• Title/Summary/Keyword: Trust Mechanism

Search Result 165, Processing Time 0.023 seconds

A Distributed Decision-Making Mechanism for Wireless P2P Networks

  • Wu, Xu;He, Jingsha;Xu, Fei;Zhang, Xi
    • Journal of Communications and Networks
    • /
    • v.11 no.4
    • /
    • pp.359-367
    • /
    • 2009
  • Trust-based solutions provide some form of payment to peers to encourage good behavior. The problem with trust management systems is that they require prior knowledge to work. In other words, peers are vulnerable to attack if they do not have knowledge or correct knowledge of other peers in a trust management system. Therefore, considering only trust is inadequate when a decision is made to identify the best set of peers to utilize. In order to solve the problem, we propose a distributed decision-making mechanism for wireless peer-to-peer (P2P) networks based on game theory and relevant trust mechanisms in which we incorporate the element of trust and risk into a single model. The main idea of our mechanism is to use utility function to express the relationship between benefits and costs of peers, and then make the decision based on expected utility as well as risk attitude in a fully distributed fashion. The unique feature of our mechanism is that it not only helps a peer to select its partners, but also mitigates vulnerabilities in trust-based mechanisms. Through analysis and experiments, we believe our approach is useful for peers to make the decision regarding who to interact with. In addition, it is also a good starting point for exploring tradeoffs among risk, trust and utility.

Research on 5G Core Network Trust Model Based on NF Interaction Behavior

  • Zhu, Ying;Liu, Caixia;Zhang, Yiming;You, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3333-3354
    • /
    • 2022
  • The 5G Core Network (5GC) is an essential part of the mobile communication network, but its security protection strategy based on the boundary construction is difficult to ensure the security inside the network. For example, the Network Function (NF) mutual authentication mechanism that relies on the transport layer security mechanism and OAuth2.0's Client Credentials cannot identify the hijacked NF. To address this problem, this paper proposes a trust model for 5GC based on NF interaction behavior to identify malicious NFs and improve the inherent security of 5GC. First, based on the interaction behavior and context awareness of NF, the trust between NFs is quantified through the frequency ratio of interaction behavior and the success rate of interaction behavior. Second, introduce trust transmit to make NF comprehensively refer to the trust evaluation results of other NFs. Last, classify the possible malicious behavior of NF and define the corresponding punishment mechanism. The experimental results show that the trust value of NFs converges to stable values, and the proposed trust model can effectively evaluate the trustworthiness of NFs and quickly and accurately identify different types of malicious NFs.

The Relationship between Control Mechanism and Commitment in Information Systems Outsourcing : The Mediating effects of Trust (아웃소싱 기업간 통제와 관계 몰입에 있어서 신뢰 매개 역할에 관한 연구)

  • Choi, Jae Woong;Han, Man Yong;Jung, Byoung Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.251-265
    • /
    • 2010
  • Recently, with increasing interest in the subject of interfirm relationship mechanism, some information systems researchers point out that existing outsourcing theories are limited in explaining the choice of governance mechanisms in interfirm relational exchanges. Recognizing the importance of trust-commitment, this study focuses on the relationship of between control mechanism and commitment. Especially the role of trust as mediator is mainly researched. A mediation model was suggested on the basis of theoretical linkages from prior relevant studies. The research model was empirically tested with 73 IS outsourcing projects. The findings have significant impactions for further research and practice. Findings are as follows: First, outcome control, process control, social control had positive effects on trust and commitment. Second, inter-organizational trust played as a partial mediator on the relationship between control mechanisms and commitment. Based on these findings, the implication and the limitation of the study were presented including some directions for future studies.

Design and Implementation about Trust Evaluation Mechanism of Distributed Services In Mobile Ad-hoc Network (Mobile Ad-hoc Network 상의 분산된 서비스에 대한 신뢰도 평가 기법 설계 및 구현)

  • Jang, Jong-Deok;Ryu, Hwang-Bin;Yoon, Chang-Pyo
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.29-34
    • /
    • 2009
  • The many transaction occurs because of service will not be able to trust in mobile Ad-hoc Network. Overcomes like this problem point with the plan for, This paper proposes the trust evaluation mechanism which is the possibility becoming the standard of the node selection which provides a better service by using the transaction message which is basic occurs from within the mobile Ad-hoc network and in the transaction message which is additional. At last, this paper embodies the trust mechanism which proposes, confirms the trust value which is evaluated with NS2 simulator.

  • PDF

Node-Level Trust Evaluation Model Based on Blockchain in Ad Hoc Network

  • Yan, Shuai-ling;Chung, Yeongjee
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.169-178
    • /
    • 2019
  • Due to the characteristics of an ad hoc network without a control center, self-organization, and flexible topology, the trust evaluation of the nodes in the network is extremely difficult. Based on the analysis of ad hoc networks and the blockchain technology, a blockchain-based node-level trust evaluation model is proposed. The concepts of the node trust degree of the HASH list on the blockchain and the perfect reward and punishment mechanism are adopted to construct the node trust evaluation model of the ad hoc network. According to the needs of different applications the network security level can be dynamically adjusted through changes in the trust threshold. The simulation experiments demonstrate that ad-hoc on-demand distance vector(AODV) Routing protocol based on this model of multicast-AODV(MAODV) routing protocol shows a significant improvement in security compared with the traditional AODV and on-demand multipath distance vector(AOMDV) routing protocols.

