SlideShare a Scribd company logo
1 of 13
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
DOI : 10.5121/ijcnc.2015.7410 139
REFERENCING TOOL FOR REPUTATION AND
TRUST IN WIRELESS SENSOR NETWORKS
Mohammad Abdus Salam1
and Alfred Sarkodee-Adoo2
1
Department of Computer Science, Southern University, Baton Rouge, Louisiana, USA
2
Department of Electronics Engineering Technology, Southern University
Baton Rouge, Louisiana, USA
ABSTRACT
Presently, there are not many literatures on the characterization of reputation and trust in wireless sensor
networks (WSNs) which can be referenced by scientists, researchers and students. Although some research
documents include information on reputation and trust, characterization of these features are not
adequately covered. In this paper, reputation and trust are divided into various classes or categories and a
method of referencing the information is provided. This method used results in providing researchers with
a tool that makes it easier to reference these features on reputation and trust in a much easier way than if
referencing has to be directed to several uncoordinated resources. Although the outcome of this work
proves beneficial to research in the characterization of reputation and trust in WSNs, more work needs to
be done in extending the benefits to other network systems.
KEYWORDS
Characterization , Reputation, Trust, Nodes, Wireless Sensor Networks.
1. INTRODUCTION
A wireless sensor network (WSN) consists of low cost, low energy sensors, identified as nodes in
a WSN, which are scattered in an area on land or under water for the purpose of gathering
information on specific events for transmission to a base station for analysis. The WSN has many
features such as architecture, algorithms, protocols, energy requirements, transceivers, data
storage, security, reputation and trust. Many research works are being carried out on these
features. However, there are not much literatures on the characterization of reputation and trust
which students, scientists and researchers can readily refer to for detail information.
In this paper, a methodology has been proposed to design a way of providing the needed
reference tool which will provide a faster search. The various categories of the reputation and
trust have been identified and catalogued into selected reference folders. A table has been created
which contains each category together with the corresponding number, abbreviation and
description. Referencing the table enables the appropriate folder to be identified. The
corresponding folder is then selected for information on the category of reputation and/or trust
required.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
140
2. REPUTATION AND TRUST
The characterization of reputation and trust-based systems depends on the two features since both
are dependent on each other. If a sensor node is trustworthy, then that node is expected to have a
good reputation. The method of initialization, observation and distribution in the network
produces different results. Initially, every node is considered trustworthy and each node trusts all
neighboring nodes. The reputation of every node either increases or decreases during the
observation period. Should the reputation decrease, then the node can be regarded as
untrustworthy and ignored as a malicious node. The initial reputation value of a node is neutral.
Based on the method of observation, there are three main categories of reputation and trust[1]:
1. Observation – observing neighboring nodes for reputation values
• Firsthand systems - depend on firsthand information and direct observation of nodes.
• Secondhand systems - depend on both direct observation and information provided by
neighboring nodes.
2. Information symmetry
• Symmetric – all the nodes in the network have access to the same information, using
the firsthand or secondhand method.
• Asymmetric – all the nodes in the network do not have access to identical information as
in the symmetric method.
3. Centralization
• Centralized - reputation and trust values of all nodes are maintained by one node.
• Distributed - each node maintains the reputation of neighboring nodes within the
transmission range.
• Local - all nodes maintain reputation and trust values of neighboring nodes, a method
used particularly in static WSNs.
• Global - each node has the reputation and trust values of all the other nodes in the
network for both static and mobile nodes.
Many systems now use both firsthand and second-hand systems to update reputation in WSNs.
However, it is important to avoid overhead and bottlenecks that may lead to the need for a large
memory to store reputation and trust values. Large memories are not part of the WSN
architecture.
2.1. Reputation
In social and behavioural science, reputation is defined as the opinion of one entity about another.
In wireless sensor networks, reputation is defined as a sensor node having the opinion that
neighbouring nodes will function as expected with reference to past performance.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
141
Figure 1. Characterization (Reputation)
With reference to Figure 1, reputation systems within a WSN can be characterized as
follows [2]:
• Symmetric systems: the nodes have access to both firsthand and secondhand information.
• Asymmetry systems: the nodes do not have access to firsthand information.
• Centralized systems: reputation is maintained by a single node.
• Distributed systems: each node maintains the reputation of neighboring nodes within the
transmission range.
• Type A flat reputation systems: the reputation values are calculated from the trust opinion
of the nodes. The opinion of each node has the same weight, whether true or false.
• Type B recursively weighting reputation systems: the reputation values are computed
iteratively. Consequently, new reputation values are calculated by using the old weighted
values from the previous iteration.
• Type C personalized reputation systems: trust anchors or roots are first selected, which
includes the sensor node making the reputation request. This is followed by the opinions
of other nodes from previous iterations. The procedure is repeated until all trustworthy
nodes in the network are included. The opinions of all untrustworthy nodes are ignored
as long as the selected opinions are accurate and trustworthy. Implementation of type C
for each node yields different reputation values for the same node [3].
2.2. Trust
In social and behavioural science, trust is defined as the feeling that somebody or something can
be relied upon or being sure about something even if there is no proof. In wireless sensor
networks, trust is defined as the belief that a sensor node is reliable, good and effective based on
the reputation of that node.
Trust can be characterized according to how it is implemented. With reference to Figure 2, trust
can either be subjective (node trust status at runtime) or objective (actual node trust status)
depending on the task being performed.
Trust can be quality of service (QoS) trust which is associated with energy, unselfishness,
competence, cooperativeness and reliability. Trust can be classified as computational and can be
defined as the trust relation among devices, computers, and networks. Trust can also be direct or
indirect. Direct trust deals with direct observations and refers to first hand information. Indirect
trust deals with indirect observation and refers to second hand information[4]. A general
characterization of trust is shown in Figure 2.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
142
Figure 2. Characterization (Trust) [4]
3. CHARACTERIZATION
Designing a scheme for characterization of reputation and trust begins with naming the categories
to help identify each class. Several classes have been identified as indicated in Table 1 . The
first column provides the category number. The second column indicates the abbreviation for the
third column, which provides the description of each category. A total of fourteen reputation and
trust categories were identified. This number equates to fourteen clearly labelled folders. After
identifying the categories, a filing system was designed that will group research papers based on
each category which allows for ease of reference. The reference filing system consists of
approximately fourteen (14) folders each labelled as indicated in Table 1. After inserting the
research papers containing the corresponding categories into the appropriate folders, the
following series of steps must be followed to obtain the required information for the specific
category:
• Refer to the table containing the numbering scheme, abbreviations and description of the
categories.
• Select the category by description.
• Note the abbreviation corresponding to the description.
• Select the folder number matching the abbreviation and description.
• Pull out the numbered folder and start the search for the information required.
Table 1. Categories and folders
Category Number Abbreviation Description
1 OBS Observation
2 IS Information Symmetry
3 CENT Centralization
4 FD Firsthand or Direct
5 SI Secondhand or Indirect
6 SUB Subjective
7 OBJ Objective
8 COMP Computational
9 COMM Communication
10 DT Data Trust
11 QOS Quality of Service
12 TA Type A Reputation System
13 TB Type B Reputation System
14 TC Type C Reputation System
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
143
For example in Figure 3, if you need information on subjective (SUB) classification of trust and
reputation, the steps previously referred to lead you to folder number 6. Select folder number 6
and then start the search for the information required in the enclosed papers.
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Categories Folders
Category Number Abbreviation Description
1 OBS Observation
2 IS Information Symmetry
3 CENT Centralization
4 FD Firsthand or Direct
5 SI Secondhand or Indirect
6 SUB Subjective
7 OBJ Objective
8 COMP Computational
9 COMM Communication
10 DT Data Trust
11 QOS Quality of Service
12 TA Type A Reputation System
13 TB Type B Reputation System
14 TC Type C Reputation System
Categories Table
Figure 3. Selection of reference folder
4. THE REFERENCE FILING SYSTEM
Sections 4.1. to 4.14. describe the contents of each folder.
4.1. OBS Observation folder
Folder number 1, the OBS observation folder, contains papers on observation of sensor nodes in
order to determine the reputation of those nodes [4]. V. Geetha and K. Chandrasekaran explain
that observation can also help build up trust in a wireless network [6]. Belief level can be user
defined trust that is based on direct or indirect observation of node behaviour. Considering that
nodes in a wireless sensor network are static, direct observation can be used.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
144
4.2. IS Information symmetry folder
