SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
RISK ASSESSMENT ALGORITHM IN WIRELESS 
SENSOR NETWORKS USING BETA DISTRIBUTION 
Mohammad Momani1, Maen Takruri2 and Rami Al-Hmouz3 
1University of Technology, Sydney, Australia 
2American University of Ras Al Khaimah, United Arab Emirates 
3King Abdulaziz University, Saudi Arabia 
ABSTRACT 
This paper introduces the Beta distribution as a novel technique to weight direct and indirect trust and 
assessing the risk in wireless sensor networks. This paper also reviews the trust factors, which play a major 
role in building trust in wireless sensor networks and explains the dynamic aspects of trust. This is an 
extension of a previous work done by the authors using a new approach to assess risk. Simulation results 
related to the previous work and to the new approach introduced in this paper are also presented for easy 
comparison. 
KEYWORDS 
Wireless Sensor Networks, Trust, Algorithm, Risk, Beta Distribution 
1. INTRODUCTION 
Trust establishment is a prerequisite for any network to function, that is, establishing trust 
between nodes is the first step in building the actual Wireless Sensor Network (WSN), as the 
creation, operation, management and survival of the WSN are dependent upon the cooperative 
and trusting nature of its nodes. Modelling trust requires a thorough understanding of the dynamic 
aspects of trust and the factors that affect trust [1]. So, in this paper, a new risk assessment 
algorithm for establishing trust in WSNs using Beta distribution is presented after introducing the 
trust factors and the main aspects of trust. This algorithm is adopting new techniques unique to 
WSNs. More details about the algorithm can be found in [1], which is omitted from this paper to 
avoid repetition. 
Whenever a node in a WSN decides on whether or not to communicate with other nodes, it has to 
assess the other nodes’ trustworthiness. Trust-modelling represents the trustworthiness of each 
node in the opinion of another node; thus each node associates a trust value with every other node 
[2], and, based on that trust value, a risk value required from the node to finish a job can be 
calculated. Section 2 in this paper introduces the trust factors, followed by dynamic aspects of 
trust discussed in section 3. Risk assessment algorithm using Beta distribution is discusses in 
section 4. Simulation results are presented in section 5 and section 6 concludes the paper. 
2. TRUST FACTORS 
As discussed in our previous work presented in [1], the main factors that affect the trust 
evaluation process of one node about other nodes are: 
• Direct interactions 
DOI : 10.5121/ijcnc.2014.6511 157
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
158 
• Indirect interactions 
• Reputation 
• Risk 
Direct interactions are based on self-experience or observations by one node of the other node’s 
behaviour. A watchdog mechanism is required on each node to monitor the behaviour of other 
nodes in the surrounding. 
Indirect interactions are based on recommendations from other trusted nodes in the surrounding 
area about that other node. A propagation mechanism is required to propagate the 
recommendations. 
Reputation represents the past behaviour of a node in the absence of direct experience or 
recommendations. 
Risk refers to the amount of risk the node is ready to take in the case of forming trust with new or 
unknown nodes, or in case the trust value between nodes is less than a required trust value to 
finish a job. 
Every node in the network keeps a trust table for all the surrounding nodes it interacts with, which 
can include the direct trust with each node, the indirect trust, the update on both trusts, the total or 
combined trust and eventually the risk associated with each node. 
3. DYNAMIC ASPECTS OF TRUST 
One of the trust characteristics is dynamism, that is, trust is dependent on time, it can increase or 
decrease as new evidence becomes available, so the process needs to be evaluated continuously. 
Dynamic aspects of trust, such as the formation, evolution, revocation and propagation of trust 
have been discussed in depth in [3]. A brief discussion about trust formation and trust evolution in 
WSNs is presented below. 
