trust calculation
Recently Published Documents


TOTAL DOCUMENTS

45
(FIVE YEARS 12)

H-INDEX

6
(FIVE YEARS 2)

Author(s):  
Mrs. Swetha M S Et.al

Mobile Ad Hoc Networks (MANETs) utilize confounding planning shows that spread community point characters similarly as courses from outside onlookers so as to give obscurity security. MANET contains different little gadgets conceding suddenly over the air. The topology of the system is changing an incredible piece of the time in light of the advantageous idea of its inside focuses. The security challenges ascend taking into account self-game-plan and self-reinforce limits. By the by, existing mysterious organizing shows depending upon either ricochet by-skip encryption or excess traffic either produce imperative expense or can't give full namelessness security to information sources, targets, and courses. The imperative expense raises the trademark asset limitation issue in MANETs particularly in natural media remote applications. To offer high absence of definition assurance expecting for all intents and purposes no effort, we strong secure anonymous location based routing (S2ALBR) protocol for MANET utilizing optimal partitioning and trust inference model. In S2ALBR appear, first segments a system into zones utilizing optimal tug of war partition (OTW) algorithm. By at that point, figure the trustiness of each reduced focus point utilizing the imprisonments got signal quality, versatility, way debacle and joint exertion rate. The arrangement of trust calculation is advanced by the optimal decided trust inference (ODTI) model, which gives the trustiness of each adaptable. By then picks the most basic trust ensured focus point in each zone as generally engaging trade habitats for information transmission, which structure a non-unquestionable bewildering course. The introduction of proposed S2ALBR show is examined by various testing conditions with Network Simulator (NS2) instrument.


2021 ◽  
Vol 336 ◽  
pp. 08014
Author(s):  
Zhaosheng Xu

in this paper, we construct a data-driven trust evaluation model based on perceptual source. The model takes the monitoring module as the evaluation unit, and the relay node completes the trust evaluation of the sensing node in its monitoring module. The direct trust calculation is realized by the relationship between the sensing node's own data, and the recommended trust is calculated by using the relationship between the neighbor nodes in the monitoring module. Combined with the historical trust, the comprehensive trust of the sensing node is output. In this paper, the credibility of existing database driven cognitive software is summarized, and then the key technologies of reliability evaluation and classification of database driven cognitive software are analyzed.


Author(s):  
Radha Raman Chandan ◽  
P.K Mishra

Introduction: * The proposed TWIST model aims to achieve a secure MANET by detecting and mitigating packet dropping attack using finite state machine based IDS model. * To determine the trust values of the nodes using context-aware trust calculation * To select the trustworthy nodes as watchdog nodes for performing intrusion detection on the network * To detect and isolate the packet dropping attackers from routing activities, the scheme uses FSM based IDS for differen-tiating the packet dropping attacks from genuine nodes in the MANET. Method: In this methodology, instead of launching an intrusion detection system (IDS) in all nodes, an FSM based IDS is placed in the trustworthy watchdog nodes for detecting packet dropping attacker nodes in the network. The proposed FSM based intrusion detection scheme has three steps. The three main steps in the proposed scheme are context- aware trust calculation, watchdog node selection, and FSM based intrusion detection. In the first process, the trust calculation for each node is based on specific parameters that are different for malicious nodes and normal nodes. The second step is the watchdog node selection based on context-aware trust value calculation for ensuring that the trust-worthy network monitors are used for detecting attacker nodes in the network. The final process is FSM based intrusion detection, where the nodes acquire each state based on their behavior during the data routing. Based on the node behavior, the state transition occurs, and the nodes that drop data packets exceeding the defined threshold are moved to the malicious state and restricted to involve in further routing and services in the network Result: The performance of the proposed (TWIST) mechanism is assessed using the Network Simulator 2 (NS2). The proposed TWIST model is implemented by modifying the Ad-Hoc On-Demand Distance Vector (AODV) protocol files in NS2. Moreover, the proposed scheme is compared with Detection and Defense against Packet Drop attack in the MANET (DDPD) scheme. A performance analysis is done for the proposed TWIST model using performance metrics such as detection accuracy, false-positive rate, and overhead and the performance result is compared with that of the DDPD scheme. After the compare result we have analyzed that the proposed TWIST model exhibits better performance in terms of detection accuracy, false positive rate, energy consumption, and overhead compared to the existing DDPD scheme. Conclusion: In the TWIST model, an efficient packet dropping detection scheme based on the FSM model is proposed that efficiently detects the packet dropping attackers in the MANET. The trust is evaluated for each node in the network, and the nodes with the highest trust value are selected as watchdog nodes. The trust calculation based on parameters such as residual energy, the interaction between nodes and the neighbor count is considered for determining watchdog node selec-tion. Thus, the malicious nodes that drop data packets during data forwarding cannot be selected as watchdog nodes. The FSM based intrusion detection is applied in the watchdog nodes for detecting attackers accurately by monitoring the neigh-bor nodes for malicious behavior. The performance analysis is performed between the proposed TWIST mechanism and existing DDPD scheme. The proposed TWIST model exhibits better performance in terms of detection accuracy, false positive rate, energy consumption, and overhead compared to the existing DDPD scheme Discussion: This work may extend the conventional trust measurement of MANET routing, which adopts only routing behavior observation to cope with malicious activity. In addition, performance evaluation of proposed work under packet dropping attack has not been performed for varying the mobility of nodes in terms of speed. Furthermore, various perfor-mance metric parameters like route discovery latency and malicious discovery ratio which can be added for evaluate the performance of protocol in presence of malicious nodes. This may be considered in future work for extension of protocol for better and efficient results. Furthermore, In the future, the scheme will focus on providing proactive detection of packet dropping attacker nodes in MANET using a suitable and efficient statistical method.


