Modelling Self-Led Trust Value Management in Grid and Service Oriented Infrastructures

Author(s):  
Antony Brown ◽  
Paul Sant ◽  
Nik Bessis ◽  
Tim French ◽  
Carsten Maple

Current developments in grid and service oriented technologies involve fluid and dynamic, ad hoc based interactions between delegates, which in turn, serves to challenge conventional centralised structured trust and security assurance approaches. Delegates ranging from individuals to large-scale VO (Virtual Organisations) require the establishment of trust across all parties as a prerequisite for trusted and meaningful e-collaboration. In this paper, a notable obstacle, namely how such delegates (modelled as nodes) operating within complex collaborative environment spaces can best evaluate in context to optimally and dynamically select the most trustworthy ad hoc based resource/service for e-consumption. A number of aggregated service case scenarios are herein employed in order to consider the manner in which virtual consumers and provider ad hoc based communities converge. In this paper, the authors take the view that the use of graph-theoretic modelling naturally leads to a self-led trust management decision based approach in which delegates are continuously informed of relevant up-to-date trust levels. This will lead to an increased confidence level, which trustful service delegation can occur. The key notion is of a self-led trust model that is suited to an inherently low latency, decentralised trust security paradigm.

Author(s):  
Antony Brown ◽  
Paul Sant ◽  
Nik Bessis ◽  
Tim French ◽  
Carsten Maple

Current developments in grid and service oriented technologies involve fluid and dynamic, ad hoc based interactions between delegates, which in turn, serves to challenge conventional centralised structured trust and security assurance approaches. Delegates ranging from individuals to large-scale VO (Virtual Organisations) require the establishment of trust across all parties as a prerequisite for trusted and meaningful e-collaboration. In this paper, a notable obstacle, namely how such delegates (modelled as nodes) operating within complex collaborative environment spaces can best evaluate in context to optimally and dynamically select the most trustworthy ad hoc based resource/service for e-consumption. A number of aggregated service case scenarios are herein employed in order to consider the manner in which virtual consumers and provider ad hoc based communities converge. In this paper, the authors take the view that the use of graph-theoretic modelling naturally leads to a self-led trust management decision based approach in which delegates are continuously informed of relevant up-to-date trust levels. This will lead to an increased confidence level, which trustful service delegation can occur. The key notion is of a self-led trust model that is suited to an inherently low latency, decentralised trust security paradigm.


Author(s):  
J. Kaur ◽  
S. Kaur

Mobile Ad Hoc Networks (MANETs) are comprised of an arrangement of self-sorting mobile hosts furnished with wireless interaction devices gathered in groups without the need of any settled framework as well as centralized organization to maintain a system over radio connections. Every mobile node can react as a host and also, the router freely utilizes the wireless medium inside the correspondence range to deal with the interaction between huge quantities of individual mobile nodes by framing a correspondence system and trading the information among them without using any described group of the base station. A trust-based model in MANET estimates and sets up trust relationship among objectives. Trust-based routing is utilized to keep away data from different attackers like a wormhole, DOS, black-hole, selfish attack and so forth. Trust can be executed in different steps like reputation, subjective rationale and from the supposition of the neighboring node. A trust estimation approach not just watches the behavior of neighbor nodes, additionally it screens the transmission of the information packet in the identification of the route for exact estimation of trust value. A survey is carried out to find some of the limitations behind the existing works which has been done by the researchers to implement various approaches thus to build the trust management framework. Through the survey, it is observed that existing works focused only on the authenticated transmission of the message, how it transmits packets to the destination node securely using a trust-based scheme. And also, it is observed that the routing approach only focused on the key management issues. Certain limitation observed in the implemented approaches of existing work loses the reliability of framework. Thus, to withstand these issues it is necessary to establish a reliable security framework that protects the information exchanged among the users in a network while detecting various misbehaving attacks among the users. Confidentiality, as well as the integrity of information, can be secured by combining context-aware access control with trust management. The performance parameters should be evaluated with the previous works packet delivery ratio, packet drop, detection accuracy, number of false positives, and overhead.


2018 ◽  
Vol 11 (6) ◽  
pp. 908-921 ◽  
Author(s):  
Yating Wang ◽  
Ing-Ray Chen ◽  
Jin-Hee Cho ◽  
Ananthram Swami ◽  
Yen-Cheng Lu ◽  
...  

