A Context-Aware Model of Trust for Facilitating Secure Ad Hoc Collaborations

Author(s):  
Indrajit Ray ◽  
Indrakshi Ray ◽  
Sudip Chakraborty

Ad hoc collaborations often necessitate impromptu sharing of sensitive information or resources between member organizations. Each member of resulting collaboration needs to carefully assess and tradeoff the requirements of protecting its own sensitive information against the requirements of sharing some or all of them. The challenge is that no policies have been previously arrived at for such secure sharing (since the collaboration has been formed in an ad hoc manner). Thus, it needs to be done based on an evaluation of the trustworthiness of the recipient of the information or resources. In this chapter, the authors discuss some previously proposed trust models to determine if they can be effectively used to compute trustworthiness for such sharing purposes in ad hoc collaborations. Unfortunately, none of these models appear to be completely satisfactory. Almost all of them fail to satisfy one or more of the following requirements: (i) well defined techniques and procedures to evaluate and/or measure trust relationships, (ii) techniques to compare and compose trust values which are needed in the formation of collaborations, and (iii) techniques to evaluate trust in the face of incomplete information. This prompts the authors to propose a new vector (we use the term “vector” loosely; vector in this work means a tuple) model of trust that is suitable for reasoning about the trustworthiness of systems built from the integration of multiple subsystems, such as ad hoc collaborations. They identify three parameters on which trust depends and formulate how to evaluate trust relationships. The trust relationship between a truster and a trustee is associated with a context and depends on the experience, knowledge, and recommendation that the truster has with respect to the trustee in the given context. The authors show how their model can measure trust in a given context. Sometimes enough information is not available about a given context to calculate the trust value. Towards this end the authors show how the relationships between different contexts can be captured using a context graph. Formalizing the relationships between contexts allows us to extrapolate values from related contexts to approximate a trust value of an entity even when all the information needed to calculate the trust value is not available. Finally, the authors develop formalisms to compare two trust relationships and to compose two or more of the same – features that are invaluable in ad hoc collaborations.

2021 ◽  
Vol 11 (03) ◽  
pp. 13-23
Author(s):  
K. Divya ◽  
B. Srinivasan

The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.


2008 ◽  
pp. 1450-1455
Author(s):  
Mike Burmester

This chapter introduces the notion of trust as a means to establish security in mobile ubiquitous applications. It argues that trust is an essential requirement to enable security in open network environments. In particular in wireless ad hoc environments where there is no network topology. In such environments communication can only be achieved via routes that have to be trusted. In general it may be hard, or even impossible, to establish, recall and maintain trust relationships. It is therefore important to understand the limitations of such environments and to find mechanisms that may support trust either explicitly or implicitly. We consider several models that can be used to enable trust in such environments, based on economic, insurance, information flow and evolutionary paradigms.


2009 ◽  
pp. 2827-2832
Author(s):  
Mike Burmester

This chapter introduces the notion of trust as a means to establish security in ubiquitous mobile network systems. It argues that trust is an essential requirement to enable security in any open network environments, and in particular, in wireless ad hoc environments where there is no network topology. In such environments, communication can only be achieved via routes that have to be trusted. In general it may be hard, or even impossible, to establish, recall, and maintain trust relationships. It is therefore important to understand the limitations of such environments and to find mechanisms that may support trust either explicitly or implicitly. We consider several models that can be used to enable trust in such environments, based on economic, insurance, information flow, and evolutionary paradigms.


Author(s):  
Mike Burmester

This chapter introduces the notion of trust as a means to establish security in ubiquitous mobile network systems. It argues that trust is an essential requirement to enable security in any open network environments, and in particular, in wireless ad hoc environments where there is no network topology. In such environments, communication can only be achieved via routes that have to be trusted. In general it may be hard, or even impossible, to establish, recall, and maintain trust relationships. It is therefore important to understand the limitations of such environments and to find mechanisms that may support trust either explicitly or implicitly. We consider several models that can be used to enable trust in such environments, based on economic, insurance, information flow, and evolutionary paradigms.


Sensors ◽  
2019 ◽  
Vol 19 (6) ◽  
pp. 1467 ◽  
Author(s):  
Waleed Alnumay ◽  
Uttam Ghosh ◽  
Pushpita Chatterjee

The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. A Beta probabilistic distribution is used to combine different trust evidences and direct trust has been calculated. The theory of ARMA/GARCH has been used to combine the recommendation trust evidences and predict the resultant trust value of each node in multi-step ahead. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.


Author(s):  
Mike Burmester

This chapter introduces the notion of trust as a means to establish security in ubiquitous mobile network systems. It argues that trust is an essential requirement to enable security in any open network environments, and in particular, in wireless ad hoc environments where there is no network topology. In such environments, communication can only be achieved via routes that have to be trusted. In general it may be hard, or even impossible, to establish, recall, and maintain trust relationships. It is therefore important to understand the limitations of such environments and to find mechanisms that may support trust either explicitly or implicitly. We consider several models that can be used to enable trust in such environments, based on economic, insurance, information flow, and evolutionary paradigms.