3.1. Trust Formation 
Establishing trust between nodes in WSNs is the most important dynamic aspect of trust. Trust 
formation in WSN is the process of establishing the initial trust between nodes and in general it 
involves the assessment of the two main sources for calculating trust, direct and indirect 
interactions. Figure 1, below, shows a general trust computational model used to calculate trust in 
WSNs. The reputation factor is omitted from Figure 1, because it represents the past direct and 
indirect trust. The dispositional trust (risk) is introduced as a third source for trust calculations. 
The total trust is calculated by combining both trust values, direct and indirect. Knowing the trust 
value will lead to the risk involved in the interaction: the lower the trust value, the higher the risk, 
and the higher the trust value, the lower the risk.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
159 
Direct Trust Indirect Trust 
Trust calculation Dispositional Trust 
(Risk) 
Trust value 
Figure 1. General trust computational model [1] 
Initially, when nodes are just being deployed for the first time or when new nodes are introduced 
to the network, the presence of some optimistic nodes willing to take risks is required, as there is 
no evidence of nodes’ past behaviour. Initial trust value between nodes can be assigned based on 
the applications and/or the deployed environment as discussed in [1]. 
3.2. Trust Evolution 
The evolution process is another important dynamic aspect of trust and can be regarded as 
iterating the process of trust formation as additional evidence becomes available. It is the process 
of updating the trust level between nodes. Trust values regarding other nodes should be 
maintained locally and updated periodically as new evidence becomes available, and that will 
eventually change the risk assessment of the node. In order for nodes in a network to receive 
updates regarding the trusted behaviours of nodes or even threats, a mechanism for trust reporting 
is necessary. 
As previously discussed in [1], updating trust can be achieved using the first-hand information 
only: direct trust, as in [4], the second-hand information only: indirect trust, as in [5, 6], the 
indirect positive trust only, as in [7, 8]; and/or both: direct and indirect trust, as in [9-18]. As can 
be seen, most systems proposed so far use both: first-hand and second-hand information. 
The main issue here is how to combine these two trust sources to achieve the total trust. The 
traditional answer to this question is to combine them using the “weighting” approach. Some trust 
systems give more weights to the old experience, some give more weight to recent experience and 
others give more weight to direct trust rather than to indirect trust. In summary, the trust evolution 
process involves: updating direct trust, updating indirect trust and updating total trust, based on 
the updated values of direct and indirect trust. 
4. RISK ASSESSMENT ALGORITHM 
Based on the above discussion regarding trust factors and dynamic aspects of trust, a new 
algorithm for establishing trust in WSNs was presented as a flowchart in our work presented in 
[1]. The whole idea of the algorithm given in [1] is that there is a risk value associated with every 
job to be processed by a node, which is derived from the trust value required to do a specific task. 
The first thing a node will do if it has been asked to perform a task, is to compare the predefined 
risk value associated the task with the actual risk between the two nodes, and if the risk value is 
less than the predefined threshold, then the task will be performed, otherwise the task will be 
declined unless the node is ready to take that risk. The algorithm is just comparing risk values and 
combining direct trust and indirect trust to achieve the total trust and eventually calculate the
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
actual risk associated, that is, it does not calculate the direct or indirect trust, but the node itself 
does that. A more detailed illustration of the algorithm follows. 
It is assumed that there is a required trust value (T) associated with each job to be processed by a 
node and eventually a risk value is derived from that trust value. The trust value (T) is then tested 
against the sources of trust, the direct trust value (A), the indirect trust value (B), and the 
combined trust value (C) and at the same time calculates the risk value (R). If any combination of 
these values is greater than or equal to the required trust value, that is, the risk value is less than or 
equals to the predefined risk value (threshold), then the job will be processed, otherwise it will be 
declined unless the node is ready to take the risk associated with that job. 
It is assumed that nodes are capable of calculating (A), (B) and (R) using their own criteria, be 
this as presented in [19] using weight and situational trust or as presented in [20] using weight 
and rating or any other criteria specific to a node. The challenge here, as discussed before, is how 
to calculate the combined trust value (C) as it represents a data fusion. In the following section a 
new statistical approach is presented to weight the direct and indirect trust. 