The IS information symmetry folder contains papers based on information symmetry, which deals
with the way information on trust and reputation is accessed. Information symmetry is the
condition in which all relevant information is known to all nodes in a particular neighborhood.
Information asymmetry on the contrary means some nodes have more relevant information than
other nodes. Srinivasany et al. discuss the two modes of symmetry: symmetric and asymmetric
mode [1]. In the case of symmetric mode, the nodes can access the same information while with
asymmetric mode, the nodes have access to different information.
4.3. CENT Centralization folder
The centralization folder (CENT) consists of research papers that contain information on
centralization trust [1]. The centralization category consists of two models, mainly centralized
and distributed models. In the centralized mode, the reputation and trust values of all nodes are
maintained by one node while with the distributed mode, there are two additional modes: local
and global. In the case of the local mode, all the nodes maintain the reputation and trust values of
neighboring nodes for static WSNs. In the global mode, the nodes have the reputation and trust
values of all other nodes for both static and mobile WSNs.
4.4. FD Firsthand or direct folder
The FD folder contains papers on firsthand or direct trust. The firsthand system relies on
firsthand information and direct observation of the nodes [1]. Firsthand or direct information is
more valuable than secondhand information or indirect information. Relying on secondhand
information can introduce malicious nodes into the network [4].
4.5. SI Secondhand or indirect folder
This folder would contain papers on secondhand or indirect trust. Secondhand refers to
information obtained directly from neighboring nodes [4]. Secondhand information is not as
reliable as firsthand information. Wu et al. mention that to calculate the secondhand information,
the firsthand information is needed as well [7]. Firsthand information is more reliable than that of
the secondhand.
4.6. SUB Subjective folder
Papers on subjective trust can be found in the SUB folder. Subjective trust is generated as a result
of network protocol execution at runtime [4]. When no data transfer is taking place in the
network and all nodes are dormant (off or on standby), the trust of the nodes are objective. As
soon as a request for data is made by the execution of network protocols and the nodes are turned
on, the trust status of the nodes become subjective. R. Christhu et al. state that because of the
uncertainty and inaccurate input data that may be encountered in a network, fuzzy logic is used
for the evaluation of subjective trust [8].
4.7. OBJ Objective folder
All papers on objective trust would be found in the OBJ folder. Objective trust of a node is the
trust of a node when the node is dormant [4]. When the nodes in a network are asleep, idle or on
standby, then their trust is objective. As soon as a request is made to transmit data (network
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
145
protocol initiated), then the status changes from objective trust to subjective trust. According to
V. Reshmi and M. Sajitar, objective trust obtained globally from the probability model stochastic
petri nets (SPN) can be authenticated against the subjective trust derived from execution of the
trust management protocol [9].
4.8. COMP Computational folder
Computational trust issues could be referenced in the COMP folder. Computational trust is user
trust through cryptography (encryption of data), which is based on the authentication of nodes
through the use of authentication mechanisms including public key infrastructure (PKI) [4].
According to J. Sabater and C. Sierra, computational trust is used to ensure that an intelligent
agent (node) trusts another agent and is able to transfer some responsibilities or tasks (such as
information transfer) in a multi-agent environment [10].
4.9. COMM Communication folder
This folder would contain papers on communication trust. Geetha et al. believe that, among other
trust categories, trust also can be observed as communication trust [6]. The researches define
trust as Communication trust can be defined as the belief that nodes in a WSN can maintain
connectivity to allow for the transmission and reception of data from node to node virtually error-
free [6].
4.10. DT Data trust folder
All papers on data trust can be found in the DT folder. Data trust is calculated from sensed data
from sensor nodes [11]. Data trust must be considered together with communication trust in
order to obtain an accurate trust value. It is therefore inadequate to regard a node as trustworthy
only by considering data trust alone. For this reason, the Bayesian fusion algorithm is used in
combining the two trusts together to obtain an accurate trust value. Figure 4 illustrates the
computation of the true trust value from both the data trust and communication trust [11].
Communication Trust Data Trust
Direct Indirect Direct Indirect
Reputation
Trust Calculations
Trust Value
Figure 4. Extended trust computational model for WSNs [11]
4.11. QoS Quality of service folder
Papers on quality of service (QoS) trust can be located in the QoS folder. QoS trust is associated
with energy, unselfishness, competence, cooperativeness and reliability of sensor nodes [12],
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
146
[13]. Each node is normally powered by batteries. The energy level of the battery determines
how long the node will be operational before it reaches a thresh hold value. Beyond the thresh
hold value, the node will not be allowed to process data and will be blacklisted and isolated. The
unselfishness of a node implies being able to execute all tasks assigned to it without exceptions.
This means that a node must accept all information and forward the same to the intended
destination.
4.12. Type A Reputation system folder
Papers on type A flat reputation system are contained in the Type A folder. With type A flat
reputation systems, the reputation values are calculated from the trust opinion of the nodes [3].
The opinion of each node is regarded as equally weighted. Consequently, the final trust value is
influenced by the opinion of all the nodes, whether good or bad. Normally, the nodes have to
decide whether to express their opinion or not.
4.13. Type B Reputation system folder
The type B folder contains information on type B recursively weighting reputation systems. The
reputation values are calculated iteratively [3]. The calculated reputation value is improved by
increasing the opinion weights of the nodes with higher weights iteratively. The new reputation
values of the nodes are calculated from the weighted opinions of the other nodes that were used in
the previous iteration.
4.14. Type C Reputation system folder
Information in the Type C folder concerns the type C personalized reputation system. Trust roots
or anchors are first selected by the node. This selection of the anchors includes the trust requester
itself. Initially, the first selections are considered. The opinion of the other roots from
trustworthy nodes are then considered, following persistent iterations until final trustworthy nodes
are realized. The iteration continues until all trustworthy nodes are selected. The opinion of
untrustworthy nodes is ignored as long as the opinions of the trustworthy nodes are correct.
5. DATA ANALYSIS
The use of separate folders, each dealing with a single category, makes it easier to provide
thorough and in-depth information. The folders also provide a way of upgrading and extending
the contents as more research work is carried out on various categories. The information for the
categories was obtained from [12]. The following are the descriptions of each category:
5.1. Observation
For the observation category, reputation values are obtained by observing neighboring nodes [1].
The observation could be firsthand or secondhand. Node A observes node B over a period of time
and builds up a reputation of B. Similarly, node B will observe node A and build up a reputation
of A. Alternatively, node A obtains the reputation values from neighboring nodes. Reputation
allows nodes to develop confidence in each other so that their behavior in the processing of data
is as expected. Any deviation from expected behavior will result in the labeling of that node as a
malicious, compromised or faulty and information will no longer be accepted from that node or
sent to that node. The offending node will perform no tasks in the network.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
147
5.2. Information symmetry
With information symmetry, there are two types of methods to obtain reputation and trust values.
The first is the symmetric method, where all nodes obtain the same information from a central
point, for example from a cluster head. The second is the asymmetrical method, where all nodes
obtain different information from other nodes [1].
5.3. Centralization
The centralization category has two options, namely centralized or distributed [1]. With the
centralized option, reputation and trust values of all nodes are maintained by one node, while in
the case of distributed option, there is the local option where all nodes maintain reputation and
trust values of neighbouring nodes, a method used particularly in static WSNs. Also there is the
global option where each node has the reputation and trust values of all the other nodes in the
network for both static and mobile nodes.
5.4 Firsthand or direct trust
Firsthand or direct trust refers to firsthand information or direct observation of a node. The node
observes the neighbouring nodes over a period of time and builds up a firsthand trust table from
the results [1]. Firsthand trust is more reliable than secondhand trust which is discussed in section
5.5, since the calculated value is based on information obtained directly from neighbouring nodes.
5.5 Secondhand or indirect trust
Secondhand or indirect trust refers to information obtained from neighbouring nodes. In this
case, the node forwards a request to neighbouring nodes for the trust values needed. Again these
values are used to compute the secondhand trust and to build up the trust table created and
maintained at each node [1]. There is no guarantee that the trust values received from
neighbouring nodes are accurate.
5.6. Subjective trust
Subjective trust is the trust of a node during runtime of the network protocol [4]. While the
protocol is being executed and there is transfer of information from one node to the other, the
trust of the active node is subjective. As soon as the data transfer is completed and the node
becomes inactive, the trust reverts to objective trust. Subjective trust can also be the trust status
of a node in the "on" state.
5.7. Objective trust
