scholarly journals MANET of an Effective Defence Scheme for Suggestion Based Trust Model

Author(s):  
Barath Kumar R ◽  
Stalin Alex

The immovable nature of passing on packages through multi -bounce middle hubs is a critical problem in the versatile impromptu organizations (MANETs). The disseminated versatile hubs set up associations with structure the MANET, which may incorporate childish and getting into mischief hubs. Suggestion based trust the board is proposed in the creating as a system to evaluate through the acting up hubs while looking for a bundle conveyance course. Nonetheless, building a trust model that embraces suggestions by different hubs in the organization is a difficult issue because of the danger of deceptive proposals like reviling, voting form stuffing, and conspiracy. we examines the issues identified with assaults presented by getting rowdy hubs while proliferating suggestions in the current trust models. We propose a suggestion based trust model with a safeguard plot, which uses grouping method to progressively sift through assaults identified with exploitative proposals between certain time dependent on number of collaborations, similarity of data and closeness between the hubs. We evaluate the trust degree as two cases like direct and indirect trust values between neighboring nodes from source. To form a clustering routing network from similar trust values from S to D.The model is experimentally tried under a few portable and detached geographies in which hubs experience changes in their local prompting regular course changes. The observational investigation shows heartiness and exactness of the trust model in a dynamic MANET climate.

2021 ◽  
Vol 11 (03) ◽  
pp. 13-23
Author(s):  
K. Divya ◽  
B. Srinivasan

The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.


2011 ◽  
Vol 1 ◽  
pp. 52-56 ◽  
Author(s):  
Xin Fei Liao

Trust management is now one of the interesting research topics in the field of web security. Firstly, several existing trust models are analyzed. Aiming at flaws of these models, the subject trust model based on fuzzy comprehensive evaluation is proposed, thus solving the evaluation problem of subjects trust degree in trust model. An effective evaluation strategy for trust degree vector of subject trust model is given. Finally, a concrete example is provided and has proved the rationality and feasibility of the model.


Open Physics ◽  
2017 ◽  
Vol 15 (1) ◽  
pp. 613-619 ◽  
Author(s):  
Wang Yu

AbstractCurrent reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.


Sensors ◽  
2019 ◽  
Vol 19 (6) ◽  
pp. 1467 ◽  
Author(s):  
Waleed Alnumay ◽  
Uttam Ghosh ◽  
Pushpita Chatterjee

The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. A Beta probabilistic distribution is used to combine different trust evidences and direct trust has been calculated. The theory of ARMA/GARCH has been used to combine the recommendation trust evidences and predict the resultant trust value of each node in multi-step ahead. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.


2010 ◽  
Vol 439-440 ◽  
pp. 98-103
Author(s):  
Guang Hua Zhang ◽  
Zhen Guo Chen

A robust trust model based on group for P2P environments-RobustGroup is put forward, which measures trust values based on the group relationship between requesting peers and serving peers. Trust’s aging time and peers’ similarity are introduced with weights for direct trust and indirect trust being dynamically adjusted in trust calculation against critical issues affecting trust evaluation such as false feedback, incentive and penalty, Whitewashing behavior, dynamic trust. Simultaneously service control policies are implemented on the basis of groups, and peers’ initial trust is determined by behavior in “silent time”. The simulation shows that the proposed model has advantages in successful requests and system overhead over the existing P2P trust models.


2010 ◽  
Vol 20-23 ◽  
pp. 99-104 ◽  
Author(s):  
Li Dong Huang ◽  
Gang Xue ◽  
Xiang Lin He ◽  
Hong Lin Zhuang

Trust relationship between peers must to be established in P2P systems. But current trust models have some flaw in computing peer’s trust value, trust security and so on. This paper referred to the interpersonal social network, in which trust relationship between individuals are set up upon recommendations of other individuals, and proposed a recommendation trust model based on D-S evidence theory for P2P systems. The model deduces a peer’s local trust values from its transaction history, and then combines the peer’s local trust values by D-S combination rule and gets its global trust value finally. The experiment shows that, compared to the current trust model, the proposed model is more robust in security and more accurate in computing peer’s global trust value.