Success Factors of Knowledge Acquisition: The Absorptive Capacity Perspective on Adopters of ERP Packages (외부지식 획득성과의 영향 요인에 관한 연구: ERP 패키지 도입업체의 흡수역량 관점)

  • Suh, Hyun-Ju;Kim, Hyo-Gun
    • Asia pacific journal of information systems
    • /
    • v.12 no.4
    • /
    • pp.139-172
    • /
    • 2002
  • Comtemporary firms need capability of acquiring external knowledge and internalizing it to cope with environmental fluctuation. The paper analyzes the impact of absorptive capacity, an ability to recognize and utilize external knowledge, on knowledge acquisition of the firm, and examines the role of trust in the knowledge acquisition process. Data were collected from 84 domestic companies that had adopted ERP packages. The results indicate that prior experiences of knowledge acquisition, communication mechanism, and conflict resolution mechanism affect knowledge acquisition positively. Among those independent variables, communication mechanism and conflict resolution mechanism significantly and positively related with trust. Trust is, in turn, positively associated with knowledge acquisition. Meanwhile, previous knowledge base and prior relationship with the knowledge provider do not affect knowledge acquisition. Further, the results provide evidence that trust plays a mediating role between other absorptive capacity factors and knowledge acquisition.

Emergence of Inter-organizational Collaboration Networks : Relational Capability Perspective (기업 간 협업 네트워크의 창발 : 관계 역량을 중심으로)

  • Park, Chulsoon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.40 no.4
    • /
    • pp.1-18
    • /
    • 2015
  • This paper proposes relational capability as a main driver of constructing inter-organizational collaboration networks. Based on social network theory and relational view literature, three components of relational capability are constructed and implemented by an agent-based model. The components include organizational capability, structural capability, and trust between a partner and a focal firm. These three components are updated by two micro mechanisms: structural mechanism and relational mechanism. Structural mechanism is a feedback loop in which the relational capability increases structural capability and vice versa. Relational mechanism is a learning-by-doing process in which a focal firm experiences success or failure of collaboration and the experience increases or decreases cumulative trust in a partner firm. Result of agent-based simulation shows that a collaboration network emerges through interactions of firm's relational capabilities and the characteristics of emerged networks vary with the contribution of structural capability and trust to relational capability. Specifically, in case structural capability contributes more to relational capability, the average degree centrality and collaboration proportion increases as time passes and enters into an equilibrium state. In that case, almost every firms participated in the network collaborates each other so that the emerged network becomes highly cohesive. In case trust contributes more to relational capability, the results are reversed. In an equilibrium state, the balance of contribution between structural capability and trust makes an emerged network larger and maximizes average degree centrality of the network.

Analyzing the Relationships among Intention to Use, Satisfaction, Trust, and Perceived Effectiveness of Review Boards as Online Feedback Mechanism in Shopping Websites (온라인 피드백 메커니즘으로서 상품평 게시판의 지각된 효과성과 신뢰, 만족, 이용의도간의 관계구조분석)

  • Kim, Seung-Woon;Kang, Hee-Taek
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.2
    • /
    • pp.53-69
    • /
    • 2007
  • Internet shopping websites have offered comfort to consumers in shopping and built trust relationships with them by providing electronic agents for recommendation, escrow services, and customer centers etc. But as there is little big difference among the shopping websites in terms of technical competence, website design, operational policy, they recognize online feedback (reviews or recommendation of consumers or experts) and online feedback mechanism as important marketing tools. Based on online feedback related studies, this study explores antecedents (consensus, vividness of reviews, interactions in review boards) of the perceived effectiveness of review boards which are text-based feedback mechanisms and its consequences such as trust, satisfaction, and intention to use. The results show that the perceived effectiveness of review boards is significantly affected by vividness of reviews and interactions in review boards, and the impact of interaction in review boards on the perceived effectiveness of review boards is stronger than that of vividness of reviews. The results also show that the perceived effectiveness of review boards has a significant influence on trust and satisfaction with the shopping websites, and intention to use is influenced by both trust and satisfaction.

Extended Trust Evaluation Mechanism Considered Confidence Value of Distributed Service in Mobile Ad-hoc Network (Mobile Ad-hoc Network 상에서 분산된 서비스에 대한 확신 값을 고려한 확장된 신뢰도 평가 기법)

  • Jang, Jong-Deok;Yoon, Chang-Pyo;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.51-57
    • /
    • 2010
  • This paper proposes extended trust evaluation mechanism which is able to become the standard of the node selection which provides a better service by using the basic transaction message which occurs from within the mobile Ad-hoc network and the additional transaction message and add confidence value. Furthermore, throughout the simulation shows the efficiency of the proposed trust evaluation mechanism.

Dynamic Cloud Resource Reservation Model Based on Trust

  • Qiang, Jiao-Hong;Ning, Ding-Wan;Feng, Tian-Jun;Ping, Li-Wei
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.377-395
    • /
    • 2018
  • Aiming at the problem of service reliability in resource reservation in cloud computing environments, a model of dynamic cloud resource reservation based on trust is proposed. A domain-specific cloud management architecture is designed in which resources are divided into different management domains according to the types of service for easier management. A dynamic resource reservation mechanism (DRRM) is used to test users' reservation requests and reserve resources for users. According to user preference, several resources are chosen to be candidate resources by fuzzy cluster analysis. The fuzzy evaluation method and a two-way trust evaluation mechanism are adopted to improve the availability and credibility of the model. An analysis and simulation experiments show that this model can increase the flexibility of resource reservation and improve user satisfaction.