Objective trust of a node is the actual trust when the node is inactive [4]. As already explained in
section 5.6, this is the status of an inactive node which is not transferring any information in the
network at that moment. A node which is in the "off", standby or idle state can be regarded as
having objective trust status.
5.8. Computational trust
Computational trust is user trust through cryptography (encryption of data), which is based on the
authentication of nodes through the use of authentication mechanisms including public key
infrastructure [4]. The information being transferred from node to node is encrypted to stop
malicious hackers from either corrupting or retrieving the information.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
148
5.9. Communication trust
With regards to communication trust, the transmission of information in a network occurs
whether communication has occurred or not [8]. The nodes in the network send whatever
information is received without ensuring that communication links to the intended destination can
relay the information. Good communication links will transmit the entire message and bad links
will drop some data packets, resulting in corrupted messages at the base station. A retransmission
of the message will then be required.
5.10. Data trust
Data trust is a value which depends on the maliciousness, cooperation and competence of a
node [15]. When a message is received by a node in the network, it is expected that the node will
send the same unaltered message to other nodes in the network. The metric for this trust is
referred to as data trust. It is a measure of how trustworthy is the node in handling data without
any distortion.
5.11. Quality of service trust
Quality of service (QoS) trust is associated with energy, transmission delay, error rate, bandwidth,
throughput, competence, cooperativeness and reliability of sensor nodes [12]. The node must
have sufficient power supply (energy) to complete transmissions of all messages. Congestion of
data in the network must be avoided to minimize delays and dropping of data packets as a result.
Bandwidth depends on the data rate within the network. Reliability depends on meantime to
failure or repair, meantime between failures and packet/cell loss rate.
5.12. Type A, B and C Reputation systems
In the case of type A reputation system, the reputation values are calculated from the trust opinion
of the nodes. The opinion of each node has the same effect, whether true or false [3]. With Type
B reputation system, the reputation values are computed iteratively. Consequently, new
reputation values are calculated from the previous weighted values obtained through iteration [3],
[14]. With regards to Type C reputation system, trust reference values are first selected, which
includes the sensor node making the reputation request. This is followed by the opinions of other
nodes from previous iterations. The procedure is repeated until all trustworthy nodes in the
network are included. The opinions of all untrustworthy nodes are ignored as long as the selected
opinions are accurate and trustworthy [3], [5].
6. STRUCTURE OF THE CHARACTERIZATION OF REPUTATION AND TRUST
The overall structure of the characterization of reputation and trust is illustrated in Figure 5. From
the categories table, the description of the trust or reputation is used to obtain the folders from
which the research papers containing the trust or reputation information can be found. The
categories table is divided into three columns: description, abbreviation and category number.
The categories folders section contains fourteen folders, each folder corresponding to the number
indicated in the categories table. After identifying the category to search for, the number leads to
the exact folder containing the documents on the category selected.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
149
Figure 5. Structure of the Characterization of Reputation and Trust
7. CONCLUSION
Reputation and trust are very important features in the wireless sensor network research field. The
security of a wireless sensor network is the main concern for those employing WSNs to collect
and analyze data at various locations, both on land and under water. Most research papers merely
devote a small portion of their findings to this subject. For our research, we have therefore
devoted the entire work on the study of various categories of reputation and trust which we
believe will enable scientists, researchers and students to have an easier way of accessing
information on the various categories of reputation and trust. Having data on reputation and trust
will help in designing a network with the best and accurate reputation and trust values so that
users will have much needed security in the collection of accurate data in the locations being
monitored. The method used in the study will definitely provide a much faster way of obtaining
information on the categories of trust to improve deadlines in any design work.
Most of the methods used by authors to explain how to obtain reputation and trust were not
identical. However, the methods produced the outcomes expected. It is important to remember
that reputation and trust of nodes are obtained firstly by observing the behavior of these nodes for
a period of time and then, secondly to generate the metrics or parameters which are then used in
computations to obtain the trust values. The results, which are the reputation and trust of the
sensor nodes, are then tabulated in tables held by each node. Each category of trust is unique due
to their properties. However it is worth noting that some of these categories are linked and in
some cases one could be in opposition to the other, depending on which trust value is being
applied to the node under consideration.
Future Work
More information needs to be extracted from other sources and inserted in the appropriate folders
for ease of reference. Compiling information in the folders would be an ongoing process that will
continue to supplement the research work being carried out on WSNs globally. We propose that
whoever will carry out research on characterization of reputation and trust can obtain an
introduction to the subject by referring to the folders for information. This study can be expanded
in the following areas:
• Peer-to-Peer (P2P) networks.
• Mobile Ad-Hoc Networks (MANETs).
• Vehicular Ad-Hoc Networks (VANETs).
• Other Wired and Wireless Networks.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
150
ACKNOWLEDGEMENTS
The authors would like to express their appreciation to those who contributed in any way to the
success of the work.
REFERENCES
[1] A. Srinivasany and J. Wu, Reputation and Trust-based Systems for Ad Hoc and Sensor Networks,
Doctoral Dissertation, Florida Atlantic University Boca Raton, FL, USA, pp. 1 - 36, ACM 2008.Lee,
S.hyun. & Kim Mi Na, (2008).
[2] A. Gutscher, A Trust Model for an Open, Decentralized Reputation System, Proceedings of the Joint
iTrust and PST Conferences on Privacy Trust Management and Security (IFIPTM 2007), pp. 285–
300, 2007.
[3] A. Gutscher, J. Heesen and O. Siemoneit, Possibilities and Limitations of Modelling Trust and
Reputation, Proc. WSPI, pp. 1 - 12, IEEE 2008.
[4] V. Umarani and K. Sundaram, Survey of Various Trust Models and Their Behaviour in Wireless
Sensor Networks, International Journal of Emerging Technology and Advanced Engineering,
Volume 3, Issue 10, pp. 180 - 188, 2013.
[5] A. Jøsang and R. Ismail, The Beta Reputation System, Co-operative Research Centre for Enterprise
Distributed Systems Technology (DSTC), Australian Federal Government’s CRC Program
(Department of Industry, Science & Resources), pp. 1 - 14, 2002.
[6] V. Geetha and K. Chandrasekaran, A Distributed Trust Based Secure Communication Framework for
Wireless Sensor Network, Wireless Sensor Network, Vol. 6, pp. 173-183, 2014.
[7] G. Wu, Z. Liu, L. Yao, Z. Xu and W. Wang, A Fuzzy-based Trust Management in WSNs, Journal of
Internet Services and Information Security, Vol. 3, No. 3/4, pp. 124 - 135, 2013.
[8] R. Christhu, G. Kumar, K. Kartheek, A Survey on Detecting Selfish Nodes in Wireless Sensor
Networks Using Different Trust Methodologies, International Journal of Engineering and Advanced
Technology, Vol. 2, Issue 3, pp. 197 - 200, 2013.
[9] V. Reshmi and M. Sajitar, A Survey on Trust Management in Wireless Sensor Networks,
International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 5, No. 2, pp.
104 - 109, 2014.
[10] J. Sabater and C. Sierra, Review on Computational Trust and Reputation Models, Kluwer Academic
Publishers, pp.1 - 28, 2005.
[11] Md. Momani, S. Challa and R. Alhmouz, Bayesian Fusion Algorithm for Inferring Trust in Wireless
Sensor Networks, Journal of Networks, Vol. 5, No. 7, pp. 815 - 822, 2010.
[12] V. Rani and K. Sundaram, Review of Trust Models in Wireless Sensor Networks, International
Journal of Computer, Control, Quantum and Information Engineering, Vol. 8, No. 2, pp. 361 - 367,
2014.
[13] F. Bao, R. Chen, M. Chang and Jin-Hee Cho, Hierarchical Trust Management for Wireless Sensor
Networks and Its Application to Trust-Based Routing, SAC’11, March 21-25, pp. 1732 - 1738, ACM
2011.
[14] S. Kamvar, M. Schlosser and H. Molina, The Eigen Trust Algorithm for Reputation Management in
P2P Networks, Proceedings of the 12th International Conference on World Wide Web, pp. 640 - 651,
ACM 2003.
[15] A. Tajeddine, A. Kayssi, A. Chehab, I. Elhajj and W. Itani, CENTERA: A Centralized Trust-Based
Efficient Routing Protocol with Authentication for Wireless Sensor Networks, Sensors 2015, pp. 3300
- 3333, 2015.
Authors
Mohammad Abdus Salam is an Associate Professor in the Department of Computer
Science at Southern University, Baton Rouge, Louisiana. He received his BS degree in
Electrical and Electronics Engineering from Bangladesh Institute of Technology, Rajshahi
in 1991 and MS and Ph.D. degrees from Fukui University, Japan, in 1998 and 2001
respectively. Prior to 2005, he worked as an adjunct member of Mathematics and Computer
Science at the City University of New York at New York College and as a post-doctorate fellow in the
Department of Electrical and Computer Engineering at the University of South Alabama, Mobile, Alabama.
He is a senior member of IEEE. His research interests include wireless communication, error control
coding and sensor networks
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
151
Alfred Sarkodee-Adoo earned a Master of Science degree in Computer Science in 2015
at Southern University, Baton Rouge, Louisiana. He completed his BS degree in
Electrical and Electronic Engineering at University of Nottingham, Nottingham, United
Kingdom in 1971. He worked for the Telecommunications Corporation, as Installations
and Maintenance Engineer in Ghana, and also worked for the Volta River Authority as
Power Transmission Systems Protection and Control Engineer in Ghana. He is a member
of the IEEE.

