• 제목/요약/키워드: Trust Cluster

검색결과 70건 처리시간 0.022초

Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network

  • Jin, Seung-Hun;Park, Chan-Il;Choi, Dae-Seon;Chung, Kyo-Il;Yoon, Hyun-Soo
    • ETRI Journal
    • /
    • 제27권4호
    • /
    • pp.465-468
    • /
    • 2005
  • This paper presents a new trust evaluation scheme in an ad hoc network. To overcome the limited information about unfamiliar nodes and to reduce the required memory space, we propose a cluster-based trust evaluation scheme, in which neighboring nodes form a cluster and select one node as a cluster head. The head issues a trust value certificate that can be referred to by its non-neighbor nodes. In this way, an evaluation of an unfamiliar node's trust can be done very efficiently and precisely. In this paper, we present a trust evaluation metric using this scheme and some operations for forming and managing a cluster. An analysis of the proposed scheme over some security problems is also presented.

  • PDF

소셜 트러스트 클러스터 효과를 이용한 견고한 추천 시스템 설계 및 분석 (Design and Analysis a Robust Recommender System Exploiting the Effect of Social Trust Clusters)

  • 노기섭;오하영;이재훈
    • 정보보호학회논문지
    • /
    • 제28권1호
    • /
    • pp.241-248
    • /
    • 2018
  • 추천시스템(Recommender System, RS)는 정보 과잉 공급 상태에서 사용자들에게 최적화된 정보를 제공하는 시스템이다. RS의 핵심은 사용자의 행동 결과를 정확하게 예측하는 것이다. 이러한 예측을 위해 Matrix Factorization (MF) 방식이 초기에 사용되었으며, 최근 SNS의 발달에 따라 Social Information을 추가적으로 활용하여 예측 정확도를 높이고 있다. 본 논문에서는 기존 연구에서 간과 되었던 RS 내부 trust cluster를 이용하여 추가적으로 성능을 향상시키고, trust cluster의 특성에 대하여 분석한다. 기존 방법론 3가지와 비교한 결과 본 논문에서 제안하는 방식이 가장 높은 정확도를 보임을 확인하였다.

Trust Predicated Routing Framework with Optimized Cluster Head Selection using Cuckoo Search Algorithm for MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제4권2호
    • /
    • pp.115-125
    • /
    • 2015
  • This paper presents a Cuckoo search algorithm to secure adversaries misdirecting multi-hop routing in Mobile ad hoc networks (MANETs) using a robust Trust Predicated Routing Framework with an optimized cluster head selection. The clustering technique designed in this framework leads to efficient routing in MANETs. The heavy work load in the node causes an energy drop in cluster head, which leads to re-clustering of the group, and another cluster head is selected to avoid packet loss during data transmission. The problem in the re-clustering process is that the overall efficiency of the routing process is reduced and the processing time is increased. A Cuckoo search based optimization algorithm is proposed to solve the problem of re-clustering by selecting the secondary cluster head within the initially formed cluster group and eliminating the reclustering process. The proposed framework enables a node to select a reliable and secure route for MANET and the performance can be evaluated by comparing the simulated results with the AODV routing protocol, which shows that the performance of the proposed routing protocol are improved significantly.

애드혹 환경에서 평판기반 신뢰 모델의 분류 및 성능평가 (Classification and Performance Evaluation of Reputation-Based Trust Model in Ad-hoc Networks)