Author(s):  
Pooja Chaturvedi ◽  
A K Daniel

Background: Target coverage is considered as a significant problem in the area of wireless sensor networks which usually aims at monitoring a given set of targets with the required confidence level so that network lifetime can be enhanced while considering the constraints of the resources. Objective: To maximize the lifetime of the sensor network and minimize the overhead involved in the scheduling approach, such that the pre specified set of targets is monitored for longer duration with the required confidence level. Methods: The paper uses a fuzzy logic system based on Mamdani inference in which the node status to remain in the active state is determined on the basis of coverage probability, trust values and node contribution. The rule set for determining the set cover is optimized by using the rough set theory which aims to determine the node validity for the trust calculation. Results: The results show that the proposed approach improved the network performance in terms of processing time, throughput and energy conservation by a factor of 50%, 74% and 74% respectively as compared to the existing approaches. Conclusion: The paper proposes a scheduling strategy of the nodes for target coverage as an enhancement to the energy efficient coverage protocol (EECP) on the basis of rough set theory. The rule set for determining the set cover is optimized by using the rough set theory so that the network performance is improved in terms of the processing time, throughput and energy consumption. Current and Future Developments: In this paper we have optimized the performance of EECP protocol by considering the concept of Rough Set Theory, which determined the validity of the nodes in the trust calculation. We have evaluated the performance through a number of simulations and the results show the comparative improvement in terms of the processing time, throughput and energy conservation. To utilize the unutilized nodes in the current round for the coverage enhancement is our future work. We also aim to study the effects of heterogeneity on the performance of the proposed protocol in future. Declaration: The authors declare that the research article is author’s original work and have not been sent/ published elsewhere.


2020 ◽  
Vol 1 (3) ◽  
pp. 1-5
Author(s):  
Sonam Soni

This paper concerns about the various implemented work has been studied and analyzed to form a new survey on trust model to VANET. In this paper it is observed that there are lot of new techniques are possible to form a new trust model in VANET to provide better security with trust concern over the entire environment of trust management in VANET. This work concerns of entire trust calculation work which has been done yet over it. Here summarizing the various trust models, various security requirements, issues over it.


2020 ◽  
Vol 17 (5) ◽  
pp. 2181-2186 ◽  
Author(s):  
Feslin Anish Mon Solomon ◽  
Godfrey Winster Sathianesan

Internet of things is a current exploding area of research now in which the number of devices is expected to reach 20 billion in 2050. Devices are becoming intelligent and are being used for many applications which support day to day living of humans. Since the information gathered are being used by human users in most of the cases, trust of the information provider is to be questioned. Lack of trust obstructs the acceptance of these devices and technologies to be implemented. As the technology advances, the IoT network architecture must establish trust between the devices to increase its adaptability among the potential users. In this paper, we propose a Fog level trust establishment technique has been proposed for IoT devices using Node feedback mechanism. Since the trust factors are decided in the fog level, the nodes will know the trust of the other node which they need to communicate only and thereby avoiding bad-mouthing attacks. Considering the node capability in IoT environment, we adopt a mechanism for the calculating the trust of the node which keeps the overhead of the trust computing device to be low. This makes our implementation capable of expanding to handle large scale IoT networks. Information Entropy theory has been adopted to gather the feedback about a node in the fog level which breaks the barriers of subjective trust calculation in the traditional trust management schemes. Results shows an improvement in the efficiency compared to the existing methods.


Cloud computing is being progressively patronized by each organizations and folks World Health Organization have robust interest and investment from government and sectors. Cloud primarily based services have fully grown to be a part of our day-to- day package solutions. In this, the most security and safety issues embody secure storage, secure access and secure retrieval. However, authentication alongside access management and trust calculation and management connected with cloud service suppliers (CSPs) unimaginable and barely researched problems for this new paradigm. During this article, we have a tendency to discuss various information accessibility supported trust parameters among CSP and conductor.


Sign in / Sign up

Export Citation Format

Share Document