Most of the peers accessing the services are under the assumption that the service accessed in a P2P network is utmost secured. By means of prevailing hard security mechanisms, security goals like authentication, authorization, privacy, non repudiation of services and other hard security issues are resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and reputation models in P2P network regarding service provisioning is presented and challenges are listed. Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,
An exaustive survey of trust models in p2 p networkijwscjournal
Most of the peers accessing the services are under the assumption that the service accessed in a P2P
network is utmost secured. By means of prevailing hard security mechanisms, security goals like
authentication, authorization, privacy, non repudiation of services and other hard security issues are
resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and
reputation models in P2P network regarding service provisioning is presented and challenges are listed.
Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction
outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,
The reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed in the literature as a mechanism to filter out the misbehaving nodes while searching for a packet delivery route. However, building a trust model that relies on the recommendations from other nodes in the network is vulnerable to the possible dishonest behaviour, such as bad-mouthing, ballot-stuffing, and collusion, of the recommending nodes. This paper investigates the problems of attacks posed by misbehaving nodes while propagating recommendations in the existing trust models. We propose a recommendation-based trust model with a defence scheme that utilises clustering technique to dynamically filter attacks related to dishonest recommendations within certain time based on number of interactions, compatibility of information and node closeness. The model is empirically tested in several mobile and disconnected topologies in which nodes experience changes in their neighbourhoods and consequently face frequent route changes. The empirical analysis demonstrates robustness and accuracy of the trust model in a dynamic MANET environment
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTIONIJCNCJournal
This paper introduces the Beta distribution as a novel technique to weight direct and indirect trust and
assessing the risk in wireless sensor networks. This paper also reviews the trust factors, which play a major
role in building trust in wireless sensor networks and explains the dynamic aspects of trust. This is an
extension of a previous work done by the authors using a new approach to assess risk. Simulation results
related to the previous work and to the new approach introduced in this paper are also presented for easy
comparison
A computational dynamic trust model for user authorizationKamal Spring
Development of authorization mechanisms for secure information access by a large community of users in an open environment is an important problem in the ever-growing Internet world. In this paper we propose a computational dynamic trust model for user authorization, rooted in findings from social science. Unlike most existing computational trust models, this model distinguishes trusting belief in integrity from that in competence in different contexts and accounts for subjectivity in the evaluation of a particular trustee by different trusters. Simulation studies were conducted to compare the performance of the proposed integrity belief model with other trust models from the literature for different user behavior patterns. Experiments show that the proposed model achieves higher performance than other models especially in predicting the behavior of unstable users.
Abstract
Mobile ad-hoc network (MANET) is one of the most propitious area in research and development of wireless network. Popularity
of mobile device and wireless networks significantly increased over the past years. MANET has no centralized control to handle
the network, so this may cause to fails the functioning. This characteristic force a component node to be careful when
communicating with other nodes as the behavior of nodes change with time and environmental conditions, so the security issues
may arise like impersonation etc. Therefore behavior of node should consider improving the security of MANET. This is mostly
important in big network where heterogeneous nodes are the parts of network for e.g. tactical and social network. The behavior of
node is shown in the form of numerical value called as trust. Trust is calculated and aggregated and shared among network.
Every node’s generated trust is on the basis of serious study, others node opinion, and previous interaction and their own policy.
In this report, we have analyzed different proposed trust based mechanism and trust evaluation based security solution. These
techniques are proposed to make trust security solutions more effective.
Keywords: Manet, Trust, Smrti, Maturity-Based Model, Rep, Truism
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTIJNSA Journal
The emerging trend of using mobile agents for mobile adhoc network (MANET) applications intensifies the need for protecting them. Here we propose a distributed trust based framework to protect both the agents and the host platforms (running at the nodes) especially against threats of the underlying environment where agents may get killed or rerouted by visiting hosts. The best way to defend against this situation is to prevent both the hosts and agents from communicating with the malicious ones. In this regard this paper develops a distributed reputation model of MANET using concepts from DempsterShafer theory. The agents (deployed for some purposes like ervice discovery) while roaming in the networkwork collaboratively with the hosts they visit to form a consistent trust view of MANET. An agent may exchange information about suspected nodes with a visiting host. To speed up convergence, information about an unknown node can be solicited from trusted neighborhood. Thus an inactive node, without deploying agents may also get a partial view of the network. The agents can use combination of encryption and digital signature to provide privacy and authentication services. Node mobility and the effect of environmental noise are considered. The results show the robustness of our proposed scheme even in bigger networks.
An exaustive survey of trust models in p2 p networkijwscjournal
Most of the peers accessing the services are under the assumption that the service accessed in a P2P
network is utmost secured. By means of prevailing hard security mechanisms, security goals like
authentication, authorization, privacy, non repudiation of services and other hard security issues are
resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and
reputation models in P2P network regarding service provisioning is presented and challenges are listed.
Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction
outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,
The reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed in the literature as a mechanism to filter out the misbehaving nodes while searching for a packet delivery route. However, building a trust model that relies on the recommendations from other nodes in the network is vulnerable to the possible dishonest behaviour, such as bad-mouthing, ballot-stuffing, and collusion, of the recommending nodes. This paper investigates the problems of attacks posed by misbehaving nodes while propagating recommendations in the existing trust models. We propose a recommendation-based trust model with a defence scheme that utilises clustering technique to dynamically filter attacks related to dishonest recommendations within certain time based on number of interactions, compatibility of information and node closeness. The model is empirically tested in several mobile and disconnected topologies in which nodes experience changes in their neighbourhoods and consequently face frequent route changes. The empirical analysis demonstrates robustness and accuracy of the trust model in a dynamic MANET environment
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTIONIJCNCJournal
This paper introduces the Beta distribution as a novel technique to weight direct and indirect trust and
assessing the risk in wireless sensor networks. This paper also reviews the trust factors, which play a major
role in building trust in wireless sensor networks and explains the dynamic aspects of trust. This is an
extension of a previous work done by the authors using a new approach to assess risk. Simulation results
related to the previous work and to the new approach introduced in this paper are also presented for easy
comparison
A computational dynamic trust model for user authorizationKamal Spring
Development of authorization mechanisms for secure information access by a large community of users in an open environment is an important problem in the ever-growing Internet world. In this paper we propose a computational dynamic trust model for user authorization, rooted in findings from social science. Unlike most existing computational trust models, this model distinguishes trusting belief in integrity from that in competence in different contexts and accounts for subjectivity in the evaluation of a particular trustee by different trusters. Simulation studies were conducted to compare the performance of the proposed integrity belief model with other trust models from the literature for different user behavior patterns. Experiments show that the proposed model achieves higher performance than other models especially in predicting the behavior of unstable users.
