Trust-based Task Assignment in Military Tactical Networks
نویسندگان
چکیده
Resource or task assignment problems have been studied extensively in military network environments as efficient and effective resource allocation is the key to successful mission completion. However, existing works on asset‐task assignment problems are based only on the best match between functionalities of a node and requirements of a task. We propose a composite trust based task assignment protocol where a task requires all members to have a specific trust level for successful mission completion while allowing each member to maximize its utility. The proposed protocol explores the tradeoff between trust and risk, and selects a best set of members for each task based on task specific trust requirements. We show that the proposed composite trust based task assignment protocol outperforms the non‐trust based counterpart in mission success ratio. Further, there exists an optimal acceptable risk level that can best balance meeting the condition of selecting a sufficient number of members for task execution while preserving qualified trustworthy nodes as task members to maximize the mission completion ratio.
منابع مشابه
Application of Mobile 1P to Tactical Mobile Internetworking
Mobile Internetworking Protocol or Mobile 1P, proposed in the Internet Engineering Task Force (IETF), does not consider the requirements of tactical military networks, which are predominantly radio based and “on the move” with minimal fixed infrastructure. In this paper, we present a tactical Mobile 1P solution for the military architecture, specifically the Radio Access Point (RAP) network, wi...
متن کاملDisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملQuantitative Modeling of Trust and Trust Management Protocols in Next Generation Social Networks Based Wireless Mobile Ad Hoc Networks
Trust and Trust Management represent the very foundations of Computer and Network Security Protocols enabling all cyber activities. Recent spate of national and global high-impact Cyber Security compromises, threats, vulnerabilities, and exposures leads to fundamental questioning of Trust as the key enabler of all cyber phenomena in the unfolding era of exponentially increasing Distrust. It is ...
متن کاملHIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes
Mobile Ad-hoc networks (MANETs), providing infrastructure-free wireless instant communication, play important role in tactical military networks. However, providing security in tactical military MANETs, having very large and dynamic structure without infrastructure support in hostile environments, is a very difficult task. In order to address security problems in tactical military MANETs, we pr...
متن کاملMission-Dependent Trust Management in Heterogeneous Military Mobile Ad Hoc Networks Topic(s): 2-Networks and Networking 5-Experimentation and Analysis 6-Modeling and Simulation Name of Author(s):
Managing trust in a tactical Mobile Ad Hoc Network (MANET) is challenging when collaboration or cooperation is critical to achieving military missions and system goals. Further, in heterogeneous MANETs, evaluating the trust level of a mission-driven group communication system accurately and identifying well-qualified nodes to perform a given mission are also crucial for successful mission compl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012