  • 박성수;이종혁;정태명
    • 정보처리학회논문지C
    • /
    • 제16C권2호
    • /
    • pp.143-150
    • /
    • 2009
  • 신뢰 기반 네트워크에서 상호 통신 연결을 위해 상대 노드가 얼마나 믿을만한 노드 인지를 결정하는 문제가 가장 중요하다. 현재의 신뢰 기반 네트워크에서는 노드의 상태를 관찰함으로써 신뢰 값을 생성하고, 통신 노드를 평가하는 과정을 통해 상호 통신 연결을 수립한다. 본 논문에서는 애드혹 환경에서 새로운 노드가 클러스터 내로 진입하여 통신을 설정하고자 하는 대상 노드를 찾을 때, 사용될 수 있는 4가지의 신뢰모델을 제안한다. 제안된 모델들은 평판 서버의 유무와 신뢰의 평가 방법들에 따라 분류 되었다. 제안된 모델을 통해서, 평판 서버가 클러스터내에 존재하고 신뢰 평가 시 자신의 경험 정보뿐만 아니라 이웃 노드의 평판을 고려하는 경우 더 신속하게 대상 노드를 찾을 수 있음을 보인다. 제안된 모델의 성능 분석은 각 모델에서 노드의 최종 신뢰 값을 생성하기 위해 소요 되는 통신지연시간의 측정에 초점을 맞추었다.

한국 패션기업 콜레보레이션 동기 유형에 따른 콜레보레이션 분야, 신뢰와 몰입, 성과 및 만족도 (The Effect of Collaboration Motive Types on Collaboration Areas, Trust/devotion, and Performance/satisfaction in Fashion Business)

  • 홍원표;황진숙
    • 한국의류학회지
    • /
    • 제32권5호
    • /
    • pp.692-703
    • /
    • 2008
  • In the fashion enterprises of today, there are many kinds of inter-enterprises' collaborations which are related to the strategic management for reinforcing their competitiveness in various fields. These inter-enterprises' collaborations, which began to increase in the year 2000, will increase even more in the near future. The study investigated the differences of collaboration motive types in collaboration areas, trust/devotion, performance and satisfactions of collaborations, and characteristics of collaborated companies and their partners. A questionnaire was administered to 194 key employees of the fashion enterprises in Korea and the analysis was performed by factor analysis, cluster analysis, ANOVA, and $X^2$ test. The results showed that the collaboration motive had four factors: economic efficiency, business expansion, product planning improvement, and brand competitiveness increase. The cluster analysis showed that there were four collaboration motive types: brand competitiveness type, economic efficiency type, product planning type, and passive collaboration type. There were significant differences among the collaboration motive types in regard to collaboration areas, trust/devotion, and the performance/satisfactions of collaboration, and characteristics of companies. The brand competitiveness motive type tended to choose the marketing and brand collaboration areas, had a higher trust, and had higher scores on the performance and satisfactions of collaboration than did the other types.

Fashion Consumer Segmentation based on Interpersonal Trust Online

  • Ahn, Soo-kyoung
    • 패션비즈니스
    • /
    • 제22권3호
    • /
    • pp.39-56
    • /
    • 2018
  • Since trusting in other consumers may refer to having similar needs and preferences on fashion goods with them, interpersonal trust can be a reliable and practical criterion for market segmentation online. Therefore, this study aims to identify fashion online consumers based on interpersonal trust. This study segments fashion consumers based on interpersonal trust and experience and describes characteristics of each segment by examining demo-psychographic and behavioral variables as well as clothing consumption values. An online survey was conducted to collect data from 426 adult consumers who had bought fashion goods from their patronized e-tailer in the past one month. They completed a self-administered questionnaire inquiring about interpersonal trust, trust in e-tailers, purchase intentions, clothing consumption values, and their purchasing behavior online. Two-step cluster analysis generated four segments: distrustful doers, trusting doers, inactive trusters, and distrusters. They exhibited different characteristics in gender, online experiences, interpersonal trust, clothing consumption values, trust in the e-tailers, and attitude toward the e-tailers. Providing a new effective segmentation base, this study suggests that fashion marketers identify customers with a high level of trust in other customers and develop an encouraging environment that customers can interact with others in order to increase the effectiveness of trust. Because customers with a higher level of interpersonal trust are likely to have stronger trust in e-tailers with, more favorable attitude and purchase intention, and highly perceive the value of clothing consumption than those who have a lower level of interpersonal trust.