Abstract
Mobile ad-hoc network (MANET) is one of the most propitious area in research and development of wireless network. Popularity
of mobile device and wireless networks significantly increased over the past years. MANET has no centralized control to handle
the network, so this may cause to fails the functioning. This characteristic force a component node to be careful when
communicating with other nodes as the behavior of nodes change with time and environmental conditions, so the security issues
may arise like impersonation etc. Therefore behavior of node should consider improving the security of MANET. This is mostly
important in big network where heterogeneous nodes are the parts of network for e.g. tactical and social network. The behavior of
node is shown in the form of numerical value called as trust. Trust is calculated and aggregated and shared among network.
Every node’s generated trust is on the basis of serious study, others node opinion, and previous interaction and their own policy.
In this report, we have analyzed different proposed trust based mechanism and trust evaluation based security solution. These
techniques are proposed to make trust security solutions more effective.
Keywords: Manet, Trust, Smrti, Maturity-Based Model, Rep, Truism
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTIJNSA Journal
The emerging trend of using mobile agents for mobile adhoc network (MANET) applications intensifies the need for protecting them. Here we propose a distributed trust based framework to protect both the agents and the host platforms (running at the nodes) especially against threats of the underlying environment where agents may get killed or rerouted by visiting hosts. The best way to defend against this situation is to prevent both the hosts and agents from communicating with the malicious ones. In this regard this paper develops a distributed reputation model of MANET using concepts from DempsterShafer theory. The agents (deployed for some purposes like ervice discovery) while roaming in the networkwork collaboratively with the hosts they visit to form a consistent trust view of MANET. An agent may exchange information about suspected nodes with a visiting host. To speed up convergence, information about an unknown node can be solicited from trusted neighborhood. Thus an inactive node, without deploying agents may also get a partial view of the network. The agents can use combination of encryption and digital signature to provide privacy and authentication services. Node mobility and the effect of environmental noise are considered. The results show the robustness of our proposed scheme even in bigger networks.
Among different online attacks obstructing IT security,
Denial of Service (DoS) and Distributed Denial of Service (DDoS)
are the most devastating attack. It also put the security experts under
enormous pressure recently in finding efficient defiance methods.
DoS attack can be performed variously with diverse codes and tools
and can be launched form different OSI model layers. This paper
describes in details DoS and DDoS attack, and explains how different
types of attacks can be implemented and launched from different OSI
model layers. It provides a better understanding of these increasing
occurrences in order to improve
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...rahulmonikasharma
Delay Tolerant Networks (DTNs) have established the connection to source and destination. For example this often faces disconnection and unreliable wireless connections. A delay tolerant network (DTNs) provides a network imposes disruption or delay. The delay tolerant networks operate in limited resources such as memory size, central processing unit. Trust management protocol uses a dynamic threshold updating which overcomes the problems .The dynamic threshold update reduces the false detection probability of the malicious nodes. The system proposes a secure routing management schemes to adopt information security principles successfully. It analyzes the basic security principles and operations for trust authentication which is applicable in delay tolerant networks (DTNs).For security the proposed system identifies the store and forward approach in network communications and analyzes the routing in cases like selfish contact and collaboration contact methods. The proposed method identifies ZRP protocol scheme and it enhances the scheme using methods namely distributed operation, mobility, delay analysis, security association and trust modules. This security scheme analyzes the performance analysis and proposed algorithm based on parameter time, authentication, security, and secure routing. From this analysis, this research work identifies the issues in DTNs secure routing and enhances ZRP (Zone Routing Protocol) by suggesting an authentication principle as a noted security principle for extremely information security concepts.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETieijjournal
Mobile Ad-hoc Networks or MANETs are mostly found in situations where any fixed facilities are just not available. MANET provides some fundamental responsibilities such as routing, packet forwarding communication and network management etc over self structured network. This specially affects the energy, bandwidth and memory computation requirements. Providing trust in MANET is an additional
critical task because of lack of centralized infrastructure. Since during the deployment of MANET nodes that are fresh continue returning and aged ones go from the cluster/network, there is demand for maintaining the record also to provide appropriate certification for the arriving node(s) that are fresh as well as the present node(s) in the network. But due to various types of intrusion threats and attacks it is hard to fully scrutinize any new node so as to allow only safe nodes to get connected with the existing safe system. In a cluster of large size these trusted node(s) will likely be communicating together, all the while
allowing or disallowing entry/communication of the compromised node(s) or trusted model to continue to
maintain a stable, secured, trustworthy group of movable nodes. All the reported techniques have been systematically categorized and their strong and weak points have been discussed.
An explicit trust model towards better system securitycsandit
Trust is an absolute necessity for digital communications; but is often viewed as an implicit
singular entity. The use of the internet as the primary vehicle for information exchange has
made accountability and verifiability of system code almost obsolete. This paper proposes a
novel approach towards enforcing system security by requiring the explicit definition of trust for
all operating code. By identifying the various classes and levels of trust required within a
computing system; trust is defined as a combination of individual characteristics. Trust is then
represented as a calculable metric obtained through the collective enforcement of each of these
characteristics to varying degrees. System Security is achieved by facilitating trust to be a
constantly evolving aspect for each operating code segment capable of getting stronger or
weaker over time.
Abstract: We present an online deliberation system using mutual evaluation in order to col- laboratively develop solutions. Participants submit their proposals and evaluate each other's proposals; some of them may then be invited by the system to rewrite "problematic" proposals. Two cases are discussed: a proposal supported by many, but not by a given person, who is then invited to rewrite it for making yet more acceptable; and a poorly presented but presumably interesting proposal. The first of these cases has been successfully implemented. Proposals are evalu- ated along two axes—understandability (or clarity, or, more generally, quality), and agreement. The latter is used by the system to cluster proposals according to their ideas, while the former is used both to present the best proposals on top of their clusters, and to find poorly written proposals candidates for rewriting. These functionalities may be considered as important components of a large scale online deliberation system.
Presently, there are not many literatures on the characterization of reputation and trust in wireless sensor
networks (WSNs) which can be referenced by scientists, researchers and students. Although some research documents include information on reputation and trust, characterization of these features are not adequately covered. In this paper, reputation and trust are divided into various classes or categories and a method of referencing the information is provided. This method used results in providing researchers with a tool that makes it easier to reference these features on reputation and trust in a much easier way than if
referencing has to be directed to several uncoordinated resources. Although the outcome of this work proves beneficial to research in the characterization of reputation and trust in WSNs, more work needs to be done in extending the benefits to other network systems.
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICINGIJNSA Journal
Modelling resource allocation problems in the form of non-cooperative pricing games takes into account the difference between how much a given performance metric is valued and how much is paid for it. For the convergence of the sum of all users’ payoff to a global maximum, the determination of the utility function is essential. Although supermodularity conditions have been previously defined and determined to obtain suitable utility functions, different utilities have significantly varying performance characteristics under similar network parameters. In an ad-hoc framework, absence of a central authority leads to uncontrollability of unfairness. Users could misbehave by broadcasting high price coefficients to force other users to transmit at a lower power. This paper proposes an adaptation of the Asynchronous Distributed Pricing Algorithm with a Deviation Detection Block that re-aligns the deviated system back into the algorithm.
