We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Review and Reputation based Trust Score Calculation for WLAN (RRTSC)

by Amruta B. Pandule, Poonam N. Railkar, Parikshit N. Mahalle
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 81 - Number 3
Year of Publication: 2013
Authors: Amruta B. Pandule, Poonam N. Railkar, Parikshit N. Mahalle
10.5120/13990-2006

Amruta B. Pandule, Poonam N. Railkar, Parikshit N. Mahalle . Review and Reputation based Trust Score Calculation for WLAN (RRTSC). International Journal of Computer Applications. 81, 3 ( November 2013), 6-11. DOI=10.5120/13990-2006

@article{ 10.5120/13990-2006,
author = { Amruta B. Pandule, Poonam N. Railkar, Parikshit N. Mahalle },
title = { Review and Reputation based Trust Score Calculation for WLAN (RRTSC) },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 81 },
number = { 3 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume81/number3/13990-2006/ },
doi = { 10.5120/13990-2006 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:55:06.038511+05:30
%A Amruta B. Pandule
%A Poonam N. Railkar
%A Parikshit N. Mahalle
%T Review and Reputation based Trust Score Calculation for WLAN (RRTSC)
%J International Journal of Computer Applications
%@ 0975-8887
%V 81
%N 3
%P 6-11
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless networks are becoming more and more popular nowadays. These are widely used because they are easy to deploy. As these networks are essentially decentralized in nature they enhance the resource sharing and collaboration. The anonymous and open nature of system offers an almost ideal environment for unauthorized access of resources and also prone to different attacks in the network. These systems have to challenge the attacks like man-in-the-middle, replay and Denial of Service (DoS) attacks by anonymous malicious peers. So these systems have to protect themselves from these malicious nodes. For this purpose, before communication happens node must determine whether other nodes are trusted and in turn authorized to access resources or functionalities i. e. nodes must establish the trust before their interactions. Hence there is a need to have an effective Trust Management System which will establish a trust between the nodes in a network will update it periodically. This paper presents novel trust management model for trust score calculations to achieve trusted communication in WLAN network. This paper proposes a Review and Reputation based Trust Score Calculation (RRTSC) scheme for wireless networks and independent ad-hoc networks. This presents the trust based model for WLAN as an example of scenario of central authority assisted network which compute the trust for a node based in WLAN. In this trust establishment and trust maintenance between the two peers in WLAN is achieved by trusted central authority.

References
  1. S. Chen Y. Zhang G. Yang Nanjing University of Posts and Telecommunications, Nanjing, People's Republic of China "Parameter-estimation based trust model for unstructured peer-to-peer networks", The Institution of Engineering and Technology 2011
  2. "Reputation-based Trust Update in Network Environment" Shufen Peng, Jingsha He and Yao Meng , International Symposium on Electronic Commerce and Security, 2008
  3. F. Cornelli, E. Damiani, S. C. Vimercati, S. Paraboschi, and P. Samarati, "Choosing reputable systems in a P2P network". In the proceedings of the eleventh international conference on World Wide Web, Honolulu ,Hawaii ,USA, 2002.
  4. DMRep- K. Aberer, Z. Despotovic, "Managing Trust in peer to peer Information System", In Proc of the IX International Conference on Information and Knowledge Management, Atlanta, Georgia, 2001.
  5. D. kamvar, Mario T. Schlosser, "Eigen Trust Algorithm for Reputation Management in P2P networks", May 2003, ACM 1-58113-680-03/03/0005
  6. F. Cornelli, E. Damiani, S. C. Vimercati, S. Paraboschi, and P. Samarati, "A reputation based approach for choosing reliable resources in Peer to Peer networks", In CCs'02,Washington DC,USA,2002.
  7. K. Aberer and Z. Despotovic ,"Managing Trust in peer-2-peer Information System", Tenth International Conf in Information and Knowledge management 2008
  8. S Marsh "Formalising Trust as a Computational Concept", Ph. D. Thesis University of Stirling.
  9. J. Pujol, R. Sanguesa, "Extracting reputation in multi gent systems by means of social network topology", First International Joint Conference on Autonomous Agents and Multi-Agent Systems, Bologna, Italy.
  10. L. Page, S. Brin, R. Motwani, and T. Winograd, "The Pagerank Citation Ranking: Bringing Order to the Web," technical report, Stanford Digital Library Technologies Project.
  11. Erman Ayday, Student Member, IEEE, and Faramarz Fekri, Senior Member, IEEE "Iterative Trust and Reputation Management Using Belief Propagation" IEEE Transactions on dependable and secure computing, Vol. 9, No. 3, May/June 2012
  12. S. Buchegger and J. Boudec, "Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad Hoc Networks," Technical Report IC/2003/31, EPFL-DI-ICA, 2003.
  13. A. Whitby, A. Josang, and J. Indulska, "Filtering Out Unfair Ratings in Bayesian Reputation Systems," Proc. Seventh Int'l Workshop Trust in Agent Societies (AAMAS '04), 2004.
  14. D. Clarke, J Elien, C. Ellison, M Fredette, A Morcos, and R. L. Rivest, "Certificate Chain Discovery in SPKI/SDSI", Journal of Computer Security, Vol. 9, No. 4 ,2001, pp. 285-322. Proc. Of the IEEE Symposium om security and Privacy, My 2002, pp. 114-130.
  15. M. Blaze, J. Feigenbaum, and J. Lacy,"Decentralized trust management", IEEE Symp on Security and privacy, May 1996, pp. 164-173.
  16. Amit Mathur, Suneuy Kim, Mark Stamp, "Role based access control and JXTA peer-to-peer Framework" www. truststc. org,2005
  17. Kui MENG, Xu ZHANG, Xiao-chun XIAO, Geng-du ZHANG "A Bi-rating Based Personalized Trust Management Model for Virtual Communities" 1-4244-0065-1/06/$20. 00 2006 IEEE
  18. Wenjing Cui, Haiyang Wang, Qi Sui, Lizhen Cui, School of Computer Science and Technology, Shandong University, China "Towards a Trust Management Model for E-travel" 1-4244-0963-2/07/$25. 00 ©2007 IEEE.
  19. Jianli Hu1, Xiaohua Li, Bin Zhou, Yonghua Li, "A Reputation Based Attack Resistant Distributed Trust Management Model in P2P Networks", 2010 Third International Symposium on Electronic Commerce and Security
  20. Hui Xia, Zhiping Jia *, Xin Li, Feng Zhang School of Computer Science and Technology Shandong University Jinan, P. R. China "A Subjective Trust Management Model based on AHP for MANETs", 2011 International Conference on Network Computing and Information Security
  21. Ryma Abassi , Sihem Guemara El Fatmi, Higher School of Communication, Sup'Com University of Carthage Tunis, Tunisia" Towards A Genric Trust Management Model" , 19th International Conference on Telecommunications (ICT 2012), 978-1-4673-0747-5/12/$31. 00 ©2012 IEEE
  22. Xiaodong Sun School of Information Science and Engineering Northeastern University Guiran Chang, Fengyun Li school of Information Science and Engineering Northeastern University Shenyang, P. R. China, "A Trust Management Model to enhance security of Cloud Computing Environments", 2011 Second International Conference on Networking and Distributed Computing, 978-0-7695-4427-4/11 $26. 00 © 2011 IEEE
  23. Thomas Beth, Malte Borcherding & Birgit Klein, Valuation of Trust in Open Networks, ESORICS 94, Nov 1994.
Index Terms

Computer Science
Information Sciences

Keywords

Trust Reputation Trust Management System.