A Unified Trust Model for Pervasive Environments - Simulation and Analysis

  • Khiabani, Hamed;Idris, Norbik Bashah;Manan, Jamalul-Lail Ab
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권7호
    • /
    • pp.1569-1584
    • /
    • 2013
  • Ubiquitous interaction in a pervasive environment is the main attribute of smart spaces. Pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by known and even unknown parties. Huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors like context, recommendation, and history to calculate the trust level of each party precisely. Trusted computing enables effective solutions to verify the trustworthiness of computing platforms. In this paper, we elaborate Unified Trust Model (UTM) which calculates entity's trustworthiness based on history, recommendation, context and platform integrity measurement, and formally use these factors in trustworthiness calculation. We evaluate UTM behaviour by simulating in different scenario experiments using a Trust and Reputation Models Simulator for Wireless Sensor Networks. We show that UTM offers responsive behaviour and can be used effectively in the low interaction environments.

Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network

  • Zhou, Jingxian;Wang, Zengqi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권4호
    • /
    • pp.1773-1795
    • /
    • 2020
  • Unmanned aerial vehicles (UAVs) network are a very vibrant research area nowadays. They have many military and civil applications. Limited bandwidth, the high mobility and secure communication of micro UAVs represent their three main problems. In this paper, we try to address these problems by means of secure clustering, and a security clustering algorithm based on integrated trust value for UAVs network is proposed. First, an improved the k-means++ algorithm is presented to determine the optimal number of clusters by the network bandwidth parameter, which ensures the optimal use of network bandwidth. Second, we considered variables representing the link expiration time to improve node clustering, and used the integrated trust value to rapidly detect malicious nodes and establish a head list. Node clustering reduce impact of high mobility and head list enhance the security of clustering algorithm. Finally, combined the remaining energy ratio, relative mobility, and the relative degrees of the nodes to select the best cluster head. The results of a simulation showed that the proposed clustering algorithm incurred a smaller computational load and higher network security.

Mobile Ad Hoc Network에서 시스템 보안 기법에 관한 연구 (The Study of System Security Technique for Mobile Ad Hoc Network)

  • 양환석
    • 디지털콘텐츠학회 논문지
    • /
    • 제9권1호
    • /
    • pp.33-39
    • /
    • 2008
  • Ad Hoc Network는 인프라스트럭처 기반의 네트워크가 아니고 노드들이 분포되어 있기 때문에 공격을 받기가 쉽다. 침입탐지시스템은 다른 노드들의 신뢰 수준을 감지하고 노드의 로컬 보안에 대한 검사와 감시 능력을 제공한다. 본 논문에서는 침입 탐지를 하는데 오버헤드를 줄이기 위해 클러스터링 기법을 적용하였다. 그리고 노드들 간의 신뢰도를 측정하기 위해 클러스터 헤드가 멤버 노드로부터 받은 신뢰 정보와 자신의 정보를 조합하여 다른 노드의 신뢰도를 평가한다. 이렇게 함으로써 네트워크내의 노드들의 대한 인증을 정확하게 수행할 수 있게 되어 안전한 데이터 전송을 제공하게 된다.

  • PDF

A Survey of Trust Management in WSNs, Internet of Things and Future Internet

  • Chang, Kai-Di;Chen, Jiann-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.5-23
    • /
    • 2012
  • Nowadays, most researchers and manufacturers always pay attention on wireless sensor networks (WSNs) due to its potential applications in many regions such as military, industrial and civilian areas. WSNs are the basic components of Internet of Things (IoT) and the key to machine-to-machine communications and the future Internet. Also, the security is an essential element for deploying WSNs. Recently the concept of trust-based mechanism was proposed in WSNs such as traditional cryptographic and authentication mechanisms. However, there is lack a survey on trust management for WSNs, IoT even future Internet. In this paper, we discuss the concept and potential application areas of trust management for WSNs and IoT worlds. Furthermore, we survey different trust management issues (i.e., cluster, aggregation, reputation). Finally, future research directions with respect to trust management in WSNs and future IoT world are provided. We give not only simple WSNs for IoT environments but also a simulated bootstrap platform to provide the discussion of open challenges and solutions for deploying IoT in Future Internet.