CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Design of a Novel Trust Model and its Application in Trust based Routing to Defend against Dishonest Recommenders

by Shirina Samreen, G.narsimha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 2
Year of Publication: 2015
Authors: Shirina Samreen, G.narsimha
10.5120/21672-4754

Shirina Samreen, G.narsimha . Design of a Novel Trust Model and its Application in Trust based Routing to Defend against Dishonest Recommenders. International Journal of Computer Applications. 122, 2 ( July 2015), 16-23. DOI=10.5120/21672-4754

@article{ 10.5120/21672-4754,
author = { Shirina Samreen, G.narsimha },
title = { Design of a Novel Trust Model and its Application in Trust based Routing to Defend against Dishonest Recommenders },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 2 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 16-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number2/21672-4754/ },
doi = { 10.5120/21672-4754 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:09:31.398499+05:30
%A Shirina Samreen
%A G.narsimha
%T Design of a Novel Trust Model and its Application in Trust based Routing to Defend against Dishonest Recommenders
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 2
%P 16-23
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Trust management frameworks play a very important role in securing the mobile ad hoc networks against various insider attacks that could occur during data forwarding. The success of a trust management framework greatly depends upon the proper design of each of its major components including the direct trust computation component as well as the indirect trust computation component. Specifically, the indirect trust computation component should be robust to handle the dishonest recommendations. The current paper shows the application of a trust model involving a robust indirect trust computation component called as RecommFilter which has been proposed in our earlier work. It can overcome the various attacks caused by dishonest recommenders. The application involves the integration of the trust model with a routing protocol based upon a reliability measure called as Path Allegiance metric (PAM) which is a cumulative value obtained through the trust values of the on-path nodes upon each other. Experimental results show that the proposed scheme along with PAM routing protocol is robust to different dishonest recommendation attacks and accurate in the detection of dishonest recommenders.

References
  1. A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decis. Support Syst. , vol. 43, no. 2, pp. 618–644, 2007
  2. A. Whitby, A. Josang, J. Indulska, Filtering out unfair ratings in bayesian reputation systems, in: Proceedings of the Third International Joint Conference on Autonomous Agents and Multi Agent Systems, 2004, pp. 106–117.
  3. S. Buchegger, J. -Y. L. Boudec, A robust reputation system for p2p and mobile ad-hoc networks, in: Proceedings of the 2nd Workshop on Economics of Peer-to-Peer Systems, 2004, pp. 1–6.
  4. S. Chen, Y. Zhang, Q. Liu, and J. Feng, "Dealing with dishonest recommendation: The trials in reputation management court," Ad Hoc Networks, pp. 1603-1618, 2012
  5. H. Yu, S. Liu, A. C. Kot, C. Miao, and C. Leung, "Dynamic witness selection for trustworthy distributed cooperative sensing in cognitive radio networks," in Proc. 13th IEEE Int. Conf. Commun. Technol. , pp. 1-6, Sep. 2011
  6. C. Zouridaki et al. , "A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs," Proc. 3rd ACM Wksp. Sec. Ad Hoc and Sensor Networks, Alexandria, VA, Nov. 7, 2005
  7. C. Zouridaki, B. L. Mark, M. Hejmo, R. K. Thomas, E-Hermes: a robust cooperative trust establishment scheme for mobile ad hoc networks, Ad hoc Networks 7 (2009) 1156–1168.
  8. Shirina Samreen, Dr. G. Narsimha, "Dynamically Adaptive Recommender Filtering Scheme to defend against Dishonest Recommenders in a MANET", International Journal of Science and Research, Vol. 4, Issue 5, pp. 388-398, 2015
  9. G. Shafer, A Mathematical Theory of Evidence, Princeton University Press, Princeton, NJ, 1976
  10. F. Li, J. Wu, Mobility reduces uncertainty in MANETs, in: Proceedings of INFOCOM'07, 2007, pp. 1946–1954
  11. A. L. Jousselme, D. Grenier, and E. Bosse, "A new distance between two bodies of evidence," Information Fusion, vol. 2, no. 2, pp. 91–101, 2001
Index Terms

Computer Science
Information Sciences

Keywords

Dempster Shafer Theory Dishonest Recommenders Slandering attack Self-promoting attack Collusion attack Recommendation Filtering Jousselmes distance Path Allegiance Metric.