Trust Computational Models for Mobile Ad Hoc Networks. Recommendation Based Trustworthiness Evaluation using Multidimensional Metrics to Secure Routing Protocol in Mobile Ad Hoc Networks.
PhD Thesis - Antesar Shabut -TRUST COMPUTATIONAL MODELS FOR MOBILE AD HOC NETWORKS.pdf (2.411Mb)Download
AuthorShabut, Antesar R.M.
SupervisorDahal, Keshav P.
Awan, Irfan U.
KeywordTrust, Reputation; Trust management; Trust Models; Mobile Ad Hoc Networks; Recommendation Management; Dishonest Recommendation; Multidimensional Trust Metric; Social Trust; QoS Trust; Networks
The University of Bradford theses are licenced under a Creative Commons Licence.
InstitutionUniversity of Bradford
DepartmentFaculty of Engineering and Informatics, School of Computing
MetadataShow full item record
AbstractDistributed systems like e-commerce and e-market places, peer-to-peer networks, social networks, and mobile ad hoc networks require cooperation among the participating entities to guarantee the formation and sustained existence of network services. The reliability of interactions among anonymous entities is a significant issue in such environments. The distributed entities establish connections to interact with others, which may include selfish and misbehaving entities and result in bad experiences. Therefore, trustworthiness evaluation using trust management techniques has become a significant issue in securing these environments to allow entities decide on the reliability and trustworthiness of other entities, besides it helps coping with defection problems and stimulating entities to cooperate. Recent models on evaluating trustworthiness in distributed systems have heavily focused on assessing trustworthiness of entities and isolate misbehaviours based on single trust metrics. Less effort has been put on the investigation of the subjective nature and differences in the way trustworthiness is perceived to produce a composite multidimensional trust metrics to overcome the limitation of considering single trust metric. In the light of this context, this thesis concerns the evaluation of entities’ trustworthiness by the design and investigation of trust metrics that are computed using multiple properties of trust and considering environment. Based on the concept of probabilistic theory of trust management technique, this thesis models trust systems and designs cooperation techniques to evaluate trustworthiness in mobile ad hoc networks (MANETs). A recommendation based trust model with multi-parameters filtering algorithm, and multidimensional metric based on social and QoS trust model are proposed to secure MANETs. Effectiveness of each of these models in evaluating trustworthiness and discovering misbehaving nodes prior to interactions, as well as their influence on the network performance has been investigated. The results of investigating both the trustworthiness evaluation and the network performance are promising.
Showing items related by title, author, creator and subject.
TruMet: An approach towards computing trust in multi-agent environment.Bista, Sanat K.; Dahal, Keshav P.; Cowling, Peter I.; Tuladhar, Bishwa R. (2006)The growing popularity of multi-agent based approaches towards the formation and operation of virtual organizations (VO) present over the Internet, offer both opportunities and risks. One of the risks involved in such community is in the identification of trustworthy agent partners for transaction. In this paper we aim to describe our trust model which would contribute in measuring trust in the interacting agents. Named as TruMet, the trust metric model works on the basis of the parameters that we have identified as relevant to the features of the community. The model primarily analyses trust value on the basis of the agent¿s reputation, as provided by the agent itself, and the agent¿s aggregate rating as provided by the witness agents. The final computation of the trust value is given by a weighted average of these two components. While computing the aggregate rating, a weight based method has been adopted to discount the contribution of possibly un-fair ratings by the witness agents.
Analysing the Critical Factors Influencing Trust in E-government Adoption from Citizens' Perspective: A Systematic Review and A Conceptual FrameworkAlzahrani, L.; Al-Karaghouli, W.; Weerakkody, Vishanth J.P. (2017-02)Although the success adoption of e-government contingent upon citizens' trust and their willingness to use it, little consideration has been paid to explore the adoption of e-government from citizens' trust perspective. This paper provides a critical and systematic review of the current literature on citizens’ trust in e-government, with a particular focus on the most critical factors influencing citizens’ trust in respect of the adoption of e-government. The extant literature was identified through six electronic databases, from 2000 to 2014. Academic articles were reviewed if they contained a relevant discussion of the antecedents or factors influencing citizens’ trust in e-government adoption. The findings of this review reveal that several studies have been conducted in the area of trust in e-government (particularly trust in government and trust in the internet) with limited consideration to citizen’s aspects of trust (such as personality, culture, gender, experience, education level, beliefs and value systems). Based on the findings of the review, a conceptual framework is proposed by developing the updated DeLone and McLean IS Success Model to establish a framework which presents the antecedents of trust in e-government adoption.
Detecting k-Balanced Trusted Cliques in Signed Social NetworksHao, F.; Yau, S.S.; Min, Geyong; Yang, L.T. (2014)k-Clique detection enables computer scientists and sociologists to analyze social networks' latent structure and thus understand their structural and functional properties. However, the existing k-clique-detection approaches are not applicable to signed social networks directly because of positive and negative links. The authors' approach to detecting k-balanced trusted cliques in such networks bases the detection algorithm on formal context analysis. It constructs formal contexts using the modified adjacency matrix after converting a signed social network into an unweighted one. Experimental results demonstrate that their algorithm can efficiently identify the trusted cliques.