Trustworthy Service Enhancement in Mobile Social Networkijsrd.com
Mobile Social Network is network which allows mobile users to discover and interact with existing and potential friends. A Trustworthy Service Evaluation (TSE) system is a system that enables users to share service reviews in Service oriented mobile social networks (S-MSNs). Each service provider should independently maintain a TSE for itself that collects and stores users’ reviews about its services without requiring any third trusted authority. These service reviews can be made available to interested users to make service selection decisions. In this three unique service review attacks are identified, i.e., link ability, rejection, and modification attacks, and then develop security mechanisms for the TSE to deal with these attacks. In this we extend the bTSE(basic TSE) to a Sybil-resisted TSE (SrTSE) which enable the detection of two typical sybil attacks. In SrTSE if a user generates multiple reviews toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user will be revealed. Hence a Trustworthy Service in Mobile Social Network is introduces so that users can access services securely.
Automatic vs. human question answering over multimedia meeting recordingsLê Anh
Information access in meeting recordings can be assisted by
meeting browsers, or can be fully automated following a
question-answering (QA) approach. An information access task
is defined, aiming at discriminating true vs. false parallel statements
about facts in meetings. An automatic QA algorithm is
applied to this task, using passage retrieval over a meeting transcript.
The algorithm scores 59% accuracy for passage retrieval,
while random guessing is below 1%, but only scores 60% on
combined retrieval and question discrimination, for which humans
reach 70%–80% and the baseline is 50%. The algorithm
clearly outperforms humans for speed, at less than 1 second
per question, vs. 1.5–2 minutes per question for humans. The
degradation on ASR compared to manual transcripts still yields
lower but acceptable scores, especially for passage identification.
Automatic QA thus appears to be a promising enhancement
to meeting browsers used by humans, as an assistant for
relevant passage identification.
Privacy preserving distributed profile matching in proximity-based mobile soc...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a
defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into
the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion
detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the attempts to
compromise VMs, thus preventing zombie VMs. NICE includes two main phases: deploy a lightweight mirroring-based network
intrusion detection agent (NICE-A) on each cloud server to capture and analyze cloud traffic. A NICE-A periodically scans the virtual
system vulnerabilities within a cloud server to establish Scenario Attack Graph (SAGs), and then based on the severity of identified
vulnerability toward the collaborative attack goals, NICE will decide whether or not to put a VM in network inspection state. Once a
VM enters inspection state, Deep Packet Inspection (DPI) is applied, and/or virtual network reconfigurations can be deployed to the
inspecting VM to make the potential attack behaviors prominent.
Developing a trust model using graph and ranking trust of social messaging s...IJECEIAES
Trust is an important issue in social interactions, especially in using cyberspace services. In this paper, a trust and evaluation model are proposed based on which the government can provide reliable services to users. The model is a distributed and hierarchical model. First, the number 12 trust criteria and the weight of these criteria were extracted using the analytical hierarchy process (AHP) and analytic network process (ANP) techniques. Second, to obtain the trust in the service examined, for each criterion, a graph of trusted entities is proposed. Then, a weighted graph with the number of trusted entities called trust pathways measure will be obtained. To test the model, the effect of the 12 criteria on three important evaluation factors over seven widely used social services was rated by three experts. The trust of each service was obtained, which was satisfactory as compared to a valid organizational evaluation. Finally, the correlation coefficient of this comparison was 70.37%, indicating that the results from this model were appropriate.
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
In grid computing, trust has massive significance. There is lot of research to propose various models in providing trusted resource sharing mechanisms. The trust is a belief or perception that various researchers have tried to correlate with some computational model. Trust on any entity can be direct or indirect. Direct trust is the impact of either first impression over the entity or acquired during some direct interaction. Indirect trust is the trust may be due to either reputation gained or recommendations received from various recommenders of a particular domain in a grid or any other domain outside that grid or outside that grid itself. Unfortunately, malicious indirect trust leads to the misuse of valuable resources of the grid. This paper proposes the mechanism of identifying and purging the untrustworthy recommendations in the grid environment. Through the obtained results, we show the way of purging of untrustworthy entities.
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGijp2p
Peer-to-Peer (P2P) systems have the ability to bond with millions of clients in business and knowledge
scenario. The mechanism that leads users to distribute files without the need of centralized servers has
achieved wide recognition among internet users. This also permits for a range of applications further than
simple file sharing. he main problem lies in the fact that peers have to customarily intermingle with
mysterious peers in the absence of trusted third parties. Usually the lack of incentives often makes these
strange peers to act as freeriders and thus reduce the system performance. The trustworthiness among
peers is portrayed by applying the knowledge obtained as a result of reputation mechanisms. This paper
endows with a new reputation model in association with a detailed survey of diverse reputation models. The
proposed model suggests a hybrid reputation model through dynamic regrouping..
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
Among different online attacks obstructing IT security,
Denial of Service (DoS) and Distributed Denial of Service (DDoS)
are the most devastating attack. It also put the security experts under
enormous pressure recently in finding efficient defiance methods.
DoS attack can be performed variously with diverse codes and tools
and can be launched form different OSI model layers. This paper
describes in details DoS and DDoS attack, and explains how different
types of attacks can be implemented and launched from different OSI
model layers. It provides a better understanding of these increasing
occurrences in order to improve
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...rahulmonikasharma
Delay Tolerant Networks (DTNs) have established the connection to source and destination. For example this often faces disconnection and unreliable wireless connections. A delay tolerant network (DTNs) provides a network imposes disruption or delay. The delay tolerant networks operate in limited resources such as memory size, central processing unit. Trust management protocol uses a dynamic threshold updating which overcomes the problems .The dynamic threshold update reduces the false detection probability of the malicious nodes. The system proposes a secure routing management schemes to adopt information security principles successfully. It analyzes the basic security principles and operations for trust authentication which is applicable in delay tolerant networks (DTNs).For security the proposed system identifies the store and forward approach in network communications and analyzes the routing in cases like selfish contact and collaboration contact methods. The proposed method identifies ZRP protocol scheme and it enhances the scheme using methods namely distributed operation, mobility, delay analysis, security association and trust modules. This security scheme analyzes the performance analysis and proposed algorithm based on parameter time, authentication, security, and secure routing. From this analysis, this research work identifies the issues in DTNs secure routing and enhances ZRP (Zone Routing Protocol) by suggesting an authentication principle as a noted security principle for extremely information security concepts.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETieijjournal
Mobile Ad-hoc Networks or MANETs are mostly found in situations where any fixed facilities are just not available. MANET provides some fundamental responsibilities such as routing, packet forwarding communication and network management etc over self structured network. This specially affects the energy, bandwidth and memory computation requirements. Providing trust in MANET is an additional
critical task because of lack of centralized infrastructure. Since during the deployment of MANET nodes that are fresh continue returning and aged ones go from the cluster/network, there is demand for maintaining the record also to provide appropriate certification for the arriving node(s) that are fresh as well as the present node(s) in the network. But due to various types of intrusion threats and attacks it is hard to fully scrutinize any new node so as to allow only safe nodes to get connected with the existing safe system. In a cluster of large size these trusted node(s) will likely be communicating together, all the while
allowing or disallowing entry/communication of the compromised node(s) or trusted model to continue to
maintain a stable, secured, trustworthy group of movable nodes. All the reported techniques have been systematically categorized and their strong and weak points have been discussed.
