Trust as a Fairness Parameter for Quality of Experience in Wireless Networks (original) (raw)
Related papers
Trust as an attribute of good functioning of the Internet
SCIENCE AND WORLD. International scientific journal, 2020
The essence of the internet is trust. It is trust that enables cooperation and effective operation. On the Internet, it can take forms, including intensity of interpersonal contacts. Thanks to this, Internet users have become extremely important today. They received tools for processing and creating media messages. The purpose of the article is to present trust as an attribute of good internet functioning. The research methods used are a review of current literature on the subject and own analysis.
Trust and Cooperation Incentives for Wireless User-Centric Environments
The flexibility inherent to wireless technologies is giving rise to new types of access networks and it is allowing the Internet to expand in a user-centric way. In this kind of scenario, trust, reputation as well as adequate incentives for cooperation are of vital importance. This paper provides an overview on the state of the art in trust and reputation in wireless environments, identity disambiguation and cooperation incentives. It underlines the current shortcomings in these fields and establishes the relation between these previous concepts in order to form a more robust and reliable Internet, where the end-user is directly involved in the connectivity value chain.
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been recently used in the domain of wireless ad hoc networks. It has been shown that these schemes provide positive results as a self-policing mechanism for the routing of data in wireless ad hoc network security. This paper develops a relationship between the trust concepts in the social network theory and wireless ad hoc networks. In addition, the paper maps existing trust schemes in wireless ad hoc networks to a long-standing theory in social networks. Most importantly, a refined model of trust evaluation in social networks is constructed and mapped to a new trust scheme for ad hoc networks. The new trust scheme is analyzed and shown to outperform existing schemes using scenario and simulation analysis.
On Trust Establishment in Mobile Ad-Hoc Networks
Lecture Notes in Computer Science, 2004
We present some properties of trust establishment in mobile, ad-hoc networks and illustrate how they differ from those of trust establishment in the Internet. We motivate these differences by providing an example of ad-hoc network use in battlefield scenarios, yet equally practical examples can be found in non-military environments. We argue that peer-to-peer networks are especially suitable to solve the problems of generation, distribution, and discovery of trust evidence in mobile adhoc networks, and illustrate the importance of evaluation metrics in trust establishment.
A Guide to Trust in Mobile Ad Hoc Networks
2012
In this paper we examine issues of trust and reputation in Mobile Ad hoc Networks. We look at a number of the trust and reputation models that have been proposed and we highlight open problems in this area.
Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications
2002
The proliferation of mobile devices and the development of ad hoc networking technologies has introduced the possibility of a vast, networked infrastructure of diverse entities partaking in collaborative applications with each other. However, this may require interaction between users who may be marginally or completely unknown to each other, or interaction in situations where complete information is unavailable.
2009
— Trust is a concept we heavily use in everyday life because it allows us to cope with the complexity of interactions with other people. This concept is also implicitly used throughout the Internet, both in the infrastructure and in the end-user services. Since security problems on the Internet are becoming more and more serious, and thus present a threat to the further growth of the Internet, there is ongoing research that tries to turn trust into the first class component of the Internet architecture. In this paper we review concept of a trust and we give short review of the security problems on the Internet. We argue that those problems are fundamental in nature and, using current mechanisms, will never be solved appropriately. As a potential solution to this problem we discuss architecture modifications, related protocols and procedures that would allow trust to be an explicit part of the Internet. The goal of this paper is to form a base for further research on the trust issues...
Survey of Trust Models in Different Network Domains
International Journal of Ad hoc, Sensor & Ubiquitous Computing, 2010
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchangeably when defining a secure system, they are not the same. The difference between reputation and trust is also explained, highlighting that reputation partially affects trust. A survey of trust and reputation systems in various domains is conducted, with more details given to models in ad-hoc and sensor networks as they are closely related to each other and to our research interests. The methodologies used to model trust and their references are presented. The factors affecting trust updating are summarised and some examples of the systems in which these factors have been implemented are given. The survey states that, even though researchers have started to explore the issue of trust in wireless sensor networks, they are still examining the trust associated with routing messages between nodes (binary events). However, wireless sensor networks are mainly deployed to monitor events and report data, both continuous and discrete. This leads to the development of new trust models addressing the continuous data issue and also to combine the data trust and the communication trust to infer the total trust.
A non-biased trust model for wireless mesh networks
International Journal of Communication Systems, 2016
Trust models that rely on recommendation trusts are vulnerable to badmouthing and ballot-stuffing attacks. To cope with these attacks, existing trust models employ different trust aggregation techniques to process the recommendation trusts and combine them with the direct trust values to form a combined trust value. However, these trust models are biased as recommendation trusts that deviate too much from one's own opinion are discarded. In this paper, we propose a non-biased trust model that considers every recommendation trusts available regardless they are good or bad. Our trust model is based on a combination of two techniques: the dissimilarity test and the Dempster Shafer Theory. The dissimilarity test determines the amount of conflict between two trust records, whereas the Dempster Shafer Theory assigns belief functions based on the results of the dissimilarity test. Numerical results show that our trust model is robust against reputation based attacks when compared to trust aggregation techniques such as the linear opinion pooling, subjective logic model, entropy-based probability model and regression analysis. In addition, our model has been extensively tested using network simulator NS-3 in an Infrastructure based WMN and a Hybrid based WMN to demonstrate that it can mitigate blackhole and grayhole attacks.
Towards identifying features of trust in mobile ad hoc network
Modeling & Simulation, …, 2008
In a mobile ad hoc network (MANET) where security is a crucial issue, trust plays an important factor that could improve the number of successful data transmission process. The higher the numbers of nodes that trust each other in the network means the higher successful communication process rates could be expected. To determine trust, there are several criteria need to be considered. These criteria which are also known as features or evidences can be used to represent each node's trust properties in the trust evaluation process prior to initiating certain packet forwarding task. Nodes that are able to present valid features requested by source node will be included in the MANET operations. The aim of this paper is to provide an overview of security vulnerabilities in MANET and the use of trust concept to enhance the security. This paper also discusses several potential features that have been used in existing works which are expected to be suitable to be used in the trust evaluation process to create a trusted MANET community.