More Related Content

What's hot

A novel and innovative method for designing of rf mems devices
A novel and innovative method for designing of rf mems devicesA novel and innovative method for designing of rf mems devices
A novel and innovative method for designing of rf mems deviceseSAT Journals
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Pvrtechnologies Nellore
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Ensure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay NetworksEnsure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay NetworksEditor IJCATR
 
A novel incremental clustering for information extraction from social networks
A novel incremental clustering for information extraction from social networksA novel incremental clustering for information extraction from social networks
A novel incremental clustering for information extraction from social networkseSAT Journals
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd Iaetsd
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peerSnehith
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
 
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc NetworksRouting and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Editor IJARCET
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...IJCNCJournal
 
New Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection SystemNew Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection Systemijsrd.com
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc NetworksA Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networksdrsrinivasanvenkataramani
 
A Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSNA Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSNIRJET Journal
 
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...IRJET Journal
 
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
 

What's hot (18)

A novel and innovative method for designing of rf mems devices
A novel and innovative method for designing of rf mems devicesA novel and innovative method for designing of rf mems devices
A novel and innovative method for designing of rf mems devices
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Ensure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay NetworksEnsure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay Networks
 
A novel incremental clustering for information extraction from social networks
A novel incremental clustering for information extraction from social networksA novel incremental clustering for information extraction from social networks
A novel incremental clustering for information extraction from social networks
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peer
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
 
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc NetworksRouting and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
 
New Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection SystemNew Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection System
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc NetworksA Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
 
A Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSNA Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSN
 
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
 
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...
 

