A Comparative Analysis of OSN and SIoT Trust Models for a trust model adapted to MOOCs platforms

Author(s):  
Khadija Elghomary ◽  
Driss Bouzidi ◽  
Najima Daoudi
Author(s):  
Barath Kumar R ◽  
Stalin Alex

The immovable nature of passing on packages through multi -bounce middle hubs is a critical problem in the versatile impromptu organizations (MANETs). The disseminated versatile hubs set up associations with structure the MANET, which may incorporate childish and getting into mischief hubs. Suggestion based trust the board is proposed in the creating as a system to evaluate through the acting up hubs while looking for a bundle conveyance course. Nonetheless, building a trust model that embraces suggestions by different hubs in the organization is a difficult issue because of the danger of deceptive proposals like reviling, voting form stuffing, and conspiracy. we examines the issues identified with assaults presented by getting rowdy hubs while proliferating suggestions in the current trust models. We propose a suggestion based trust model with a safeguard plot, which uses grouping method to progressively sift through assaults identified with exploitative proposals between certain time dependent on number of collaborations, similarity of data and closeness between the hubs. We evaluate the trust degree as two cases like direct and indirect trust values between neighboring nodes from source. To form a clustering routing network from similar trust values from S to D.The model is experimentally tried under a few portable and detached geographies in which hubs experience changes in their local prompting regular course changes. The observational investigation shows heartiness and exactness of the trust model in a dynamic MANET climate.


2021 ◽  
Vol 13 (4) ◽  
pp. 24-36
Author(s):  
Srinivasan Palanisamy ◽  
Sankar S. ◽  
Ramasubbareddy Somula ◽  
Ganesh Gopal Deverajan

Wireless sensor networks (WSN) deployed in open environments make nodes prone to various security attacks due to their resource constrained nature. The compromised nodes are used to mislead the sensed data and disrupt communication, which can affect the entire decision-making system based on the sensed data. It is also possible to drain the sensor nodes energy and reduce the battery life of the networks. Trust models are the preferred mechanism to secure WSN. In this paper, the authors present communication trust and energy aware (CTEA) routing protocol that make use of the proposed trust model to mitigate the effects of badmouth and energy drain attacks. They use Dempster theory to compute communication trust and also consider the energy metric, to establish the route for data transfer. The simulation result shows that the proposed trust model increases the packet delivery ratio, residual energy, and network lifetime by mitigating the nodes misbehaviour in presence of energy drain and bad mouth attacks.


IEEE Network ◽  
1997 ◽  
Vol 11 (3) ◽  
pp. 16-24 ◽  
Author(s):  
D.W. Chadwick ◽  
A.J. Young ◽  
N.K. Cicovic
Keyword(s):  

2017 ◽  
Vol 8 (7) ◽  
pp. 1011-1017
Author(s):  
Mr.Ashish Sharma ◽  
Dr.Sanjay Kumar

Cloud computing enables sharing of data over internet, hence the chances of security attacks also increases. So for the security of Data Sharing or Resources Allocation various Trust Models are implemented which provides security from various attacks. One of the efficient and improved Trust Model is implemented which increases the strength of Security in Cloud Computing [1]. Here in this paper various Trust Models their advantages and limitations are analyzed and com pare on the basis of various parameters. This paper deals with the analysis and survey of all the techniques implemented for Cloud Security so that on the basis of various issues a new and efficient Trust Model is implemented in Future.


2021 ◽  
Vol 11 (03) ◽  
pp. 13-23
Author(s):  
K. Divya ◽  
B. Srinivasan

The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.


2019 ◽  
Vol 15 (1) ◽  
pp. 155014771982582 ◽  
Author(s):  
Razi Iqbal ◽  
Talal Ashraf Butt ◽  
Muhammad Afzaal ◽  
Khaled Salah

The Internet of things is the next stage in the evolution of the Internet that is being materialized with the integration of billions of smart objects. The state-of-the-art communication technologies have enabled the previously isolated devices to become an active part of the Internet. This constant connectivity opens new avenues for novel applications such as the realization of social Internet of things and its subdomain the social Internet of vehicles. Socializing requires sharing of information that entails trust, especially in an open and broad social environment. This article highlights the key factors involved in conceptualizing an efficient trust model for social Internet of vehicles. Furthermore, it focuses on the unique challenges involved in designing the trust models for social Internet of vehicles. Several trust models exist in literature; however, most of the existing trust models are specific to their domains, for example, Internet of things, social Internet of things, or general vehicular networks. This article presents a brief review of the trust models that have the potential to be implemented in Social Internet of vehicles. Finally, the authors present an overview of how trending concepts and emerging technologies like blockchain and fog computing can assist in developing a trust-based social Internet of vehicles model for high-efficiency, decentralized architecture and dynamic nature of vehicular networks.


2016 ◽  
Vol 7 (2) ◽  
pp. 33-46 ◽  
Author(s):  
Nalini A. Mhetre ◽  
Arvind V. Deshpande ◽  
Parikshit Narendra Mahalle

The current state of ubiquitous computing has been greatly influenced by emerging networking developments like Internet of Things (IoT), Future Internet etc. Adequate trust management is crucial to provide security. The entities involved in communication must be trusted for specific purposes depending on their role. Using trust model, devices can run trust computations and guide their behaviors. To this effect, a method is needed to evaluate the level of trust between devices. Trust models investigated so far discusses that devices face problems when communicating as transforming trust relationships from real to virtual world requires the negotiation of trust based on the security properties of devices. However, these models are developed in limited devices. This paper proposes a distributed trust model for device-to-device communication in ubiquitous computing. Mathematical model based on fuzzy rules to establish trust is presented. Fuzzy simulation of the model is presented to validate the findings. Simulation results show that proposed model calculates fuzzy trust values reliably.


Author(s):  
. Rakhi ◽  
G. L Pahuja

Vehicular ad-hoc network contains of very intelligent vehicles on the pathways and give communication service to the dives in the network or can connect with the roadside devices. In the near future it will provide many service and fast delivery of information with minimal delay. It is the modern technology which is mixing the wireless networking to vehicles. The main goal of the VANET system is to provide uninterrupted connectivity to the vehicular users on road, smart vehicle to vehicle interaction without any interruptions is known as intelligent transportation system (ITS). In this paper, we present a review on the VANET, its trust issues, how routing is done in VANET. Different routing and the type of trust models with which routing takes place are discussed. Comparison of parameter such as throughput, bit-error rate and delay are done on the basis of, with optimization and without optimization according to number of rounds.


2020 ◽  
Vol 1 (3) ◽  
pp. 1-5
Author(s):  
Sonam Soni

This paper concerns about the various implemented work has been studied and analyzed to form a new survey on trust model to VANET. In this paper it is observed that there are lot of new techniques are possible to form a new trust model in VANET to provide better security with trust concern over the entire environment of trust management in VANET. This work concerns of entire trust calculation work which has been done yet over it. Here summarizing the various trust models, various security requirements, issues over it.


Sign in / Sign up

Export Citation Format

Share Document