A Trust Model Based on Evidence Theory for P2P Systems

2010 ◽  
Vol 20-23 ◽  
pp. 99-104 ◽  
Author(s):  
Li Dong Huang ◽  
Gang Xue ◽  
Xiang Lin He ◽  
Hong Lin Zhuang

Trust relationship between peers must to be established in P2P systems. But current trust models have some flaw in computing peer’s trust value, trust security and so on. This paper referred to the interpersonal social network, in which trust relationship between individuals are set up upon recommendations of other individuals, and proposed a recommendation trust model based on D-S evidence theory for P2P systems. The model deduces a peer’s local trust values from its transaction history, and then combines the peer’s local trust values by D-S combination rule and gets its global trust value finally. The experiment shows that, compared to the current trust model, the proposed model is more robust in security and more accurate in computing peer’s global trust value.

2012 ◽  
Vol 601 ◽  
pp. 301-306
Author(s):  
Ya Kun Zhang ◽  
Fang Tian Hou ◽  
Cheng Yang

In the opening network environment, different agencies may use different trust models. When users do business interaction between the cross-trust domains, the certifications are not compatible with each other. In response to this problem, this paper proposes a new trust model: A strict hierarchical trust model is used within the trust domain, and the trust model based on similar interests groups between the trust domains is used. The analysis shows that the trust model can meet the large-scale users in the distributed environment .A new trust value algorithm can solve the timeliness and gradual change in the trust relationship. Thus it guarantees safety in different business interactions.


2016 ◽  
Vol 7 (2) ◽  
pp. 33-46 ◽  
Author(s):  
Nalini A. Mhetre ◽  
Arvind V. Deshpande ◽  
Parikshit Narendra Mahalle

The current state of ubiquitous computing has been greatly influenced by emerging networking developments like Internet of Things (IoT), Future Internet etc. Adequate trust management is crucial to provide security. The entities involved in communication must be trusted for specific purposes depending on their role. Using trust model, devices can run trust computations and guide their behaviors. To this effect, a method is needed to evaluate the level of trust between devices. Trust models investigated so far discusses that devices face problems when communicating as transforming trust relationships from real to virtual world requires the negotiation of trust based on the security properties of devices. However, these models are developed in limited devices. This paper proposes a distributed trust model for device-to-device communication in ubiquitous computing. Mathematical model based on fuzzy rules to establish trust is presented. Fuzzy simulation of the model is presented to validate the findings. Simulation results show that proposed model calculates fuzzy trust values reliably.


Author(s):  
Nalini A. Mhetre ◽  
Arvind V. Deshpande ◽  
Parikshit Narendra Mahalle

The current state of ubiquitous computing has been greatly influenced by emerging networking developments like Internet of Things (IoT), Future Internet etc. Adequate trust management is crucial to provide security. The entities involved in communication must be trusted for specific purposes depending on their role. Using trust model, devices can run trust computations and guide their behaviors. To this effect, a method is needed to evaluate the level of trust between devices. Trust models investigated so far discusses that devices face problems when communicating as transforming trust relationships from real to virtual world requires the negotiation of trust based on the security properties of devices. However, these models are developed in limited devices. This paper proposes a distributed trust model for device-to-device communication in ubiquitous computing. Mathematical model based on fuzzy rules to establish trust is presented. Fuzzy simulation of the model is presented to validate the findings. Simulation results show that proposed model calculates fuzzy trust values reliably.


2010 ◽  
Vol 439-440 ◽  
pp. 98-103
Author(s):  
Guang Hua Zhang ◽  
Zhen Guo Chen

A robust trust model based on group for P2P environments-RobustGroup is put forward, which measures trust values based on the group relationship between requesting peers and serving peers. Trust’s aging time and peers’ similarity are introduced with weights for direct trust and indirect trust being dynamically adjusted in trust calculation against critical issues affecting trust evaluation such as false feedback, incentive and penalty, Whitewashing behavior, dynamic trust. Simultaneously service control policies are implemented on the basis of groups, and peers’ initial trust is determined by behavior in “silent time”. The simulation shows that the proposed model has advantages in successful requests and system overhead over the existing P2P trust models.