Viewers also liked

ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSIJCNCJournal
 
A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...
A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...
A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...ijmvsc
 
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...IJCNCJournal
 
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSTCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSIJCNCJournal
 
Performance improvement by
Performance improvement byPerformance improvement by
Performance improvement byIJCNCJournal
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
Application of compressed sampling
Application of compressed samplingApplication of compressed sampling
Application of compressed samplingIJCNCJournal
 
ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...
ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...
ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...ijmvsc
 
VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...
VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...
VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...ijmvsc
 
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...IJCNCJournal
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLIJCNCJournal
 
Coding openflow enable network
Coding openflow enable networkCoding openflow enable network
Coding openflow enable networkIJCNCJournal
 
Inventory Models Involving Lead Time Crashing Cost as an Exponential Function
Inventory Models Involving Lead Time Crashing Cost as an Exponential FunctionInventory Models Involving Lead Time Crashing Cost as an Exponential Function
Inventory Models Involving Lead Time Crashing Cost as an Exponential Functionijmvsc
 
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...IJCNCJournal
 
THE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPS
THE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPSTHE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPS
THE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPSijmvsc
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework forIJCNCJournal
 
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERYIMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERYIJCNCJournal
 
Value Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case Study
Value Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case StudyValue Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case Study
Value Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case Studyijmvsc
 
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHMPERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHMIJCNCJournal
 

Viewers also liked (19)

ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
 
A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...
A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...
A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...
 
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
 
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSTCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
 
Performance improvement by
Performance improvement byPerformance improvement by
Performance improvement by
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
Application of compressed sampling
Application of compressed samplingApplication of compressed sampling
Application of compressed sampling
 
ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...
ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...
ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...
 
VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...
VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...
VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...
 
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
 
Coding openflow enable network
Coding openflow enable networkCoding openflow enable network
Coding openflow enable network
 
Inventory Models Involving Lead Time Crashing Cost as an Exponential Function
Inventory Models Involving Lead Time Crashing Cost as an Exponential FunctionInventory Models Involving Lead Time Crashing Cost as an Exponential Function
Inventory Models Involving Lead Time Crashing Cost as an Exponential Function
 
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
 
THE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPS
THE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPSTHE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPS
THE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPS
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework for
 
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERYIMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
 
Value Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case Study
Value Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case StudyValue Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case Study
Value Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case Study
 
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHMPERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
 

Similar to Referencing tool for reputation and

An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksPvrtechnologies Nellore
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...IDES Editor
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...cseij
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...CSEIJJournal
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
 
BNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingBNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingIRJET Journal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...graphhoc
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkijwscjournal
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
 
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...paperpublications3
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manetIAEME Publication
 

Similar to Referencing tool for reputation and (20)

An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
BNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingBNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid Computing
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p network
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
 
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
 
A017320105
A017320105A017320105
A017320105
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manet
 

More from IJCNCJournal

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 

More from IJCNCJournal (20)