An explicit trust model towards better system securitycsandit
Trust is an absolute necessity for digital communications; but is often viewed as an implicit
singular entity. The use of the internet as the primary vehicle for information exchange has
made accountability and verifiability of system code almost obsolete. This paper proposes a
novel approach towards enforcing system security by requiring the explicit definition of trust for
all operating code. By identifying the various classes and levels of trust required within a
computing system; trust is defined as a combination of individual characteristics. Trust is then
represented as a calculable metric obtained through the collective enforcement of each of these
characteristics to varying degrees. System Security is achieved by facilitating trust to be a
constantly evolving aspect for each operating code segment capable of getting stronger or
weaker over time.
Abstract: We present an online deliberation system using mutual evaluation in order to col- laboratively develop solutions. Participants submit their proposals and evaluate each other's proposals; some of them may then be invited by the system to rewrite "problematic" proposals. Two cases are discussed: a proposal supported by many, but not by a given person, who is then invited to rewrite it for making yet more acceptable; and a poorly presented but presumably interesting proposal. The first of these cases has been successfully implemented. Proposals are evalu- ated along two axes—understandability (or clarity, or, more generally, quality), and agreement. The latter is used by the system to cluster proposals according to their ideas, while the former is used both to present the best proposals on top of their clusters, and to find poorly written proposals candidates for rewriting. These functionalities may be considered as important components of a large scale online deliberation system.
Presently, there are not many literatures on the characterization of reputation and trust in wireless sensor
networks (WSNs) which can be referenced by scientists, researchers and students. Although some research documents include information on reputation and trust, characterization of these features are not adequately covered. In this paper, reputation and trust are divided into various classes or categories and a method of referencing the information is provided. This method used results in providing researchers with a tool that makes it easier to reference these features on reputation and trust in a much easier way than if
referencing has to be directed to several uncoordinated resources. Although the outcome of this work proves beneficial to research in the characterization of reputation and trust in WSNs, more work needs to be done in extending the benefits to other network systems.
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICINGIJNSA Journal
Modelling resource allocation problems in the form of non-cooperative pricing games takes into account the difference between how much a given performance metric is valued and how much is paid for it. For the convergence of the sum of all users’ payoff to a global maximum, the determination of the utility function is essential. Although supermodularity conditions have been previously defined and determined to obtain suitable utility functions, different utilities have significantly varying performance characteristics under similar network parameters. In an ad-hoc framework, absence of a central authority leads to uncontrollability of unfairness. Users could misbehave by broadcasting high price coefficients to force other users to transmit at a lower power. This paper proposes an adaptation of the Asynchronous Distributed Pricing Algorithm with a Deviation Detection Block that re-aligns the deviated system back into the algorithm.
Trustworthy Service Enhancement in Mobile Social Networkijsrd.com
Mobile Social Network is network which allows mobile users to discover and interact with existing and potential friends. A Trustworthy Service Evaluation (TSE) system is a system that enables users to share service reviews in Service oriented mobile social networks (S-MSNs). Each service provider should independently maintain a TSE for itself that collects and stores users’ reviews about its services without requiring any third trusted authority. These service reviews can be made available to interested users to make service selection decisions. In this three unique service review attacks are identified, i.e., link ability, rejection, and modification attacks, and then develop security mechanisms for the TSE to deal with these attacks. In this we extend the bTSE(basic TSE) to a Sybil-resisted TSE (SrTSE) which enable the detection of two typical sybil attacks. In SrTSE if a user generates multiple reviews toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user will be revealed. Hence a Trustworthy Service in Mobile Social Network is introduces so that users can access services securely.
Automatic vs. human question answering over multimedia meeting recordingsLê Anh
Information access in meeting recordings can be assisted by
meeting browsers, or can be fully automated following a
question-answering (QA) approach. An information access task
is defined, aiming at discriminating true vs. false parallel statements
about facts in meetings. An automatic QA algorithm is
applied to this task, using passage retrieval over a meeting transcript.
The algorithm scores 59% accuracy for passage retrieval,
while random guessing is below 1%, but only scores 60% on
combined retrieval and question discrimination, for which humans
reach 70%–80% and the baseline is 50%. The algorithm
clearly outperforms humans for speed, at less than 1 second
per question, vs. 1.5–2 minutes per question for humans. The
degradation on ASR compared to manual transcripts still yields
lower but acceptable scores, especially for passage identification.
Automatic QA thus appears to be a promising enhancement
to meeting browsers used by humans, as an assistant for
relevant passage identification.
Privacy preserving distributed profile matching in proximity-based mobile soc...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a
defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into
the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion
detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the attempts to
compromise VMs, thus preventing zombie VMs. NICE includes two main phases: deploy a lightweight mirroring-based network
intrusion detection agent (NICE-A) on each cloud server to capture and analyze cloud traffic. A NICE-A periodically scans the virtual
system vulnerabilities within a cloud server to establish Scenario Attack Graph (SAGs), and then based on the severity of identified
vulnerability toward the collaborative attack goals, NICE will decide whether or not to put a VM in network inspection state. Once a
VM enters inspection state, Deep Packet Inspection (DPI) is applied, and/or virtual network reconfigurations can be deployed to the
inspecting VM to make the potential attack behaviors prominent.
Developing a trust model using graph and ranking trust of social messaging s...IJECEIAES
Trust is an important issue in social interactions, especially in using cyberspace services. In this paper, a trust and evaluation model are proposed based on which the government can provide reliable services to users. The model is a distributed and hierarchical model. First, the number 12 trust criteria and the weight of these criteria were extracted using the analytical hierarchy process (AHP) and analytic network process (ANP) techniques. Second, to obtain the trust in the service examined, for each criterion, a graph of trusted entities is proposed. Then, a weighted graph with the number of trusted entities called trust pathways measure will be obtained. To test the model, the effect of the 12 criteria on three important evaluation factors over seven widely used social services was rated by three experts. The trust of each service was obtained, which was satisfactory as compared to a valid organizational evaluation. Finally, the correlation coefficient of this comparison was 70.37%, indicating that the results from this model were appropriate.
