• Title/Summary/Keyword: Trust Cluster

Search Result 70, Processing Time 0.019 seconds

Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network

  • Jin, Seung-Hun;Park, Chan-Il;Choi, Dae-Seon;Chung, Kyo-Il;Yoon, Hyun-Soo
    • ETRI Journal
    • /
    • v.27 no.4
    • /
    • pp.465-468
    • /
    • 2005
  • This paper presents a new trust evaluation scheme in an ad hoc network. To overcome the limited information about unfamiliar nodes and to reduce the required memory space, we propose a cluster-based trust evaluation scheme, in which neighboring nodes form a cluster and select one node as a cluster head. The head issues a trust value certificate that can be referred to by its non-neighbor nodes. In this way, an evaluation of an unfamiliar node's trust can be done very efficiently and precisely. In this paper, we present a trust evaluation metric using this scheme and some operations for forming and managing a cluster. An analysis of the proposed scheme over some security problems is also presented.

  • PDF

Design and Analysis a Robust Recommender System Exploiting the Effect of Social Trust Clusters (소셜 트러스트 클러스터 효과를 이용한 견고한 추천 시스템 설계 및 분석)

  • Noh, Giseop;Oh, Hayoung;Lee, Jaehoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.241-248
    • /
    • 2018
  • A Recommender System (RS) is a system that provides optimized information to users in an over-supply situation. The key to RS is to accurately predict the behavior of the user. The Matrix Factorization (MF) method was used for this prediction in the early stage, and according to the recent SNS development, social information is additionally utilized to improve prediction accuracy. In this paper, we use RS internal trust cluster, which was overlooked in previous studies, to further improve performance and analyze the characteristics of trust clusters.

Trust Predicated Routing Framework with Optimized Cluster Head Selection using Cuckoo Search Algorithm for MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.2
    • /
    • pp.115-125
    • /
    • 2015
  • This paper presents a Cuckoo search algorithm to secure adversaries misdirecting multi-hop routing in Mobile ad hoc networks (MANETs) using a robust Trust Predicated Routing Framework with an optimized cluster head selection. The clustering technique designed in this framework leads to efficient routing in MANETs. The heavy work load in the node causes an energy drop in cluster head, which leads to re-clustering of the group, and another cluster head is selected to avoid packet loss during data transmission. The problem in the re-clustering process is that the overall efficiency of the routing process is reduced and the processing time is increased. A Cuckoo search based optimization algorithm is proposed to solve the problem of re-clustering by selecting the secondary cluster head within the initially formed cluster group and eliminating the reclustering process. The proposed framework enables a node to select a reliable and secure route for MANET and the performance can be evaluated by comparing the simulated results with the AODV routing protocol, which shows that the performance of the proposed routing protocol are improved significantly.

Classification and Performance Evaluation of Reputation-Based Trust Model in Ad-hoc Networks (애드혹 환경에서 평판기반 신뢰 모델의 분류 및 성능평가)

  • Park, Seong-Soo;Lee, Jong-Hyouk;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.143-150
    • /
    • 2009
  • In trust-based networks, it is very important how to decide a node is trustworthy when one node performs communications with other node. In current networks based on trust, a node creates a new trust value from observation and then establishes an intercommunication path through the process of evaluating a targeted communication node. In our paper, we propose four trust models in which a new node enters a cluster and finds a target node to create a communication in ad-hoc networks. The proposed models have been classified according to the existence of reputation server and the trust evaluation functions. Through the proposed model, we found that new node finds target node more quickly in which there exists a reputation server in the cluster and considers neighbor node's recommendation as well as own experience information when calculates trust values. As our performance analysis, we focus the communication delay time to generate a final trust value for each trust model.

The Effect of Collaboration Motive Types on Collaboration Areas, Trust/devotion, and Performance/satisfaction in Fashion Business (한국 패션기업 콜레보레이션 동기 유형에 따른 콜레보레이션 분야, 신뢰와 몰입, 성과 및 만족도)

  • Hong, Won-Pyo;Hwang, Jin-Sook
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.32 no.5
    • /
    • pp.692-703
    • /
    • 2008
  • In the fashion enterprises of today, there are many kinds of inter-enterprises' collaborations which are related to the strategic management for reinforcing their competitiveness in various fields. These inter-enterprises' collaborations, which began to increase in the year 2000, will increase even more in the near future. The study investigated the differences of collaboration motive types in collaboration areas, trust/devotion, performance and satisfactions of collaborations, and characteristics of collaborated companies and their partners. A questionnaire was administered to 194 key employees of the fashion enterprises in Korea and the analysis was performed by factor analysis, cluster analysis, ANOVA, and $X^2$ test. The results showed that the collaboration motive had four factors: economic efficiency, business expansion, product planning improvement, and brand competitiveness increase. The cluster analysis showed that there were four collaboration motive types: brand competitiveness type, economic efficiency type, product planning type, and passive collaboration type. There were significant differences among the collaboration motive types in regard to collaboration areas, trust/devotion, and the performance/satisfactions of collaboration, and characteristics of companies. The brand competitiveness motive type tended to choose the marketing and brand collaboration areas, had a higher trust, and had higher scores on the performance and satisfactions of collaboration than did the other types.