Author(s):  
Mike Burmester

This chapter introduces the notion of trust as a means to establish security in mobile ubiquitous applications. It argues that trust is an essential requirement to enable security in open network environments. In particular in wireless ad hoc environments where there is no network topology. In such environments communication can only be achieved via routes that have to be trusted. In general it may be hard, or even impossible, to establish, recall and maintain trust relationships. It is therefore important to understand the limitations of such environments and to find mechanisms that may support trust either explicitly or implicitly. We consider several models that can be used to enable trust in such environments, based on economic, insurance, information flow and evolutionary paradigms.


Author(s):  
Mike Burmester

This chapter introduces the notion of trust as a means to establish security in mobile ubiquitous applications. It argues that trust is an essential requirement to enable security in open network environments. In particular in wireless ad hoc environments where there is no network topology. In such environments communication can only be achieved via routes that have to be trusted. In general it may be hard, or even impossible, to establish, recall and maintain trust relationships. It is therefore important to understand the limitations of such environments and to find mechanisms that may support trust either explicitly or implicitly. We consider several models that can be used to enable trust in such environments, based on economic, insurance, information flow and evolutionary paradigms.


Author(s):  
Nazom Murio ◽  
Roseli Theis

Geometri adalah bagian matematika yang sangat dekat dari siswa, karena hampir semua objek visual yang ada di sekitar siswa adalah objek geometri, tetapi tidak semua siswa menyukai pembelajaran yang menyertakan gambar, sehingga memungkinkan siswa mengalami kesulitan dalam belajar geometri. Tujuan dari penelitian ini adalah untuk menggambarkan kesulitan belajar siswa berdasarkan karakteristik Lerner dalam menyelesaikan pertanyaan geometri. Jenis penelitian ini adalah penelitian deskriptif kualitatif. Subjek penelitian adalah siswa dengan kepribadian wali yang mengalami kesulitan belajar di kelas IX A SMP N 30 Muaro Jambi. Instrumen yang digunakan dalam penelitian ini adalah penulis sendiri, lembar tes klasifikasi kepribadian, lembar tes kesulitan belajar, dan pedoman wawancara. Hasil penelitian menunjukkan siswa dengan kepribadian wali yang mengalami kesulitan belajar, 100% mengalami kelainan persepsi visual, di mana siswa mengalami kesulitan dalam menentukan seperti apa bangun datar pada masalah tersebut. 60% mengalami kesulitan mengenali dan memahami simbol, di mana siswa melihat simbol "//" sebagai simbol untuk kesesuaian. Serta 40% mengalami kesulitan dalam bahasa dan membaca, di mana siswa kesulitan dalam memahami pertanyaan yang diberikan.   Geometry is a very close mathematical part of the student, because almost all visual objects that exist around the students are objects of geometry, but not all students like learning that includes images, thus allowing students to have difficulty in learning geometry. The purpose of this research is to describe students' learning difficulties based on Lerner's characteristic in solving the geometry question. This type of research is descriptive qualitative research. Research subjects were students with guardian personality who had difficulty studying in class IX A SMP N 30 Muaro Jambi. Instruments used in this study are the authors themselves, personality classification test sheets, learning difficulties test sheets, and interview guidelines. The results showed students with guardian personality who experienced learning difficulties, 100% experienced visual perception abnormalities, where students have difficulty in determining what kind of flat wake on the matter. 60% have difficulty recognizing and understanding symbols, where students see the symbol "//" as a symbol for conformity. As well as 40% have difficulty in language and reading, where students difficulty in understanding the given question.


MRS Bulletin ◽  
1993 ◽  
Vol 18 (7) ◽  
pp. 29-34 ◽  
Author(s):  
Shuichi Iwata

One of the requirements for an intelligent system is to construct a virtual reality in the computer. For materials development, the “reality” is a laboratory or a production line used to improve some aspect of a material by changing its composition, processing parameters, service conditions, etc. In the case of information in libraries, the reality is a search that uses a thesaurus and bibliographic (fact) databases. The greatest barrier faced by users of materials information is that of accessing necessary information through both a librarian's view and a scientific/technological expert's view. One of the objectives of a virtual production line is to reduce this barrier through user-friendly interfaces.In designing materials, two typical approaches are combined to solve a given problem. The first is a top-down approach, in which a number of requirements are resolved to a set of possible and practical solutions for satisfying these requirements to a certain level. Almost all alloy development has followed such an approach. The second approach is a bottom-up approach, where different materials properties are described on the basis of underlying theories, preferably using first principles and fundamental data. But the vast number of possible materials makes the bottom-up approach unrealistic on its own. Instead, semi-empirical approaches are needed to bridge the gap between ad hoc data sets for practical applications and results produced by the bottom-up approach using fundamental data and first-principle calculations.


Sign in / Sign up

Export Citation Format

Share Document