160 
4.1. Combined Trust 
Combining direct trust and indirect trust to obtain the total trust of one node on the others was and 
still is the issue for many researchers. Most of the models, which use the weighting approach, 
assign different weights to each trust type without describing the methodology behind their 
assignments. Here, a new methodology using the Beta distribution is introduced to weight 
different trust components - direct trust value (A) and indirect trust value (B) - and eventually to 
calculate the total trust. The reason behind using the Beta distribution is that, it is being used 
widely in risk and decision analysis, due to its flexibility, and also it can be estimated very easily 
[8, 10]. 
The density function for a beta random variable X on domain [0, 1] is given by equation (1): 
( ) 1 1 ( , ) (1 ) 
a b a b a b 
G + − − = − 
G G 
f x x 
( ) ( ) 
a b 
(1) 
p is the probability that the event occurs 
p ı Beta (a ,b ) (2) 
Substituting equation (2) in equation (1) will result in the following density function given in (3): 
( ) 1 1 
f p p p a b a b 
G + − − 
( ) (1 ) 
= − 
G ( a ) G 
( b 
) 
(3) 
The expected value μ is given in equation (4): 
E( p) 
a 
a b 
= 
+ 
(4) 
2 is given in equation (5): 
and the variance  
2 
( ) 
( ) 
* 
( 1) ( ) 
V p 
a b 
a b a b 
= 
+ + * + 
(5)
International Journal of Computer Networks  Communications (IJCNC) Vol.6, No.5, September 2014 
161 
It is assumed that trust value (A) provides the prior estimate for p, as given in equation (6): 
a 
a b 
( ) A ˆ 
= = 
A A E p P 
+ 
A A 
(6) 
and the variance value, as given in equation (7): 
( ) 2 A A V p =s (7) 
From the above illustration in equations (6) and (7), A a and A b can be represented as in 
equations (8) and (9) respectively: 
  
  
  
  
ˆ ˆ P (1 − 
P 
ˆ ) A A 1 
= − (8) 
2 
A A 
A 
a P 
s 
(1 ˆ ) 
ˆ 
A A 
A 
A 
P 
P 
a 
b 
* − 
= (9) 
Trust value (B) provides the estimate ˆB p of p, as given in equation (10): 
a 
( ) = B = 
ˆ 
B B 
E p P 
+ 
a b 
B B 
(10) 
and the variance value as given in equation (11): 
( ) 2 B B V P =s (11) 
From equations (10) and (11), B a and B b can be represented as in equations (12) and 
(13) respectively: 
  
  
  
  
ˆ ˆ P (1 − 
P 
ˆ ) B B 1 
= − (12) 
2 
B B 
B 
a P 
s 
(1 ˆ ) 
ˆ 
B B 
B 
B 
P 
P 
a 
b 
* − 
= (13) 
Assuming that trust value (A) represents the prior, then according to Bayes’ theorem [21], 
( | ˆ ) ( ˆ | ) ( ) B B P p P µ P P p *P p (14) 
where, P( p) represents the prior and equals to ( , ) A A Beta a b , and ( ˆ | ) B P P p is the likelihood, 
which needs to be modelled. 