Fashion Consumer Segmentation based on Interpersonal Trust Online

  • Ahn, Soo-kyoung
    • Journal of Fashion Business
    • /
    • v.22 no.3
    • /
    • pp.39-56
    • /
    • 2018
  • Since trusting in other consumers may refer to having similar needs and preferences on fashion goods with them, interpersonal trust can be a reliable and practical criterion for market segmentation online. Therefore, this study aims to identify fashion online consumers based on interpersonal trust. This study segments fashion consumers based on interpersonal trust and experience and describes characteristics of each segment by examining demo-psychographic and behavioral variables as well as clothing consumption values. An online survey was conducted to collect data from 426 adult consumers who had bought fashion goods from their patronized e-tailer in the past one month. They completed a self-administered questionnaire inquiring about interpersonal trust, trust in e-tailers, purchase intentions, clothing consumption values, and their purchasing behavior online. Two-step cluster analysis generated four segments: distrustful doers, trusting doers, inactive trusters, and distrusters. They exhibited different characteristics in gender, online experiences, interpersonal trust, clothing consumption values, trust in the e-tailers, and attitude toward the e-tailers. Providing a new effective segmentation base, this study suggests that fashion marketers identify customers with a high level of trust in other customers and develop an encouraging environment that customers can interact with others in order to increase the effectiveness of trust. Because customers with a higher level of interpersonal trust are likely to have stronger trust in e-tailers with, more favorable attitude and purchase intention, and highly perceive the value of clothing consumption than those who have a lower level of interpersonal trust.

A Unified Trust Model for Pervasive Environments - Simulation and Analysis

  • Khiabani, Hamed;Idris, Norbik Bashah;Manan, Jamalul-Lail Ab
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1569-1584
    • /
    • 2013
  • Ubiquitous interaction in a pervasive environment is the main attribute of smart spaces. Pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by known and even unknown parties. Huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors like context, recommendation, and history to calculate the trust level of each party precisely. Trusted computing enables effective solutions to verify the trustworthiness of computing platforms. In this paper, we elaborate Unified Trust Model (UTM) which calculates entity's trustworthiness based on history, recommendation, context and platform integrity measurement, and formally use these factors in trustworthiness calculation. We evaluate UTM behaviour by simulating in different scenario experiments using a Trust and Reputation Models Simulator for Wireless Sensor Networks. We show that UTM offers responsive behaviour and can be used effectively in the low interaction environments.

Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network

  • Zhou, Jingxian;Wang, Zengqi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1773-1795
    • /
    • 2020
  • Unmanned aerial vehicles (UAVs) network are a very vibrant research area nowadays. They have many military and civil applications. Limited bandwidth, the high mobility and secure communication of micro UAVs represent their three main problems. In this paper, we try to address these problems by means of secure clustering, and a security clustering algorithm based on integrated trust value for UAVs network is proposed. First, an improved the k-means++ algorithm is presented to determine the optimal number of clusters by the network bandwidth parameter, which ensures the optimal use of network bandwidth. Second, we considered variables representing the link expiration time to improve node clustering, and used the integrated trust value to rapidly detect malicious nodes and establish a head list. Node clustering reduce impact of high mobility and head list enhance the security of clustering algorithm. Finally, combined the remaining energy ratio, relative mobility, and the relative degrees of the nodes to select the best cluster head. The results of a simulation showed that the proposed clustering algorithm incurred a smaller computational load and higher network security.

The Study of System Security Technique for Mobile Ad Hoc Network (Mobile Ad Hoc Network에서 시스템 보안 기법에 관한 연구)

  • Yang, Hwan-Seok
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.33-39
    • /
    • 2008
  • Mobile Ad Hoc Network is easy to be attacked because nodes are distributed not network based infrastructure. Intrusion detection system perceives the trust values of neighboring nodes and receives inspection on local security of nodes and observation ability. This study applied clustering mechanism to reduce overhead in intrusion detection. And, in order to measure the trust values, it associates the trust information cluster head received from member nodes with its own value and evaluates the trust of neighboring nodes. Secure data transmission is received by proposed concept because the trust of nodes on network is achieved accurately.

  • PDF

A Survey of Trust Management in WSNs, Internet of Things and Future Internet

  • Chang, Kai-Di;Chen, Jiann-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.5-23
    • /
    • 2012
  • Nowadays, most researchers and manufacturers always pay attention on wireless sensor networks (WSNs) due to its potential applications in many regions such as military, industrial and civilian areas. WSNs are the basic components of Internet of Things (IoT) and the key to machine-to-machine communications and the future Internet. Also, the security is an essential element for deploying WSNs. Recently the concept of trust-based mechanism was proposed in WSNs such as traditional cryptographic and authentication mechanisms. However, there is lack a survey on trust management for WSNs, IoT even future Internet. In this paper, we discuss the concept and potential application areas of trust management for WSNs and IoT worlds. Furthermore, we survey different trust management issues (i.e., cluster, aggregation, reputation). Finally, future research directions with respect to trust management in WSNs and future IoT world are provided. We give not only simple WSNs for IoT environments but also a simulated bootstrap platform to provide the discussion of open challenges and solutions for deploying IoT in Future Internet.