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

Referencing tool for reputation and

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 DOI : 10.5121/ijcnc.2015.7410 139 REFERENCING TOOL FOR REPUTATION AND TRUST IN WIRELESS SENSOR NETWORKS Mohammad Abdus Salam1 and Alfred Sarkodee-Adoo2 1 Department of Computer Science, Southern University, Baton Rouge, Louisiana, USA 2 Department of Electronics Engineering Technology, Southern University Baton Rouge, Louisiana, USA ABSTRACT Presently, there are not many literatures on the characterization of reputation and trust in wireless sensor networks (WSNs) which can be referenced by scientists, researchers and students. Although some research documents include information on reputation and trust, characterization of these features are not adequately covered. In this paper, reputation and trust are divided into various classes or categories and a method of referencing the information is provided. This method used results in providing researchers with a tool that makes it easier to reference these features on reputation and trust in a much easier way than if referencing has to be directed to several uncoordinated resources. Although the outcome of this work proves beneficial to research in the characterization of reputation and trust in WSNs, more work needs to be done in extending the benefits to other network systems. KEYWORDS Characterization , Reputation, Trust, Nodes, Wireless Sensor Networks. 1. INTRODUCTION A wireless sensor network (WSN) consists of low cost, low energy sensors, identified as nodes in a WSN, which are scattered in an area on land or under water for the purpose of gathering information on specific events for transmission to a base station for analysis. The WSN has many features such as architecture, algorithms, protocols, energy requirements, transceivers, data storage, security, reputation and trust. Many research works are being carried out on these features. However, there are not much literatures on the characterization of reputation and trust which students, scientists and researchers can readily refer to for detail information. In this paper, a methodology has been proposed to design a way of providing the needed reference tool which will provide a faster search. The various categories of the reputation and trust have been identified and catalogued into selected reference folders. A table has been created which contains each category together with the corresponding number, abbreviation and description. Referencing the table enables the appropriate folder to be identified. The corresponding folder is then selected for information on the category of reputation and/or trust required.
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 140 2. REPUTATION AND TRUST The characterization of reputation and trust-based systems depends on the two features since both are dependent on each other. If a sensor node is trustworthy, then that node is expected to have a good reputation. The method of initialization, observation and distribution in the network produces different results. Initially, every node is considered trustworthy and each node trusts all neighboring nodes. The reputation of every node either increases or decreases during the observation period. Should the reputation decrease, then the node can be regarded as untrustworthy and ignored as a malicious node. The initial reputation value of a node is neutral. Based on the method of observation, there are three main categories of reputation and trust[1]: 1. Observation – observing neighboring nodes for reputation values • Firsthand systems - depend on firsthand information and direct observation of nodes. • Secondhand systems - depend on both direct observation and information provided by neighboring nodes. 2. Information symmetry • Symmetric – all the nodes in the network have access to the same information, using the firsthand or secondhand method. • Asymmetric – all the nodes in the network do not have access to identical information as in the symmetric method. 3. Centralization • Centralized - reputation and trust values of all nodes are maintained by one node. • Distributed - each node maintains the reputation of neighboring nodes within the transmission range. • Local - all nodes maintain reputation and trust values of neighboring nodes, a method used particularly in static WSNs. • Global - each node has the reputation and trust values of all the other nodes in the network for both static and mobile nodes. Many systems now use both firsthand and second-hand systems to update reputation in WSNs. However, it is important to avoid overhead and bottlenecks that may lead to the need for a large memory to store reputation and trust values. Large memories are not part of the WSN architecture. 2.1. Reputation In social and behavioural science, reputation is defined as the opinion of one entity about another. In wireless sensor networks, reputation is defined as a sensor node having the opinion that neighbouring nodes will function as expected with reference to past performance.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 141 Figure 1. Characterization (Reputation) With reference to Figure 1, reputation systems within a WSN can be characterized as follows [2]: • Symmetric systems: the nodes have access to both firsthand and secondhand information. • Asymmetry systems: the nodes do not have access to firsthand information. • Centralized systems: reputation is maintained by a single node. • Distributed systems: each node maintains the reputation of neighboring nodes within the transmission range. • Type A flat reputation systems: the reputation values are calculated from the trust opinion of the nodes. The opinion of each node has the same weight, whether true or false. • Type B recursively weighting reputation systems: the reputation values are computed iteratively. Consequently, new reputation values are calculated by using the old weighted values from the previous iteration. • Type C personalized reputation systems: trust anchors or roots are first selected, which includes the sensor node making the reputation request. This is followed by the opinions of other nodes from previous iterations. The procedure is repeated until all trustworthy nodes in the network are included. The opinions of all untrustworthy nodes are ignored as long as the selected opinions are accurate and trustworthy. Implementation of type C for each node yields different reputation values for the same node [3]. 2.2. Trust In social and behavioural science, trust is defined as the feeling that somebody or something can be relied upon or being sure about something even if there is no proof. In wireless sensor networks, trust is defined as the belief that a sensor node is reliable, good and effective based on the reputation of that node. Trust can be characterized according to how it is implemented. With reference to Figure 2, trust can either be subjective (node trust status at runtime) or objective (actual node trust status) depending on the task being performed. Trust can be quality of service (QoS) trust which is associated with energy, unselfishness, competence, cooperativeness and reliability. Trust can be classified as computational and can be defined as the trust relation among devices, computers, and networks. Trust can also be direct or indirect. Direct trust deals with direct observations and refers to first hand information. Indirect trust deals with indirect observation and refers to second hand information[4]. A general characterization of trust is shown in Figure 2.
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 142 Figure 2. Characterization (Trust) [4] 3. CHARACTERIZATION Designing a scheme for characterization of reputation and trust begins with naming the categories to help identify each class. Several classes have been identified as indicated in Table 1 . The first column provides the category number. The second column indicates the abbreviation for the third column, which provides the description of each category. A total of fourteen reputation and trust categories were identified. This number equates to fourteen clearly labelled folders. After identifying the categories, a filing system was designed that will group research papers based on each category which allows for ease of reference. The reference filing system consists of approximately fourteen (14) folders each labelled as indicated in Table 1. After inserting the research papers containing the corresponding categories into the appropriate folders, the following series of steps must be followed to obtain the required information for the specific category: • Refer to the table containing the numbering scheme, abbreviations and description of the categories. • Select the category by description. • Note the abbreviation corresponding to the description. • Select the folder number matching the abbreviation and description. • Pull out the numbered folder and start the search for the information required. Table 1. Categories and folders Category Number Abbreviation Description 1 OBS Observation 2 IS Information Symmetry 3 CENT Centralization 4 FD Firsthand or Direct 5 SI Secondhand or Indirect 6 SUB Subjective 7 OBJ Objective 8 COMP Computational 9 COMM Communication 10 DT Data Trust 11 QOS Quality of Service 12 TA Type A Reputation System 13 TB Type B Reputation System 14 TC Type C Reputation System