2001 ◽  
Vol 432 ◽  
pp. 219-283 ◽  
Author(s):  
G. BRIASSULIS ◽  
J. H. AGUI ◽  
Y. ANDREOPOULOS

A decaying compressible nearly homogeneous and nearly isotropic grid-generated turbulent flow has been set up in a large scale shock tube research facility. Experiments have been performed using instrumentation with spatial resolution of the order of 7 to 26 Kolmogorov viscous length scales. A variety of turbulence-generating grids provided a wide range of turbulence scales with bulk flow Mach numbers ranging from 0.3 to 0.6 and turbulent Reynolds numbers up to 700. The decay of Mach number fluctuations was found to follow a power law similar to that describing the decay of incompressible isotropic turbulence. It was also found that the decay coefficient and the decay exponent decrease with increasing Mach number while the virtual origin increases with increasing Mach number. A possible mechanism responsible for these effects appears to be the inherently low growth rate of compressible shear layers emanating from the cylindrical rods of the grid. Measurements of the time-dependent, three dimensional vorticity vectors were attempted for the first time with a 12-wire miniature probe. This also allowed estimates of dilatation, compressible dissipation and dilatational stretching to be obtained. It was found that the fluctuations of these quantities increase with increasing mean Mach number of the flow. The time-dependent signals of enstrophy, vortex stretching/tilting vector and dilatational stretching vector were found to exhibit a rather strong intermittent behaviour which is characterized by high-amplitude bursts with values up to 8 times their r.m.s. within periods of less violent and longer lived events. Several of these bursts are evident in all the signals, suggesting the existence of a dynamical flow phenomenon as a common cause.


2021 ◽  
Vol 13 (4) ◽  
pp. 24-36
Author(s):  
Srinivasan Palanisamy ◽  
Sankar S. ◽  
Ramasubbareddy Somula ◽  
Ganesh Gopal Deverajan

Wireless sensor networks (WSN) deployed in open environments make nodes prone to various security attacks due to their resource constrained nature. The compromised nodes are used to mislead the sensed data and disrupt communication, which can affect the entire decision-making system based on the sensed data. It is also possible to drain the sensor nodes energy and reduce the battery life of the networks. Trust models are the preferred mechanism to secure WSN. In this paper, the authors present communication trust and energy aware (CTEA) routing protocol that make use of the proposed trust model to mitigate the effects of badmouth and energy drain attacks. They use Dempster theory to compute communication trust and also consider the energy metric, to establish the route for data transfer. The simulation result shows that the proposed trust model increases the packet delivery ratio, residual energy, and network lifetime by mitigating the nodes misbehaviour in presence of energy drain and bad mouth attacks.


Author(s):  
Jochen Autschbach

It is shown how electronic transitions can be induced by the interaction with an electromagnetic wave of a suitable frequency. The rate of a transition between two electronic states induced by a time-dependent field is derived. The transition rate expression is used to calculate the absorption coefficient due to electronic transitions. The differential absorption coefficient for left and right circular polarized light is specific to chiral molecules and has different signs for a pair of enantiomers. The discussion then shifts to general functions describing the response of an atom or molecule to an external. The ideas developed thus far are then applied to the dynamic polarizability, molecular linear response functions in general, and the optical rotation. Linear response theory is set up within time-dependent molecular orbital theory. The Chapter concludes with a discussion of non-linear response properties and two-photon absorption.


1992 ◽  
Vol 120 (3-4) ◽  
pp. 267-282 ◽  
Author(s):  
Lieven Smits

SynopsisWe give an expression for the n-th moment of certain Itô integrals. The integrands considered are nonanticipating functionals of the form s↦a(s, Xs), where a is a measurable time-dependent vector field in space satisfying mild regularity conditions, and Xs is standard translated Brownian motion. The expressions are similar to the Dyson-Phillips terms for magnetic Schrödinger semigroups.We use these expressions to establish properties of the solutions of certain Cauchy problems and we relate our results to the framework of generalised Dyson expansions as set up by Johnson and Lapidus.


Sign in / Sign up

Export Citation Format

Share Document