2021 ◽  
Vol 11 (03) ◽  
pp. 13-23
Author(s):  
K. Divya ◽  
B. Srinivasan

The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.


2020 ◽  
Vol 1 (3) ◽  
pp. 1-5
Author(s):  
Sonam Soni

This paper concerns about the various implemented work has been studied and analyzed to form a new survey on trust model to VANET. In this paper it is observed that there are lot of new techniques are possible to form a new trust model in VANET to provide better security with trust concern over the entire environment of trust management in VANET. This work concerns of entire trust calculation work which has been done yet over it. Here summarizing the various trust models, various security requirements, issues over it.


2016 ◽  
Vol 2016 ◽  
pp. 1-15 ◽  
Author(s):  
Zhiquan Liu ◽  
Jianfeng Ma ◽  
Zhongyuan Jiang ◽  
Hui Zhu ◽  
Yinbin Miao

With the advances in automobile industry and wireless communication technology, Vehicular Ad hoc Networks (VANETs) have attracted the attention of a large number of researchers. Trust management plays an important role in VANETs. However, it is still at the preliminary stage and the existing trust models cannot entirely conform to the characteristics of VANETs. This work proposes a novel Lightweight Self-Organized Trust (LSOT) model which contains trust certificate-based and recommendation-based trust evaluations. Both the supernodes and trusted third parties are not needed in our model. In addition, we comprehensively consider three factor weights to ease the collusion attack in trust certificate-based trust evaluation, and we utilize the testing interaction method to build and maintain the trust network and propose a maximum local trust (MLT) algorithm to identify trustworthy recommenders in recommendation-based trust evaluation. Furthermore, a fully distributed VANET scenario is deployed based on the famous Advogato dataset and a series of simulations and analysis are conducted. The results illustrate that our LSOT model significantly outperforms the excellent experience-based trust (EBT) and Lightweight Cross-domain Trust (LCT) models in terms of evaluation performance and robustness against the collusion attack.


2012 ◽  
Vol 8 (4) ◽  
pp. 725190 ◽  
Author(s):  
Miguel S. Familiar ◽  
José F. Martínez ◽  
Lourdes López

In the twenty-first century, the impact of wireless and ubiquitous technologies is changing the way people perceive and interact with the physical world. These communication paradigms promise to change and redefine, in a reasonably short period of time, the most common way of our everyday living. The continuous advances in the field of Wireless Sensor Networks and their direct application in Smart Spaces are clear examples of it. However, in order for this kind of new generation infrastructures to have a large-scale dissemination, there are still some open issues to tackle. In this way, this paper presents nSOM, a service-oriented framework based on sensor network design that provides internetworking services with the Internet cloud. This lightweight middleware architecture implements an agent-based virtual sensor service approach which is a compact semantic knowledge management scheme based on a dynamic composition model.


Mobile Ad hoc Network is an assortment of free hubs that can convey one another. These hubs are self-composed hub, which doesn't have any fixed framework like base station, radio wires, and so forth. The hubs with in its range can have an immediate correspondence if not it utilizes a moderate hub for transmitting the information. Each node will act as both host and router. The nodes can join or leave the network anytime and makes the network topology. Network topology is dynamic in nature. Because of the dynamic behavior the detection of trust value is difficult for intermediary node. Trust should be managed in the network ie., the network has different behaviors like malicious, selfishness, unhealthiness, etc., due to these behaviors the trust of an intermediary node is difficult to calculate. Right now safe routing is performed by the improvement of convention which yields the minimization of trust inclination and boosts the application execution. This study compares different trust management framework and compare the trust level based on the metrics and outlines the issues and future ideas.


2021 ◽  
Vol 9 (1) ◽  
pp. 1225-1229
Author(s):  
Dr. Senthilkumar A, Dr. Lekashri S, Abhay Chaturvedi, Dr. R. Manikandan

Trust is an essential parameter among sensor nodes to provide secured and successful communication. Many trust management schemes have been proposed earlier for large scale Wireless Sensor Network (WSN) however not cooperates well in terms of low dependability, memory overheads, large communication etc, therefore a system called Data Traffic Trust Scheme (DTTS) for clustered WSN is proposed here. Here the trust nodes are identified through the data traffic sampling rate. The trust rate is identified through the number of sent and receive data packets and the malicious packets are diagnosed through the un-matching packet rate. The simulation results are evaluated to show the efficiency for the proposed scheme.


Sign in / Sign up

Export Citation Format

Share Document