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 143 For example in Figure 3, if you need information on subjective (SUB) classification of trust and reputation, the steps previously referred to lead you to folder number 6. Select folder number 6 and then start the search for the information required in the enclosed papers. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Categories Folders Category Number Abbreviation Description 1 OBS Observation 2 IS Information Symmetry 3 CENT Centralization 4 FD Firsthand or Direct 5 SI Secondhand or Indirect 6 SUB Subjective 7 OBJ Objective 8 COMP Computational 9 COMM Communication 10 DT Data Trust 11 QOS Quality of Service 12 TA Type A Reputation System 13 TB Type B Reputation System 14 TC Type C Reputation System Categories Table Figure 3. Selection of reference folder 4. THE REFERENCE FILING SYSTEM Sections 4.1. to 4.14. describe the contents of each folder. 4.1. OBS Observation folder Folder number 1, the OBS observation folder, contains papers on observation of sensor nodes in order to determine the reputation of those nodes [4]. V. Geetha and K. Chandrasekaran explain that observation can also help build up trust in a wireless network [6]. Belief level can be user defined trust that is based on direct or indirect observation of node behaviour. Considering that nodes in a wireless sensor network are static, direct observation can be used.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 144 4.2. IS Information symmetry folder The IS information symmetry folder contains papers based on information symmetry, which deals with the way information on trust and reputation is accessed. Information symmetry is the condition in which all relevant information is known to all nodes in a particular neighborhood. Information asymmetry on the contrary means some nodes have more relevant information than other nodes. Srinivasany et al. discuss the two modes of symmetry: symmetric and asymmetric mode [1]. In the case of symmetric mode, the nodes can access the same information while with asymmetric mode, the nodes have access to different information. 4.3. CENT Centralization folder The centralization folder (CENT) consists of research papers that contain information on centralization trust [1]. The centralization category consists of two models, mainly centralized and distributed models. In the centralized mode, the reputation and trust values of all nodes are maintained by one node while with the distributed mode, there are two additional modes: local and global. In the case of the local mode, all the nodes maintain the reputation and trust values of neighboring nodes for static WSNs. In the global mode, the nodes have the reputation and trust values of all other nodes for both static and mobile WSNs. 4.4. FD Firsthand or direct folder The FD folder contains papers on firsthand or direct trust. The firsthand system relies on firsthand information and direct observation of the nodes [1]. Firsthand or direct information is more valuable than secondhand information or indirect information. Relying on secondhand information can introduce malicious nodes into the network [4]. 4.5. SI Secondhand or indirect folder This folder would contain papers on secondhand or indirect trust. Secondhand refers to information obtained directly from neighboring nodes [4]. Secondhand information is not as reliable as firsthand information. Wu et al. mention that to calculate the secondhand information, the firsthand information is needed as well [7]. Firsthand information is more reliable than that of the secondhand. 4.6. SUB Subjective folder Papers on subjective trust can be found in the SUB folder. Subjective trust is generated as a result of network protocol execution at runtime [4]. When no data transfer is taking place in the network and all nodes are dormant (off or on standby), the trust of the nodes are objective. As soon as a request for data is made by the execution of network protocols and the nodes are turned on, the trust status of the nodes become subjective. R. Christhu et al. state that because of the uncertainty and inaccurate input data that may be encountered in a network, fuzzy logic is used for the evaluation of subjective trust [8]. 4.7. OBJ Objective folder All papers on objective trust would be found in the OBJ folder. Objective trust of a node is the trust of a node when the node is dormant [4]. When the nodes in a network are asleep, idle or on standby, then their trust is objective. As soon as a request is made to transmit data (network
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 145 protocol initiated), then the status changes from objective trust to subjective trust. According to V. Reshmi and M. Sajitar, objective trust obtained globally from the probability model stochastic petri nets (SPN) can be authenticated against the subjective trust derived from execution of the trust management protocol [9]. 4.8. COMP Computational folder Computational trust issues could be referenced in the COMP folder. Computational trust is user trust through cryptography (encryption of data), which is based on the authentication of nodes through the use of authentication mechanisms including public key infrastructure (PKI) [4]. According to J. Sabater and C. Sierra, computational trust is used to ensure that an intelligent agent (node) trusts another agent and is able to transfer some responsibilities or tasks (such as information transfer) in a multi-agent environment [10]. 4.9. COMM Communication folder This folder would contain papers on communication trust. Geetha et al. believe that, among other trust categories, trust also can be observed as communication trust [6]. The researches define trust as Communication trust can be defined as the belief that nodes in a WSN can maintain connectivity to allow for the transmission and reception of data from node to node virtually error- free [6]. 4.10. DT Data trust folder All papers on data trust can be found in the DT folder. Data trust is calculated from sensed data from sensor nodes [11]. Data trust must be considered together with communication trust in order to obtain an accurate trust value. It is therefore inadequate to regard a node as trustworthy only by considering data trust alone. For this reason, the Bayesian fusion algorithm is used in combining the two trusts together to obtain an accurate trust value. Figure 4 illustrates the computation of the true trust value from both the data trust and communication trust [11]. Communication Trust Data Trust Direct Indirect Direct Indirect Reputation Trust Calculations Trust Value Figure 4. Extended trust computational model for WSNs [11] 4.11. QoS Quality of service folder Papers on quality of service (QoS) trust can be located in the QoS folder. QoS trust is associated with energy, unselfishness, competence, cooperativeness and reliability of sensor nodes [12],
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 146 [13]. Each node is normally powered by batteries. The energy level of the battery determines how long the node will be operational before it reaches a thresh hold value. Beyond the thresh hold value, the node will not be allowed to process data and will be blacklisted and isolated. The unselfishness of a node implies being able to execute all tasks assigned to it without exceptions. This means that a node must accept all information and forward the same to the intended destination. 4.12. Type A Reputation system folder Papers on type A flat reputation system are contained in the Type A folder. With type A flat reputation systems, the reputation values are calculated from the trust opinion of the nodes [3]. The opinion of each node is regarded as equally weighted. Consequently, the final trust value is influenced by the opinion of all the nodes, whether good or bad. Normally, the nodes have to decide whether to express their opinion or not. 4.13. Type B Reputation system folder The type B folder contains information on type B recursively weighting reputation systems. The reputation values are calculated iteratively [3]. The calculated reputation value is improved by increasing the opinion weights of the nodes with higher weights iteratively. The new reputation values of the nodes are calculated from the weighted opinions of the other nodes that were used in the previous iteration. 4.14. Type C Reputation system folder Information in the Type C folder concerns the type C personalized reputation system. Trust roots or anchors are first selected by the node. This selection of the anchors includes the trust requester itself. Initially, the first selections are considered. The opinion of the other roots from trustworthy nodes are then considered, following persistent iterations until final trustworthy nodes are realized. The iteration continues until all trustworthy nodes are selected. The opinion of untrustworthy nodes is ignored as long as the opinions of the trustworthy nodes are correct. 5. DATA ANALYSIS The use of separate folders, each dealing with a single category, makes it easier to provide thorough and in-depth information. The folders also provide a way of upgrading and extending the contents as more research work is carried out on various categories. The information for the categories was obtained from [12]. The following are the descriptions of each category: 5.1. Observation For the observation category, reputation values are obtained by observing neighboring nodes [1]. The observation could be firsthand or secondhand. Node A observes node B over a period of time and builds up a reputation of B. Similarly, node B will observe node A and build up a reputation of A. Alternatively, node A obtains the reputation values from neighboring nodes. Reputation allows nodes to develop confidence in each other so that their behavior in the processing of data is as expected. Any deviation from expected behavior will result in the labeling of that node as a malicious, compromised or faulty and information will no longer be accepted from that node or sent to that node. The offending node will perform no tasks in the network.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 147 5.2. Information symmetry With information symmetry, there are two types of methods to obtain reputation and trust values. The first is the symmetric method, where all nodes obtain the same information from a central point, for example from a cluster head. The second is the asymmetrical method, where all nodes obtain different information from other nodes [1]. 5.3. Centralization The centralization category has two options, namely centralized or distributed [1]. With the centralized option, reputation and trust values of all nodes are maintained by one node, while in the case of distributed option, there is the local option where all nodes maintain reputation and trust values of neighbouring nodes, a method used particularly in static WSNs. Also there is the global option where each node has the reputation and trust values of all the other nodes in the network for both static and mobile nodes. 5.4 Firsthand or direct trust Firsthand or direct trust refers to firsthand information or direct observation of a node. The node observes the neighbouring nodes over a period of time and builds up a firsthand trust table from the results [1]. Firsthand trust is more reliable than secondhand trust which is discussed in section 5.5, since the calculated value is based on information obtained directly from neighbouring nodes. 5.5 Secondhand or indirect trust Secondhand or indirect trust refers to information obtained from neighbouring nodes. In this case, the node forwards a request to neighbouring nodes for the trust values needed. Again these values are used to compute the secondhand trust and to build up the trust table created and maintained at each node [1]. There is no guarantee that the trust values received from neighbouring nodes are accurate. 5.6. Subjective trust Subjective trust is the trust of a node during runtime of the network protocol [4]. While the protocol is being executed and there is transfer of information from one node to the other, the trust of the active node is subjective. As soon as the data transfer is completed and the node becomes inactive, the trust reverts to objective trust. Subjective trust can also be the trust status of a node in the "on" state. 5.7. Objective trust Objective trust of a node is the actual trust when the node is inactive [4]. As already explained in section 5.6, this is the status of an inactive node which is not transferring any information in the network at that moment. A node which is in the "off", standby or idle state can be regarded as having objective trust status. 5.8. Computational trust Computational trust is user trust through cryptography (encryption of data), which is based on the authentication of nodes through the use of authentication mechanisms including public key infrastructure [4]. The information being transferred from node to node is encrypted to stop malicious hackers from either corrupting or retrieving the information.
