Design of a Novel Trust Model and its Application in Trust based Routing to Defend against Dishonest Recommenders
نویسندگان
چکیده
Trust management frameworks play a very important role in securing the mobile ad hoc networks against various insider attacks that could occur during data forwarding. The success of a trust management framework greatly depends upon the proper design of each of its major components including the direct trust computation component as well as the indirect trust computation component. Specifically, the indirect trust computation component should be robust to handle the dishonest recommendations. The current paper shows the application of a trust model involving a robust indirect trust computation component called as RecommFilter which has been proposed in our earlier work. It can overcome the various attacks caused by dishonest recommenders. The application involves the integration of the trust model with a routing protocol based upon a reliability measure called as Path Allegiance metric (PAM) which is a cumulative value obtained through the trust values of the on-path nodes upon each other. Experimental results show that the proposed scheme along with PAM routing protocol is robust to different dishonest recommendation attacks and accurate in the detection of dishonest recommenders.
منابع مشابه
Filtering Dishonest Trust Recommendations in Trust Management Systems in Mobile Ad Hoc Networks
Trust recommendations, having a pivotal role in computation of trust and hence confidence in peer to peer (P2P) environment, if hampered, may entail in colossal attacks from dishonest recommenders such as bad mouthing, ballot stuffing, random opinion etc. Therefore, mitigation of dishonest trust recommendations is stipulated as a challenging research issue in P2P systems (esp in Mobile Ad Hoc N...
متن کاملA Malicious Users Detecting Model Based on Feedback Correlations
The trust and reputation models were introduced to restrain the impacts caused by rational but selfish peers in P2P streaming systems. However, these models face with two major challenges from dishonest feedback and strategic altering behaviors. To answer these challenges, we present a global trust model based on network community, evaluation correlations, and punishment mechanism. We also prop...
متن کاملA Scalable Geographical Routing approach for Wireless Sensor Networks
Efficient defense against security attacks is a challenging task in the wireless sensor network environment. Due to their infrastructure-less operation and the limited node and network resources, the applicability of legacy security solutions is disputable. The situation is further aggravated as the next generation wireless sensor network become larger and larger. To cope with the network dimen...
متن کاملA Novel Trust Management Model in the Social Internet of Things
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...
متن کاملTowards the Design of Robust Trust and Reputation Systems
Our research is within the area of artificial intelligence and multiagent system. More specifically, we are interested in addressing robustness problems in trust and reputation systems so that buying agents are able to accurately model the reputation of selling agents even with the existence of various unfair rating attacks from other dishonest buyers (called advisors) [Zhang and Cohen, 2008]. ...
متن کامل