We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Security Threats of Collusion-based Linguistic Fuzzy Trust Model for WSN

by Firas Ali Al-juboori, Sura F. Ismail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 12
Year of Publication: 2013
Authors: Firas Ali Al-juboori, Sura F. Ismail
10.5120/11446-7041

Firas Ali Al-juboori, Sura F. Ismail . Security Threats of Collusion-based Linguistic Fuzzy Trust Model for WSN. International Journal of Computer Applications. 67, 12 ( April 2013), 10-18. DOI=10.5120/11446-7041

@article{ 10.5120/11446-7041,
author = { Firas Ali Al-juboori, Sura F. Ismail },
title = { Security Threats of Collusion-based Linguistic Fuzzy Trust Model for WSN },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 12 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 10-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number12/11446-7041/ },
doi = { 10.5120/11446-7041 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:24:27.989875+05:30
%A Firas Ali Al-juboori
%A Sura F. Ismail
%T Security Threats of Collusion-based Linguistic Fuzzy Trust Model for WSN
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 12
%P 10-18
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the last few years management of trust and reputation models over distributed systems has been proposed as a novel and accurate way of dealing with some security deficiencies which are inherent to distributed environments. Many models and theories have been designed in order to effective and accurately manage trust and reputation in those environments. Nevertheless, very few of them take into consideration all the possible security threats that can compromise the system. In this paper, an analysis of the effect of the security threats on the selection percentage of trustworthy servers (the accuracy) and average path length suggested by the Linguistic Fuzzy Trust Model over static Wireless Sensor Network are presented. It is observed that the accuracy of the model with collusion decreases as com¬pared to the accuracy of the model without collusion while the results about the average path length suggested by the model are better and the change in it by varying the number of trustworthy servers is very low, so the average path length of the model with collusion is better than of it without collusion. Also it must be mentioned that the evaluation environment used in this paper is Trust and Reputation Model Simulator for Wireless Sensor Network.

References
  1. Marsh, S. P. 1994 Formalising Trust as a Computational Concept. Doctoral Thesis, Department of Compu¬ting Science and Mathematics, University of Stirling.
  2. Marti, S. , and Garcia-Molina, H. 2006. Taxonomy of trust: categorizingP2P reputation systems. Com¬puter Networks, 50(4):472–484.
  3. Tajeddine A, Kayssi A, Chehab A, Artail H. 2006. PATROL-F- a comprehensive reputation-based trust model with fuzzy subsystems. Third international conference. ATC, LNCS, Wuhan, China: Springer, vol. 4158, p. 205–17.
  4. Wang Y, Cahill V, Gray E, Harris C, Liao L. 2006. Bayesian network based trust management. Third international conference. ATC, LNCS, Wuhan, China: Springer, vol. 4158 p. 246–57.
  5. Gómez Mármol F, Martínez Pérez G, "Providing trust in wireless sensor networks using a bio in¬spired technique", Telecommunication System Journal, 46(2):163–180, 2011.
  6. Almena´ rez F, Mar?´n A, Campo C, Garc?´a C. 2004. PTM: a pervasive trust management model for dynamic open environments. First workshop on pervasive security and trust, Boston, USA.
  7. Moloney M, Weber S. 2005. A context-aware trust based security system for ad hoc networks. In: Workshop of the 1st international conference on security and privacy for emerging areas in communication networks, p. 153–60, Athens,Greece.
  8. Boukerche A, Xu L, El-KhatibK . 2007. Trust based security for wireless ad hoc and sensor networks. Computer Communications, 30(11–12):2413–27.
  9. Sabater J, Sierra C. 2001. REGRET: reputation in gregarious societies. Proceedings of the fifth Inter¬national conference on autonomous agents. ACM Press, p. 194–5, Montreal, Canada.
  10. Josang A, Ismail R, Boyd C . 2007. A survey of trust and reputation systems for online service provi¬sion. Decision Support Systems, 43(2):618–44.
  11. Sabater J, Sierra C. 2005. Review on computational trust and reputation models. Artificial Intelli¬gence Review, 24(1): 33–60.
  12. Dorigo, M. , and Gambardella, L. 1997. Ant colony system: a cooperative learning approach in the traveling salesman problem. IEEE Transaction on Evolutionary Computing, 1(1):53–66.
  13. Pedrycz W, Gomide F. 1998. An Introduction to Fuzzy Sets: Analysis and Design. The MIT Press: Cambridge, Masssachusetts , USA.
  14. Jang JSR, Sun CT, Mizutani E. 1997 Neuro Fuzzy and Soft Computing. Prentice Hall: Upper Saddle River, New Jersey, USA.
  15. GómezMármol F, Gómez Marín-Blázquez J, Martínez Pérez G. 2011. Linguistic fuzzy logic enhancement of a trust mechanism for distributed networks. Proceedings of the Third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-10), 838–845, DOI: 10. 1109/CIT. 2010. 158, Bradford, UK.
  16. GómezMármol F, Martínez Pérez G,"Security threats scenarios in trust and reputation models for distributed systems", Elsevier Computers & Security, 28(7):545–556, 2009.
  17. Gómez Mármol F, Martinez Pérez G. 2009. TRMSim-WSN, Trust and Reputation Models Si¬mulator for Wireless Sensor Networks. Proceedings of the IEEE International Conference on Communications, Communication and Information Systems Security Symposium. DOI:10. 1109/ICC. 5199545,Dresden, Germany.
Index Terms

Computer Science
Information Sciences

Keywords

Collusion Fuzzy Security Threats Sensor Networks