6 research outputs found
Recommended from our members
Trust Management for P2P application in Delay Tolerant Mobile Ad-hoc Networks. An Investigation into the development of a Trust Management Framework for Peer to Peer File Sharing Applications in Delay Tolerant Disconnected Mobile Ad-hoc Networks.
Security is essential to communication between entities in the internet. Delay tolerant and disconnected Mobile Ad Hoc Networks (MANET) are a class of networks characterized by high end-to-end path latency and frequent end-to-end disconnections and are often termed as challenged networks. In these networks nodes are sparsely populated and without the existence of a central server, acquiring global information is difficult and impractical if not impossible and therefore traditional security schemes proposed for MANETs cannot be applied. This thesis reports trust management schemes for peer to peer (P2P) application in delay tolerant disconnected MANETs. Properties of a profile based file sharing application are analyzed and a framework for structured P2P overlay over delay tolerant disconnected MANETs is proposed. The framework is implemented and tested on J2ME based smart phones using Bluetooth communication protocol. A light weight Content Driven Data Propagation Protocol (CDDPP) for content based data delivery in MANETs is presented. The CDDPP implements a user profile based content driven P2P file sharing application in disconnected MANETs. The CDDPP protocol is further enhanced by proposing an adaptive opportunistic multihop content based routing protocol (ORP). ORP protocol considers the store-carry-forward paradigm for multi-hop packet delivery in delay tolerant MANETs and allows multi-casting to selected number of nodes. Performance of ORP is compared with a similar autonomous gossiping (A/G) protocol using simulations. This work also presents a framework for trust management based on dynamicity aware graph re-labelling system (DA-GRS) for trust management in mobile P2P applications. The DA-GRS uses a distributed algorithm to identify trustworthy nodes and generate trustable groups while isolating misleading or untrustworthy nodes. Several simulations in various environment settings show the effectiveness of the proposed framework in creating trust based communities. This work also extends the FIRE distributed trust model for MANET applications by incorporating witness based interactions for acquiring trust ratings. A witness graph building mechanism in FIRE+ is provided with several trust building policies to identify malicious nodes and detect collusive behaviour in nodes. This technique not only allows trust computation based on witness trust ratings but also provides protection against a collusion attack. Finally, M-trust, a light weight trust management scheme based on FIRE+ trust model is presented
CRM: a new dynamic cross-layer reputation computation model in wireless networks
This is the author accepted manuscript. The final version is available from University Press (OUP) via the DOI in this record.Multi-hop wireless networks (MWNs) have been widely accepted as an indispensable
component of next-generation communication systems due to their broad applications and easy
deployment without relying on any infrastructure. Although showing huge benefits, MWNs face many
security problems, especially the internal multi-layer security threats being one of the most challenging
issues. Since most security mechanisms require the cooperation of nodes, characterizing and learning
actions of neighboring nodes and the evolution of these actions over time is vital to construct an
efficient and robust solution for security-sensitive applications such as social networking, mobile
banking, and teleconferencing. In this paper, we propose a new dynamic cross-layer reputation
computation model named CRM to dynamically characterize and quantify actions of nodes. CRM
couples uncertainty based conventional layered reputation computation model with cross-layer design
and multi-level security technology to identify malicious nodes and preserve security against internal
multi-layer threats. Simulation results and performance analyses demonstrate that CRM can provide
rapid and accurate malicious node identification and management, and implement the security
preservation against the internal multi-layer and bad mouthing attacks more effectively and efficiently
than existing models.The authors would like to thank anonymous reviewers and editors for their constructive comments.
This work is supported by: 1. Changjiang Scholars and Innovative Research Team in University
(IRT1078), 2. the Key Program of NSFC-Guangdong Union Foundation (U1135002), 3. National
Natural Science Foundation of China (61202390), 4. Fujian Natural Science Foundation:2013J01222,
5. the open research fund of Key Lab of Broadband Wireless Communication and Sensor Network
Technology (Nanjing University of Posts and Telecommunications, Ministry of Education)
Reputation Revision Method for Selecting Cloud Services Based on Prior Knowledge and a Market Mechanism
The trust levels of cloud services should be evaluated to ensure their reliability. The effectiveness of these evaluations has major effects on user satisfaction, which is increasingly important. However, it is difficult to provide objective evaluations in open and dynamic environments because of the possibilities of malicious evaluations, individual preferences, and intentional praise. In this study, we propose a novel unfair rating filtering method for a reputation revision system. This method uses prior knowledge as the basis of similarity when calculating the average rating, which facilitates the recognition and filtering of unfair ratings. In addition, the overall performance is increased by a market mechanism that allows users and service providers to adjust their choice of services and service configuration in a timely manner. The experimental results showed that this method filtered unfair ratings in an effective manner, which greatly improved the precision of the reputation revision system
Countering the collusion attack with a multidimensional decentralized trust and reputation model in disconnected MANETs
NoThe FIRE trust and reputation model is a de-centralized trust model that can be applied for trust management in unstructured Peer-to-Peer (P2P) overlays. The FIRE model does not, however, consider malicious activity and possible collusive behavior in nodes of network and it is therefore susceptible to collusion attacks. This investigation reveals that FIRE is vulnerable to lying and cheating attacks and presents a trust management approach to detect collusion in direct and witness interactions among nodes based on colluding node's history of interactions. A witness ratings based graph building approach is utilized to determine possibly collusive behavior among nodes. Furthermore, various interaction policies are defined to detect and prevent collaborative behavior in colluding nodes. Finally a multidimensional trust model FIRE+ is devised for avoiding collusion attacks in direct and witness based interactions. The credibility of the proposed trust management scheme as an enhancement of the FIRE trust model is verified by extensive simulation experiments