Author(s):  
Barath Kumar R ◽  
Stalin Alex

The immovable nature of passing on packages through multi -bounce middle hubs is a critical problem in the versatile impromptu organizations (MANETs). The disseminated versatile hubs set up associations with structure the MANET, which may incorporate childish and getting into mischief hubs. Suggestion based trust the board is proposed in the creating as a system to evaluate through the acting up hubs while looking for a bundle conveyance course. Nonetheless, building a trust model that embraces suggestions by different hubs in the organization is a difficult issue because of the danger of deceptive proposals like reviling, voting form stuffing, and conspiracy. we examines the issues identified with assaults presented by getting rowdy hubs while proliferating suggestions in the current trust models. We propose a suggestion based trust model with a safeguard plot, which uses grouping method to progressively sift through assaults identified with exploitative proposals between certain time dependent on number of collaborations, similarity of data and closeness between the hubs. We evaluate the trust degree as two cases like direct and indirect trust values between neighboring nodes from source. To form a clustering routing network from similar trust values from S to D.The model is experimentally tried under a few portable and detached geographies in which hubs experience changes in their local prompting regular course changes. The observational investigation shows heartiness and exactness of the trust model in a dynamic MANET climate.


Author(s):  
Santhana Lakshmi M ◽  
Hemaanand M

Delay Tolerant Network is designed for long distance communication where end-to-end connectivity is not established due to frequent disconnections or delay. Long latency is encountered in this type of network. This work proposes a reliable model for secure communication in DTN that aims to achieve correct estimation of trust value between the nodes and to minimize the relay rate i.e cost involved in the message transmission with minimum delay based on the history of ownership of information. In this model, we have used data driven approach so that the malicious or selfish nodes are prevented from consuming more resources in the resource constrained network environment. This approach checks the trustworthiness of the source of information. This work adopts computing based approach to evaluate the performance of the proposed model using fuzzy logic. We conduct two comparative analyses in which one compares the four variants of the proposed model to find the best variant of the proposed model and other compares our trust model with the other existing trust models to prove the efficiency of our model over other routing protocols.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Ahmad Yahya Asiri ◽  
Sultan S. Alshamrani

This paper evaluates the performance of a newly proposed B2C e-commerce model based on trust factors and requirements in the context of Saudi Arabia. Two categories of trust factors, namely, governmental and nongovernmental types, are identified to create the model for determining the feasibility of an efficient online business strategy in the Kingdom. Data are collected over a duration of 10 weeks based on the designed questionnaire, carefully analyzed, and interpreted. The standpoint of the end user is analyzed to determine the influence of the proposed trust requirements and factors on B2C e-commerce in Saudi Arabia. The reliability of the questionnaires for each requirement with their factors is quantitatively analyzed using Cronbach’s alpha. The questionnaire consists of three parts, namely, demographic component, questions related to the identified requirements, and additional notes as an open question. Questions are designed as per the requirements and the factors of trust models to demonstrate their possible relationship. Furthermore, the questionnaires’ content validity is judged by expert lecturers with relevant specialization before distributing them, which are well organized together with easy understandability. They are randomly distributed among 222 academic and administrative staff (female and male) in addition to university students from the Faculty of Computer Science and Information System in Saudi Arabia. This random selection performed on total 222 responders ensures the statistical accuracy of the sampling. Adaptable government approaches, enactment, rules, insurance of buyer rights, and banking network situation with less web expenses are demonstrated to be significant to e-commerce expansion in the Kingdom. Implementation of the proposed model is believed to augment consumer self-confidence and reliance together with e-commerce growth in Saudi Arabia.


2021 ◽  
Vol 11 (03) ◽  
pp. 13-23
Author(s):  
K. Divya ◽  
B. Srinivasan

The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.


2011 ◽  
Vol 30 (6) ◽  
pp. 1480-1484 ◽  
Author(s):  
Chun-qi Tian ◽  
Shi-hong Zou ◽  
Wen-dong Wang ◽  
Shi-duan Cheng

Sign in / Sign up

Export Citation Format

Share Document