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
In grid computing, trust has massive significance. There is lot of research to propose various models in providing trusted resource sharing mechanisms. The trust is a belief or perception that various researchers have tried to correlate with some computational model. Trust on any entity can be direct or indirect. Direct trust is the impact of either first impression over the entity or acquired during some direct interaction. Indirect trust is the trust may be due to either reputation gained or recommendations received from various recommenders of a particular domain in a grid or any other domain outside that grid or outside that grid itself. Unfortunately, malicious indirect trust leads to the misuse of valuable resources of the grid. This paper proposes the mechanism of identifying and purging the untrustworthy recommendations in the grid environment. Through the obtained results, we show the way of purging of untrustworthy entities.
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGijp2p
Peer-to-Peer (P2P) systems have the ability to bond with millions of clients in business and knowledge
scenario. The mechanism that leads users to distribute files without the need of centralized servers has
achieved wide recognition among internet users. This also permits for a range of applications further than
simple file sharing. he main problem lies in the fact that peers have to customarily intermingle with
mysterious peers in the absence of trusted third parties. Usually the lack of incentives often makes these
strange peers to act as freeriders and thus reduce the system performance. The trustworthiness among
peers is portrayed by applying the knowledge obtained as a result of reputation mechanisms. This paper
endows with a new reputation model in association with a detailed survey of diverse reputation models. The
proposed model suggests a hybrid reputation model through dynamic regrouping..
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
Providing security in Mobile Ad Hoc Network is crucial problem due to its open shared wireless medium,
multi-hop and dynamic nature, constrained resources, lack of administration and cooperation.
Traditionally routing protocols are designed to cope with routing operation but in practice they may be
affected by misbehaving nodes so that they try to disturb the normal routing operations by launching
different attacks with the intention to minimize or collapse the overall network performance. Therefore
detecting a trusted node means ensuring authentication and securing routing can be expected. In this
article we have proposed a Trust and Q-learning based Security (TQS) model to detect the misbehaving
nodes over Ad Hoc On Demand Distance-Vector (AODV) routing protocol. Here we avoid the misbehaving
nodes by calculating an aggregated reward, based on the Q-learning mechanism by using their historical
forwarding and responding behaviour by the way misbehaving nodes can be isolated.
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
Providing security in Mobile Ad Hoc Network is crucial problem due to its open shared wireless medium, multi-hop and dynamic nature, constrained resources, lack of administration and cooperation. Traditionally routing protocols are designed to cope with routing operation but in practice they may be affected by misbehaving nodes so that they try to disturb the normal routing operations by launching different attacks with the intention to minimize or collapse the overall network performance. Therefore detecting a trusted node means ensuring authentication and securing routing can be expected. In this article we have proposed a Trust and Q-learning based Security (TQS) model to detect the misbehaving nodes over Ad Hoc On Demand Distance-Vector (AODV) routing protocol. Here we avoid the misbehaving nodes by calculating an aggregated reward, based on the Q-learning mechanism by using their historical forwarding and responding behaviour by the way misbehaving nodes can be isolated.
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksIJNSA Journal
In peer-to-peer content distribution the lack of a central authority makes authentication difficult. Without authentication, adversary nodes can spoof identity and falsify messages in the overlay. This enables malicious nodes to launch man-in-the-middle or denial-of-service attacks. In this paper, we present a trust based content distribution for peer-to-peer overlay networks, which is built on the trust management scheme. The main concept is, before sending or accepting the traffic, the trust of the peer must be validated. Based on the success of data delivery and searching time, we calculate the trust index of a node. Then the aggregated trust index of the peers whose value is below the threshold value is considered as distrusted and the corresponding traffic is blocked. By simulation results we show that our proposed scheme achieves increased success ratio with reduced delay and drop.
Trust models for Grid security environment – Authentication and Authorization methods – Grid security infrastructure – Cloud Infrastructure security: network, host and application level – aspects of data security, provider data and its security, Identity and access management architecture, IAM practices in the cloud, SaaS, PaaS, IaaS availability in the cloud, Key privacy issues in the cloud.
Analyzing and Surveying Trust In Cloud Computing Environmentiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESIAEME Publication
A mobile ad hoc network (MANET) is a self-organized system comprised by multiple mobile wireless nodes. Due to the openness in network topology and the absence of centralized administration in management, MANET is vulnerable to attacks from malicious nodes. In order to reduce the hazards from these malicious nodes, we incorporate the concept of trust into the MANET, and build a subjective trust management model with multiple decision factors based on the analytic hierarchy process (AHP) theory and the fuzzy logic rules prediction method ˉ AFStrust. We consider multiple decision factors, including direct trust, recommendation trust, incentive function and active degree, in our model to reflect trust relationship’s complexity and uncertainty from various aspects. It overcomes the shortage of traditional method, where the decision factors are incomplete. Moreover, the weight of classification is set up by AHP for these decision factors, which makes the model has a better rationality and a higher practicability. Compared to the existing trust management models, comprehensive experiments have been conducted to evaluate the efficiency of our trust management model in the improvement of network interaction quality, trust dynamic adaptability, malicious node identification, attack resistance and enhancements of system’s security.
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESIAEME Publication
A mobile ad hoc network (MANET) is a self-organized system comprised by multiple mobile wireless nodes. Due to the openness in network topology and the absence of centralized administration in management, MANET is vulnerable to attacks from malicious nodes. In order to reduce the hazards from these malicious nodes, we incorporate the concept of trust into the MANET, and build a subjective trust management model with multiple decision factors based on the analytic hierarchy process (AHP) theory and the fuzzy logic rules prediction method ˉ AFStrust. We consider multiple decision factors, including direct trust, recommendation trust, incentive function and active degree, in our model to reflect trust relationship’s complexity and uncertainty from various aspects. It overcomes the shortage of traditional method, where the decision factors are incomplete. Moreover, the weight of classification is set up by AHP for these decision factors, which makes the model has a better rationality and a higher practicability. Compared to the existing trust management models, comprehensive experiments have been conducted to evaluate the efficiency of our trust management model in the improvement of network interaction quality, trust dynamic adaptability, malicious node identification, attack resistance and enhancements of system’s security
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Similar to AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK (20)
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
1. International Journal on Web Service Computing (IJWSC), Vol.5, No.3, September 2014
DOI : 10.5121/ijwsc.2014.5301 1
AN EXAUSTIVE SURVEY OF TRUST
MODELS IN P2P NETWORK
S. Udhaya Shree1
and Dr. M. S. Saleem Basha2
1
Department of Computer Applications, Rajiv Gandhi College of Engineering and
Technology, Puducherry, India
2
Department of Computer Science, Mazoon University College, Oman
ABSTRACT
Most of the peers accessing the services are under the assumption that the service accessed in a P2P
network is utmost secured. By means of prevailing hard security mechanisms, security goals like
authentication, authorization, privacy, non repudiation of services and other hard security issues are
resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and
reputation models in P2P network regarding service provisioning is presented and challenges are listed.
Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction
outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,
KEYWORDS
Hard Security, Soft security, trust, bootstrapping, malicious
1. INTRODUCTION
In PEER-TO-PEER (P2P) systems peers collaborate knowingly or unknowingly with other peers
in the network for the sake of accomplishing the tasks. Hence there exist a large scale security
threat for P2P systems. Security is a term that is being renowned by the research community
and to narrow down the focus on security the difference between "soft security" and "hard
security” was first coined by Rasmusson and Jansson[21] who used the term hard security for
traditional mechanisms like authentication and access control, and soft security for social control
mechanisms. Soft security tries to control the social security threats and avoids social conflicts.
By the creation of long-term trust relationships among peers, the network can provide a more
secured environment, there by reducing risk and uncertainty in future interactions among peers.
However, the establishment of trust relation between the peers involved in the interactions is
difficult in such a malicious open system. Trust is a social concept and hard to measure with
numerical values. In the literature trust and reputation are interchangeably used. “But trust is a
complex concept and in many cases the definition for trust is measured in terms of confidence
that an entity of a system places on another entity of the same system for performing a given task
with main focus on two features namely uncertainty and subjectivity whereas reputation is a
more objective concept, and is based on information about or observations of the past behaviour
2. International Journal on Web Service Computing (IJWSC), Vol.5, No.3, September 2014
2
of an entity. Both concepts are very related, and in fact, reputation can be used as a means to
determine whether an entity can trust another entity” [22]
*Benefits of application of trust and soft security include the following :
• More Trusted customer service ,
• Build trust relationship between trading partners,
• Effective use of technologies,
• Providing soft security and
• Increase companies’ reputation.
This survey provides an exhaustive study of existing trust models by means of literature survey in
section 2 security risks in section 3 analysis of trust models in section 4 and conclusion and
future work in section 5 and references in section 6.
2. RELATED WORK
There is a continuous effort in the research community to explore the challenges of trust and
reputation models. This can be seen from the existing trust models. Still there are several issues or
challenges yet to be tackled which can be seen from the following survey on trust and reputations
models as presented in the literature. The table 2.1 depicts the different trust evaluation models in
the P2P or multi agent environment. This table provides trust evaluation models in the following
order:
1-Cuboid trust, 2- Eigen trust, 3- BNBTM, 4 – GroupRep, 5- AntRep, 6 - Semantic Web, 7- Global
Trust, 8- Peer Trust, 9- PATROL – F, 10 – Trust evolution, 11- TDTM, 12- TACS, 13- SORT.
In this article, we have studied several trust and reputation models and issues such as trust
bootstrapping, trust evidence, trust assessment, second order issues, interaction outcome
evaluation, punishment, reputation propagation, redemption, context awareness, rewarding,
dynamic nature and trust type value are being analyzed. Trust bootstrapping deals with the
initial trust value assignment which is the value a truster assigns to trustee. ‘First impression is
the best impression’ and a wrong judgment results in bad transaction result. Trust evidence can
involve direct or indirect interaction between truster and trustee. Second order issues are security
threats that are prevailing in the P2P as well as other network environments, namely individual
malicious person attack or group of persons with bad intention, collusion attack, sybil attack or
impersonation, camafluage attack or on/off attack, trusted peer changing nature etc.There have
been several solutions for each of these attacks. In some of the existing trust models wide
coverage of all attacks not being carried out. Trust interaction evaluation is done by watch dog,
centralized or de centralized node, Public key infrastructure (PKI), monitoring node, etc. The
trust evaluation may be performed locally or globally. In certain models, good service or
transaction is rewarded by providing weightage to the satisfaction factor or if trust level crosses
threshold value. Diminishing effect deals with trust decay over a period. In trust models it has
become necessary to include context awareness. Trust evolves over a period of time, hence the
trust model should be a dynamic one. The trust value can be discrete or continuous, but
continuous trust value is preferable over the discrete. Survey papers taken into account are
described below as in the same order given in Table 2.1.
3. International Journal on Web Service Computing (IJWSC), Vol.5, No.3, September 2014
3
1. CuboidTrust
CuboidTrust[1] is a global trust model for p2p networks. It denotes the reputation which
represents peer’s trustworthiness by four relations. A cuboid is created by using coordinates
(x,y,z) where z – quality of resource/file, y – peer that requested the resource and x – the peer
who has given the feedback about the resource and denoted by Px,y,z. Binary rating is used
global trust for each peer is calculated using power iteration of all the values stored by the peers
[1].
2. EigenTrust
EigenTrust is a global trust model in a P2P, dealing with file sharing. Local trust is computed
by the satisfactory rate of file downloading is defined as Sij = sat(i,j) − unsat(i,j), where sat(i,j)
denotes the file downloads by i from j and unsat(i,j) is the unsatisfactory downloads. The Global
trust is can be obtained from the Power iteration formula [2].
Table 2.1 Trust Evaluation models on multiple issues
5. International Journal on Web Service Computing (IJWSC), Vol.5, No.3, September 2014
5
3. BAYESIAN NETWORK BASED TRUST MANAGEMENT
(BNBTM)
BNBTM considers multiple features of an applications to denote the trust in various factors and
evaluates by a single Bayesian network. Beta probability distribution functions uses past
experiences to evaluate the trust [3].
4. GROUPREP
GroupRep is representing the trust among group members. This includes three levels of trust
namely, trust between groups, trust developed between groups and peer trust for another peer
[4].
5. ANTREP
AntRep algorithm is based on bio inspired swarm intelligence algorithm. Every peer maintains a
reputation table giving reputation of ‘n’ number of peers in the network. The reputation table
slightly differs from the routing table in the sense that (i) instead of distance between peers
reputation of the peer is stored; (ii) The reputation value is used as the metric for the selection of
peer. Two types of ants used namely forward ants and backward ants are used for finding
reputation values of peers and to propagate these reputation value over the network. Initially from
the reputation table a peer with the highest reputation value is selected a unicast ant is sent to
that peer for transaction. If no such highest value exist in the table then broadcast ants are sent
along all the paths [5]. After the transaction is over, a backward ant is used to update all the
reputation values of all the nodes/peer on its way.
6. International Journal on Web Service Computing (IJWSC), Vol.5, No.3, September 2014
6
6. SEMANTIC WEB
Zhang et al.[6], have presented a trust model for multi agent system. The final trust value on the
path connecting two agents is assigned by adding the trust of individual edges multiplied by
corresponding weights associated with each edge.
7. GLOBAL TRUST
Instead of concentrating local trust value of a node, by accumulating the local trust values, the
global trust value of a node is evaluated as given in [5,6,7]
8. PEER TRUST
This work is a reputation-based trust model. Based on three factors namely number of
transactions, credibility of the peer and the feedback a peer receives from other peers to
calculate the adaptive trust.[8].