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 148 5.9. Communication trust With regards to communication trust, the transmission of information in a network occurs whether communication has occurred or not [8]. The nodes in the network send whatever information is received without ensuring that communication links to the intended destination can relay the information. Good communication links will transmit the entire message and bad links will drop some data packets, resulting in corrupted messages at the base station. A retransmission of the message will then be required. 5.10. Data trust Data trust is a value which depends on the maliciousness, cooperation and competence of a node [15]. When a message is received by a node in the network, it is expected that the node will send the same unaltered message to other nodes in the network. The metric for this trust is referred to as data trust. It is a measure of how trustworthy is the node in handling data without any distortion. 5.11. Quality of service trust Quality of service (QoS) trust is associated with energy, transmission delay, error rate, bandwidth, throughput, competence, cooperativeness and reliability of sensor nodes [12]. The node must have sufficient power supply (energy) to complete transmissions of all messages. Congestion of data in the network must be avoided to minimize delays and dropping of data packets as a result. Bandwidth depends on the data rate within the network. Reliability depends on meantime to failure or repair, meantime between failures and packet/cell loss rate. 5.12. Type A, B and C Reputation systems In the case of type A reputation system, the reputation values are calculated from the trust opinion of the nodes. The opinion of each node has the same effect, whether true or false [3]. With Type B reputation system, the reputation values are computed iteratively. Consequently, new reputation values are calculated from the previous weighted values obtained through iteration [3], [14]. With regards to Type C reputation system, trust reference values are first selected, which includes the sensor node making the reputation request. This is followed by the opinions of other nodes from previous iterations. The procedure is repeated until all trustworthy nodes in the network are included. The opinions of all untrustworthy nodes are ignored as long as the selected opinions are accurate and trustworthy [3], [5]. 6. STRUCTURE OF THE CHARACTERIZATION OF REPUTATION AND TRUST The overall structure of the characterization of reputation and trust is illustrated in Figure 5. From the categories table, the description of the trust or reputation is used to obtain the folders from which the research papers containing the trust or reputation information can be found. The categories table is divided into three columns: description, abbreviation and category number. The categories folders section contains fourteen folders, each folder corresponding to the number indicated in the categories table. After identifying the category to search for, the number leads to the exact folder containing the documents on the category selected.
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 149 Figure 5. Structure of the Characterization of Reputation and Trust 7. CONCLUSION Reputation and trust are very important features in the wireless sensor network research field. The security of a wireless sensor network is the main concern for those employing WSNs to collect and analyze data at various locations, both on land and under water. Most research papers merely devote a small portion of their findings to this subject. For our research, we have therefore devoted the entire work on the study of various categories of reputation and trust which we believe will enable scientists, researchers and students to have an easier way of accessing information on the various categories of reputation and trust. Having data on reputation and trust will help in designing a network with the best and accurate reputation and trust values so that users will have much needed security in the collection of accurate data in the locations being monitored. The method used in the study will definitely provide a much faster way of obtaining information on the categories of trust to improve deadlines in any design work. Most of the methods used by authors to explain how to obtain reputation and trust were not identical. However, the methods produced the outcomes expected. It is important to remember that reputation and trust of nodes are obtained firstly by observing the behavior of these nodes for a period of time and then, secondly to generate the metrics or parameters which are then used in computations to obtain the trust values. The results, which are the reputation and trust of the sensor nodes, are then tabulated in tables held by each node. Each category of trust is unique due to their properties. However it is worth noting that some of these categories are linked and in some cases one could be in opposition to the other, depending on which trust value is being applied to the node under consideration. Future Work More information needs to be extracted from other sources and inserted in the appropriate folders for ease of reference. Compiling information in the folders would be an ongoing process that will continue to supplement the research work being carried out on WSNs globally. We propose that whoever will carry out research on characterization of reputation and trust can obtain an introduction to the subject by referring to the folders for information. This study can be expanded in the following areas: • Peer-to-Peer (P2P) networks. • Mobile Ad-Hoc Networks (MANETs). • Vehicular Ad-Hoc Networks (VANETs). • Other Wired and Wireless Networks.
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 150 ACKNOWLEDGEMENTS The authors would like to express their appreciation to those who contributed in any way to the success of the work. REFERENCES [1] A. Srinivasany and J. Wu, Reputation and Trust-based Systems for Ad Hoc and Sensor Networks, Doctoral Dissertation, Florida Atlantic University Boca Raton, FL, USA, pp. 1 - 36, ACM 2008.Lee, S.hyun. & Kim Mi Na, (2008). [2] A. Gutscher, A Trust Model for an Open, Decentralized Reputation System, Proceedings of the Joint iTrust and PST Conferences on Privacy Trust Management and Security (IFIPTM 2007), pp. 285– 300, 2007. [3] A. Gutscher, J. Heesen and O. Siemoneit, Possibilities and Limitations of Modelling Trust and Reputation, Proc. WSPI, pp. 1 - 12, IEEE 2008. [4] V. Umarani and K. Sundaram, Survey of Various Trust Models and Their Behaviour in Wireless Sensor Networks, International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 10, pp. 180 - 188, 2013. [5] A. Jøsang and R. Ismail, The Beta Reputation System, Co-operative Research Centre for Enterprise Distributed Systems Technology (DSTC), Australian Federal Government’s CRC Program (Department of Industry, Science & Resources), pp. 1 - 14, 2002. [6] V. Geetha and K. Chandrasekaran, A Distributed Trust Based Secure Communication Framework for Wireless Sensor Network, Wireless Sensor Network, Vol. 6, pp. 173-183, 2014. [7] G. Wu, Z. Liu, L. Yao, Z. Xu and W. Wang, A Fuzzy-based Trust Management in WSNs, Journal of Internet Services and Information Security, Vol. 3, No. 3/4, pp. 124 - 135, 2013. [8] R. Christhu, G. Kumar, K. Kartheek, A Survey on Detecting Selfish Nodes in Wireless Sensor Networks Using Different Trust Methodologies, International Journal of Engineering and Advanced Technology, Vol. 2, Issue 3, pp. 197 - 200, 2013. [9] V. Reshmi and M. Sajitar, A Survey on Trust Management in Wireless Sensor Networks, International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 5, No. 2, pp. 104 - 109, 2014. [10] J. Sabater and C. Sierra, Review on Computational Trust and Reputation Models, Kluwer Academic Publishers, pp.1 - 28, 2005. [11] Md. Momani, S. Challa and R. Alhmouz, Bayesian Fusion Algorithm for Inferring Trust in Wireless Sensor Networks, Journal of Networks, Vol. 5, No. 7, pp. 815 - 822, 2010. [12] V. Rani and K. Sundaram, Review of Trust Models in Wireless Sensor Networks, International Journal of Computer, Control, Quantum and Information Engineering, Vol. 8, No. 2, pp. 361 - 367, 2014. [13] F. Bao, R. Chen, M. Chang and Jin-Hee Cho, Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing, SAC’11, March 21-25, pp. 1732 - 1738, ACM 2011. [14] S. Kamvar, M. Schlosser and H. Molina, The Eigen Trust Algorithm for Reputation Management in P2P Networks, Proceedings of the 12th International Conference on World Wide Web, pp. 640 - 651, ACM 2003. [15] A. Tajeddine, A. Kayssi, A. Chehab, I. Elhajj and W. Itani, CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks, Sensors 2015, pp. 3300 - 3333, 2015. Authors Mohammad Abdus Salam is an Associate Professor in the Department of Computer Science at Southern University, Baton Rouge, Louisiana. He received his BS degree in Electrical and Electronics Engineering from Bangladesh Institute of Technology, Rajshahi in 1991 and MS and Ph.D. degrees from Fukui University, Japan, in 1998 and 2001 respectively. Prior to 2005, he worked as an adjunct member of Mathematics and Computer Science at the City University of New York at New York College and as a post-doctorate fellow in the Department of Electrical and Computer Engineering at the University of South Alabama, Mobile, Alabama. He is a senior member of IEEE. His research interests include wireless communication, error control coding and sensor networks
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 151 Alfred Sarkodee-Adoo earned a Master of Science degree in Computer Science in 2015 at Southern University, Baton Rouge, Louisiana. He completed his BS degree in Electrical and Electronic Engineering at University of Nottingham, Nottingham, United Kingdom in 1971. He worked for the Telecommunications Corporation, as Installations and Maintenance Engineer in Ghana, and also worked for the Volta River Authority as Power Transmission Systems Protection and Control Engineer in Ghana. He is a member of the IEEE.