citation Format

Share Document