9. PATROL-F (comPrehensive reputAtion-based TRust mOdeL- Fuzzy)
PATROL-F includes many important concepts direct experiences, reputation values, credibility,
time based decay of information, first impressions and a node system hierarchy for the purpose of
computing peer reputation. This model uses fuzzy logic for the categorizing the peer based on
trust level into “good” or “better” and “bad” or “worse” [9].
10. TRUST EVOLUTION
Wang et al., have developed a trust model for P2P networks. It uses direct trust and
recommendation from other peers and also considers context and trust lies within the interval
[0,1] [10].
11. TIME-BASED DYNAMIC TRUST MODEL (TDTM)
TDTM is a bio inspired technique using ant colony algorithm that represents trust between the
nodes as the pheromone value on the edge connecting the two nodes in the network. [1].
12. TRUST ANT COLONY SYSTEM (TACS)
TACS is based on the ant colony system.. In this model the most trustworthy node is selected for
service request based on the pheromone traces on the path. Every link is associated with
pheromone value representing the trust one peer has over the other. Ants travel along every path
depositing pheromone and finds the most trustworthy path leading to the most reputable server
[12].
7. International Journal on Web Service Computing (IJWSC), Vol.5, No.3, September 2014
7
13. SORT
In SORT[13], to evaluate interactions and recommendations in a better way, importance,
recentness, peer satisfaction, recommender’s trustworthiness and confidence about
recommendation are considered. Additionally, service and recommendation contexts are
separated. Taking into account real-life factors, simulations are carried out more realistically.
14. PATROL (comPrehensive reputAtion-based TRust mOdeL)
PATROL is a reputation based trust model for distributed computing, considering multiple
factors such as reputation values, direct experiences, credibility, time based trust, first
impressions, similarity, popularity, activity, cooperation between hosts, role based trust
consistency and confidence. PATROL takes into account different weightage for different factors.
[14].
15. META-TACS
META-TACS is an extension of the TACS algorithm developed by the Felix et.al. [12]. They
have extended the TACS model by optimizing the working parameters of the algorithm using
genetic algorithms [15].
3. SECURITY RISKS
In an open network, individuals or peers are to be identified as benevolent peers or malicious one
based on the trust value. There is a possibility of change in behaviors of an individual. These
behavioral changes are subjective in nature.
Figure 1. Security Threats
8. International Journal on Web Service Computing (IJWSC), Vol.5, No.3, September 2014
8
The above mentioned risks are to be taken care by the trust and reputation models and there
should be comprehensive model to identify, mitigate, provide and recover from all types of
attacks .In the existing works only some of the issues are provided with a solution and demands
some additional effort to accomplish a more secured environment
4. ANALYSIS OF TRUST MODELS
From the survey, it is known that only 25 % of trust based issues or challenges have been covered
in current P2P network.
Figure. 2. Trust influencing factors
In the above graph paper-id is given on the X axis and the coverage trust assessment factors in
each of the papers is given along the Y axis. From the survey it can be seen that trust can be
assessed by 18 different attributes of an entity or environment. Only 50 % of the trust sources
are utilised for the assessment while there still 50% sources that are yet to be tackled. Risk
tolerance, Similarity, role based trust, sudden behaviour change, trust decay communityRisk
tolerance nature , Similarity among the peers, Role played by the peer, Sudden deviation in
bevaiour, Trust decay, community based trust, confidence as provider and requetor etc. are the
other elements which should be given due weightage while computing trust. In order to arrive at
a more comprehensive trust and reputation model, some more attempts have to be taken for
establishing an effective trustworthynvironment in P2P network.
9. International Journal on Web Service Computing (IJWSC), Vol.5, No.3, September 2014
9
Figure 3. Trust on multiple factors
In the above figure 3, the main issues in the trust and reputation model explored in various
articles has been given along the X axis and the issues along the Y axis. It can be seen from the
above graph that trust factors like context awareness, redemption, reputation propagation have not
been tackled in many of the trust and reputation models. Context depicts the environment.
Different situations results in different behaviours of the peers. Consistent good behviour should
be given more weightage. A chance should also be given for a malicious person to become a
benovalent one. Some means of reputation propagation should be encouraged to identify the
trusted group. But at the same time measures should be taken to curb the badmouthing peers. So
understanding soft trust based attacks helps a peer to be more vigilant and continue to leverage
the available services in the network. Hence the second order isssues have been analysed in the
above models and figure 4. Presents the issues by means of pie chart. The graph given in figure
4. shows the coverage of various security attacks explored in different articles as depicted in
figure 1. and it is known that issues like are not being tackled in all the trust models taken in
literature survey. Hence, these issues shoule be effectively handled in the forthcoming trust
models to provide a smooth trust worthy transactions or interactions in P2P networking
environment. It can be seen that SORT[13], has covered 78 % of trust issues paving way to
explore further in this direction.
10. International Journal on Web Service Computing (IJWSC), Vol.5, No.3, September 2014
10
Figure 4. Second order issues
5. CONCLUSION AND FUTURE WORK
P2P network provides an efficient means of data communication. In this survey, the trust issues
explored in the existing trust and reputation models have been analyzed. Our intention is to
provide and execute a trustworthy P2P model. We emphasis that solution to multiple soft security
based threats should be given more effectively taking into account multifaceted approach and
trust mechanism entrust a healthy and smooth data transfer and services between peers. It is
known that from figure 3. Out of 18 trust issues, context awareness, redemption, reputation
propagation, second order issues and trust bootstrapping are the areas one has to perform
intensive exploration considering trust as a subjective trust and must resolve with dynamic and
innovative solutions. The survey paper SORT[13] covers 67% of trust issues but it has started
the trust bootstrapping process with low value and pre trusted peer’s value But in the case of no
pre trusted peers available, this model cannot solve the bootstrapping issue. In case of trust
assessment it has not categorized the peers into similar peers or role based peers, local, global,
community trusted peers and adaptively is missing. When considering the indirect trust
experience, referrals are not taken into account and weightage for confidence as recommender is
not used. While considering second order issues collusion attack, man in the middle attack, pre
trusted peers changing into malicious category are not being explored. When interaction
outcome evaluation is done by the node itself, there is possibility of misjudgment. It also does
not cover the trust decay and punishment activity. Changing into benevolent one is not being
rewarded and hence dynamic and context awareness factors are missing. Hence in our future
work we like to provide an efficient dynamic trust worthy framework for service provisioning
and leveraging taking into account the subjective nature of trust and giving much importance for
the issues like bootstrapping, redemption, context awareness and reinforcement.
