Design of a Novel Trust Model and its Application in Trust based Routing to Defend against Dishonest Recommenders

نویسندگان

  • Shirina Samreen
  • A. Whitby
  • A. Josang
  • J. Indulska
  • H. Yu
  • S. Liu
  • A. C. Kot
  • C. Miao
  • Mark
  • M. Hejmo
  • R. K. Thomas
چکیده

Trust management frameworks play a very important role in securing the mobile ad hoc networks against various insider attacks that could occur during data forwarding. The success of a trust management framework greatly depends upon the proper design of each of its major components including the direct trust computation component as well as the indirect trust computation component. Specifically, the indirect trust computation component should be robust to handle the dishonest recommendations. The current paper shows the application of a trust model involving a robust indirect trust computation component called as RecommFilter which has been proposed in our earlier work. It can overcome the various attacks caused by dishonest recommenders. The application involves the integration of the trust model with a routing protocol based upon a reliability measure called as Path Allegiance metric (PAM) which is a cumulative value obtained through the trust values of the on-path nodes upon each other. Experimental results show that the proposed scheme along with PAM routing protocol is robust to different dishonest recommendation attacks and accurate in the detection of dishonest recommenders.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Filtering Dishonest Trust Recommendations in Trust Management Systems in Mobile Ad Hoc Networks

Trust recommendations, having a pivotal role in computation of trust and hence confidence in peer to peer (P2P) environment, if hampered, may entail in colossal attacks from dishonest recommenders such as bad mouthing, ballot stuffing, random opinion etc. Therefore, mitigation of dishonest trust recommendations is stipulated as a challenging research issue in P2P systems (esp in Mobile Ad Hoc N...

متن کامل

A Malicious Users Detecting Model Based on Feedback Correlations

The trust and reputation models were introduced to restrain the impacts caused by rational but selfish peers in P2P streaming systems. However, these models face with two major challenges from dishonest feedback and strategic altering behaviors. To answer these challenges, we present a global trust model based on network community, evaluation correlations, and punishment mechanism. We also prop...

متن کامل

A Scalable Geographical Routing approach for Wireless Sensor Networks

Efficient defense against security attacks is a challenging task in the wireless sensor network environment. Due to their infrastructure-less operation and the limited node and network resources, the applicability of legacy security solutions is disputable. The situation is further aggravated as the next generation wireless sensor network become larger and larger. To cope with the network dimen...

متن کامل

A Novel Trust Management Model in the Social Internet of Things

The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...

متن کامل

Towards the Design of Robust Trust and Reputation Systems

Our research is within the area of artificial intelligence and multiagent system. More specifically, we are interested in addressing robustness problems in trust and reputation systems so that buying agents are able to accurately model the reputation of selling agents even with the existence of various unfair rating attacks from other dishonest buyers (called advisors) [Zhang and Cohen, 2008]. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015