Reducing the Negative Effect of Malicious Nodes in Opportunistic Networks Using Reputation Based Trust Management

Author(s):  
Smritikona Barai ◽  
Nupur Boral ◽  
Parama Bhaumik
2019 ◽  
Vol 01 (01) ◽  
pp. 42-61
Author(s):  
Jennifer S. Raj ◽  
Alphina Stephy S

The development in the area of networking is Internet of Things (IoT). This will interrelated the object and things together. The realization of IoT subsystems will be subjected to numerous constraints that include cost, power, energy, and lifetime. However, most challenging requirement will be trust. It is widely recognized that the attacks from malicious parties can activate from Internet to the physical word. Hence, trust of IoT is of essential importance. Therefore, trust management is considered as a efficient solution to IoT related issues. Trust management has useful technology for providing security service and it has been used in many applications such as P2P, Grid, adhoc network and so on. Thus the trust based routing algorithm in Internet of Things is proposed for providing a potential security system. With this, the major focus on the problem of trust on the malicious nodes in any environment.


2013 ◽  
Vol 373-375 ◽  
pp. 1931-1934 ◽  
Author(s):  
Yi Min Zhou ◽  
La Yuan Li

The Wireless Sensor Network applications has widely been used over the last few years. WSN is a novel self-organization wireless network which is made up of randomly distributed sensor Nodes. Due to some resource constraints, the design of security in WSN encounters a great many of new challenges. It is vulnerable to attack, which is harmful for availability of WSN. In this paper we propose a trust-aware and location-based secure routing protocol which protects WSN against routing attacks, and also supports large-scale WSN deployments. The proposed protocol is extended from GPSR protocol, which imports security mechanism that depends on a distributed trust management system. The solution has been shown to efficiently detect and avoid malicious nodes.


2021 ◽  
Author(s):  
Elvira Noelly Bonilla Tamez

The need for having a mechanism to automatically interpret content available on the Web without a human intervention has lead to the development of a new vision for the next generation of the Web, known as the Semantic Web. This new paradigm advocates the use of ontologies to achieve a common language for communication among humans, computers, and programs. In this thesis, a novel Semantic Web-based solution called SCOW-Q (Semantic Capability Discovery With QoS) model, is proposed, which provides an architectural basis for representing trust and trust management in Opportunistic Networks. The model is validated by means of a Use Case Scenario using a well-defined Semantic Web Service framework.


2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Fangyu Gai ◽  
Jiexin Zhang ◽  
Peidong Zhu ◽  
Xinwen Jiang

The integration of social networking concepts with Internet of Vehicles (IoV) has led to the novel paradigm “Social Internet of Vehicles (SIoV),” which enables vehicles to establish social relationships autonomously to improve traffic conditions and service discovery. There is a growing requirement for effective trust management in the SIoV, considering the critical consequences of acting on misleading information spread by malicious nodes. However, most existing trust models are rater-based, where the reputation information of each node is stored in other nodes it has interacted with. This is not suitable for vehicular environment due to the ephemeral nature of the network. To fill this gap, we propose a Ratee-based Trust Management (RTM) system, where each node stores its own reputation information rated by others during past transactions, and a credible CA server is introduced to ensure the integrality and the undeniability of the trust information. RTM is built based on the concept of SIoV, so that the relationships established between nodes can be used to increase the accuracy of the trustworthiness. Experimental results demonstrate that our scheme achieves faster information propagation and higher transaction success rate than the rater-based method, and the time cost when calculating trustworthiness can meet the demand of vehicular networks.


Author(s):  
Müller Roberto Pereira Gonçalves ◽  
Edson dos Santos Moreira ◽  
Luciana Andréia Fondazzi Martimiano

2014 ◽  
Vol 8 (9) ◽  
pp. 1812-1827 ◽  
Author(s):  
Yue Wu ◽  
Yimeng Zhao ◽  
Michel Riguidel ◽  
Guanghao Wang ◽  
Ping Yi

Author(s):  
Silva Karkoulian ◽  
Wassim Mukaddam ◽  
Richard McCarthy ◽  
Leila Canaan Messarra

PurposeOrganizational downsizing, right sizing, layoffs, and restructuring that attempt to reduce labour cost and increase competitiveness, have generated considerable feelings of job insecurity among today's employees. Conversely, the rapidity of change in the Middle Eastern region, coupled with the unpredictability of economic conditions, the inevitable need to survive and the ever‐lasting craving for organizational success merge to aggravate the adverse effects of job insecurity. The purpose of this paper is to study the relationship between job insecurity and powerlessness, management trust, peer trust and job satisfaction within Lebanon.Design/methodology/approachEmployees working within medium‐sized organizations in Lebanon were surveyed to measure their perceptions of job insecurity, job satisfaction, powerlessness, and interpersonal trust. Statistical analyses were performed using Pearson correlation matrix and linear regression tests.FindingsThe study identified significant positive relationship between job insecurity and powerlessness, and negative relationships between job insecurity and management trust and job satisfaction. No significant relationship was found between job insecurity and peer trust.Research limitations/implicationsThe study adds to the existing job insecurity literature by empirically testing the relationship between job insecurity and powerlessness, peer trust, management trust and job satisfaction within Lebanese organizations. The researchers hope that this study will assist managers in understanding the importance of earning their subordinates' trust and its implications on job insecurity which could also negatively affect job satisfaction. Also, the issue of powerlessness should be seriously considered by management since it triggers the feeling of job insecurity.Originality/valueWestern organizational behavior literature has given the topic of job insecurity significant attention. However, no scholarly research has yet examined the topic of job insecurity within the Middle East. This paper sheds light on important results regarding job insecurity and its consequences. Powerlessness predicts and aggravates job insecurity, and is affected by the nature of the job; trust in management has a negative effect on job insecurity, while peer trust has no influence. Also, job satisfaction is influenced by the perceptions of job insecurity.


Sensors ◽  
2021 ◽  
Vol 21 (21) ◽  
pp. 7363
Author(s):  
Kamran Ahmad Awan ◽  
Ikram Ud Din ◽  
Ahmad Almogren ◽  
Byung-Seo Kim ◽  
Ayman Altameem

Vehicular Ad hoc Network (VANET) is a modern concept that enables network nodes to communicate and disseminate information. VANET is a heterogeneous network, due to which the VANET environment exposes to have various security and privacy challenges. In the future, the automobile industry will progress towards assembling electric vehicles containing energy storage batteries employing these resources to travel as an alternative to gasoline/petroleum. These vehicles may have the capability to share their energy resources upon the request of vehicles having limited energy resources. In this article, we have proposed a trust management-based secure energy sharing mechanism, named vTrust, which computes the trust degree of nodes to authenticate nodes. The proposed mechanism is a multi-leveled centralized approach utilizing both the infrastructure and vehicles to sustain a secure environment. The proposed vTrust can aggregate and propagate the degree of trust to enhance scalability. The node that requests to obtain the energy resources may have to maintain a specified level of trust threshold for earning resources. We have also evaluated the performance of the proposed mechanism against several existing approaches and determine that the proposed mechanism can efficiently manage a secure environment during resource sharing by maintaining average malicious nodes detection of 91.3% and average successful energy sharing rate of 89.5%, which is significantly higher in comparison to the existing approaches.


Sign in / Sign up

Export Citation Format

Share Document