11
22 0 0
0
0
0
11 0
0
00
67
Second order (9)issues
1
2
3
4
5
6
7
8
11. International Journal on Web Service Computing (IJWSC), Vol.5, No.3, September 2014
11
REFERENCES
[1] Ruichuan Chen, Xuan Zhao, Liyong Tang, Jianbin Hu, and Zhong Chen, (2007)"CuboidTrust: A
Global Reputation-Based Trust Model in Peer-to-Peer Networks", Autonomic and Trusted
Computing. Berlin / Heidelberg: Springer, vol. 4610, pp. 203-215.
[2] Sepandar D Kamvar, Mario T Schlosser, and Hector Garcia-Molina, (2003) "The EigenTrust
Algorithm for Reputation Management in P2P Networks", Proceedings of the 12th international
conference on World Wide Web (WWW '03), Budapest, Hungary, pp. 640-651.
[3] Yong Wang, Vinny Cahill, Elizabeth Gray, Colin Harris, and Lejian Liao, (2006) "Bayesian Network
Based Trust Management(BNBTM)", Autonomic and Trusted Computing. Berlin / Heidelberg:
Springer, pp. 246-257.
[4] Huirong Tian, Shihong Zou, Wendong Wang, and Shiduan Cheng, (2006)"A Group Based Reputation
System for P2P Networks" Autonomic and Trusted Computing. Berlin / Heidelberg: Springer, pp.
342-351.
[5] Wei Wang, Guosun Zeng, and Lulai Yuan, (2006)"Ant-based Reputation Evidence Distribution in
P2P Networks", Fifth International Conference Grid and Cooperative Computing (GCC 2006),
Hunan, China, pp. 129 - 132.
[6] Yu Zhang, Huajun Chen, and Zhaohui Wu, (2006)"A Social Network-Based Trust Model for the
Semantic Web", Autonomic and Trusted Computing. Berlin / Heidelberg: Springer, pp. 183-192.
[7] Fajiang Yu, Huanguo Zhang, Fei Yan, and Song Gao( 2006) "An Improved Global Trust Value
Computing Method in P2P System," Autonomic and Trusted Computing. Berlin / Heidelberg:
Springer pp. 258-267.
[8] Xiong Li and Liu Ling, ( 2004)"PeerTrust: supporting reputation-based trust for peer-to-peer
electronic communities," IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 7, pp.
843-857,
[9] Ayman Tajeddine, Ayman Kayssi, Ali Chehab, and Hassan Artail, (2006)"PATROL-F - A
Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems," in Autonomic and Trusted
Computing. Berlin / Heidelberg: Springer, pp. 205-216.
[10] Yuan Wang, Ye Tao, Ping Yu, Feng Xu, and Jian Lü,( 2007) "A Trust Evolution Model for P2P
Networks," in Autonomic and Trusted Computing. Berlin / Heidelberg: Springer, pp. 216-225.
[11] Zhuo Tang, Zhengding Lu, and Kai Li, (2006) "Time-based Dynamic Trust Model using Ant Colony
Algorithm," Wuhan University Journal of Natural Sciences, vol. 11, no. 6, pp. 1462-1466.
[12] Felix Gomez Marmol, Gregorio Martinez Perez, and Antonio F Gomez Skarmeta,(2009) "TACS, a
Trust Model for P2P Networks," Wireless Personal Communications, vol. 51, no. 1, pp. 153-164,
[13] Ahmet Burak Can, Member, IEEE, and Bharat Bhargava, Fellow, IEEE, (2013) “SORT: A Self-
ORganizing Trust Model for Peer-to-Peer Systems”, IEEE Transactions On Dependable And Secure
Computing, Vol. 10, No. 1, January/February
[14] Ayman Tajeddine, Ayman Kayssi, Ali Chehab, and Hassan Artail, (2007)"PATROL: A
Comprehensive Reputation-based Trust Model," International Journal of Internet Technology and
Secured Transactions, vol. 1, no. 1/2, pp. 108-131.
[15] Felix Gomez Marmol, Gregorio Mrtinez Perez, and Javier G Marin-Blazquez, (2009)"META-TACS:
A Trust Model Demonstration of Robustness through a Genetic Algorithm," Autosof Journal of
Intelligent Automation and Soft Computing, vol. 16, no. X, pp. 1-19.
[16] Felix Gomez Marmol, Gregorio Mrtinez Perez((2009))” Security threats scenarios in trust and
reputation models for distributed systems”, Elsevier- Science Direct computers & security 545 – 556
[17] Y. Wang and E.-P. Lim. (2008)”The evaluation of situational transaction trust in eservice
environments”, pages 265–272, 2008.
[18] Y. Wang and K.-J. Lin.( 2008) Reputation-oriented trustworthy computing in ecommerce
environments. IEEE Internet Computing, 12(4):55–59
[19] H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman(2008) “Sybilguard: defending against sybil
attacks via social networks”. IEEE/ACM Trans. Netw., 16(3):576–589
12. International Journal on Web Service Computing (IJWSC), Vol.5, No.3, September 2014
12
[20] H. Yu, C. Shi, M. Kaminsky, P. B. Gibbons, and F. Xiao. Dsybil: (2009)”Optimal Sybil resistance for
recommendation systems” IEEE Symposium on Security and Privacy, pages 283–298
[21] Lars Rasmusson and Sverker Jansson.(1996)” Simulated Social Control for Secure Internet
Commerce”. Catherine Meadows, editor, Proceedings of the 1996 New Security Paradigms
Workshop. ACM
[22] Audun J_sang, Roslan Ismail, and Colin Boyd. (2007)”A survey of trust and reputation systems for
online service provision”. Decision Support Systems, 43(2):618{644}
Authors
S. Udhaya Shree is working as Assistant Professor in the Department of Computer
Applications, Rajiv Gandhi College of Engineering, Pondicherry. Currently, she is pursuing
Ph.D. in Computer Science and Engineering at Pondicherry University, Pondicherry. She
has obtained M.Sc. (Maths) and M.C.A. degree from Madras University, Chennai, India.
She has done M.Tech. in Computer Science and Engineering from Manomanium
Sundaranar University, Tirunelveli, India. Currently she is pursuing Ph.D. in Computer
Science and Engineering at Pondicherry University, Puducherry, under the guidance of
Dr. Saleem Basha M.S. Her areas of interest are formal verification of QoS of Web Services using
Timed Automata, Web Service Composition using Bio inspired Optimization Techniques. She has
published more than 12 papers in National and International Conferences.
Dr. Saleem Basha.M.S is working as Assistant Professor & Research Director in the
Department of Computer Science, Mazoon University College, Muscat, Sultanate of
Oman. He has obtained B.E in the field of Electrical and Electronics Engineering,
Bangalore University, Bangalore, India and M.E in the field of Computer Science and
Engineering, Anna University, Chennai, India and Ph.D. in the field of Computer Science
and Engineering in Pondicherry University, India. He is currently working in the area of
Hackers psychology, SDLC specific effort estimation models and web service modeling
systems. He has published more than 70 research papers in National and International journals and
conferences.