From the above discussion, equation (14) can be rewritten as shown in equation (15):
International Journal of Computer Networks  Communications (IJCNC) Vol.6, No.5, September 2014 
162 
1 1 1 
− − − 
( | ˆ ) 1 
(1 ) (1 ) 
B B A A 
µ − − 
P p P p p p p 
( + − 1 − 1) ( + 
) 
(1 ) 
1 , 1) 
( 
A B 
A B 
A B A B 
B 
p 
p 
Beta 
b a b 
b b 
a 
a a 
a a b b 
− 
− 
− + − 
µ 
ı + 
(15) 
Substituting equation (15) in equation (4), the following expected value will result, as shown in 
equation (16): 
( | ˆ ) 
1 1 
a + a a + 
a 
A B A B 
= = 
2 B 
A B A B K 
E p P 
b b 
a a 
+ 
− − 
+ − 
+ 
(16) 
Let K in equation (16) be represented as given in equation (17): 
2 A B A B K =a +a +b +b − (17) 
So, equation (16) can be written as given in equation (18): 
( 
a a a a a 
a a a 
ˆ )( 1) ( | ) 
B 
A A A B B B B 
A A B B B K K 
E p P 
b b 
b b 
− 
= * + * 
* 
+ + 
+ + 
(18) 
( | ˆ ) B E p P in equation (18) simply represents the combined trust value, and can be written as 
shown below in equation (19): 
( | ˆ ) ˆ * ˆ B A A B B E P P = P W + P *W (19) 
As can be seen from equations (18) and (19), the weights for direct trust A W and indirect trust B W 
are represented in equations (20) and (21) respectively: 
+ 
a b 
= 
W A A 
A 
K 
(20) 
( )( 1) 
B 
a b a 
B B B 
B 
W 
K 
a 
− 
= 
* 
+ 
(21) 
If the trust values (A) and (B) are known, then it is very easy to calculate, A a , A b , B a and B b , 
as shown in equations (8), (9), (12) and (13), and eventually A W and B W will be calculated using 
equations (20) and (21) respectively. 
As discussed before, the total trust value is a combination of direct trust and indirect trust values. 
One way of combining these trust values using the probability theory has been presented here. 
5. SIMULATION RESULTS 
This section presents two example simulations conducted on two different networks using 
MATLAB. The first network consists of three nodes for simplicity, and to be able to verify the 
algorithm and show the results in tables as illustrated below. The second simulation is for a
International Journal of Computer Networks  Communications (IJCNC) Vol.6, No.5, September 2014 
network of fifteen nodes to further verify the algorithm when the number of nodes is high, and to 
show the results in a graph, as described below. 
163 
5.1. Three Nodes Network Simulation 
Figure 2 below depicts a network topology of three nodes. Trust values between nodes are 
asymmetric, which means that the trust value from node (1) to node (2) is different from the trust 
value from node (2) to node (1). Table 1 below shows the complete direct trust values (A) 
between nodes, the required trust values (T) between nodes to perform the task, the indirect trust 
values (B) from the surrounding nodes, the combined trust values (C) and the risk values (R). 
As can be seen from Table 1 below, the diagonal values for T and R are always zeros, which 
reflects the required trust value and the risk value associated with the node to itself; that is, there 
is no required trust value or risk associated with a node when it is doing a job for itself. The same 
is valid for A, B and C, which have the diagonal values set to ones, which means the node blindly 
trusts itself; all the values in the diagonals in all tables are from the node to itself and they do not 
participate in the calculations. The risk value (R) of (0) in the diagonal means the risk from the 
node to itself as mentioned before, and the other (0) values, not in the diagonal, mean the actual 
trust is greater than or equal to the required trust and there is no need for any risk to be taken. 
Figure 2. Network graph of three nodes 
Table 1 below consists of two columns, the first column is related to trust and risk values between 
nodes calculated using the traditional method presented in [1] and the second column is related to 
trust and risk values between nodes calculated using the new method (Beta distribution) presented 
in this paper. 
Table 1. Risk and Trust Values between nodes 
Traditional weighting method used to weight 
A and B 
The New (Beta distribution) weighting 
method used to weight A and B 
T = 
0 0.4546 0.7148 
0.7688 0 0.5383 
0.5846 0.2413 0 
 A 
1.0000 0.5133 0.6844 
0.5141 1.0000 0.1610 
0.4685 0.7003 1.0000 
T = 
0 0.4546 0.7148 
0.7688 0 0.5383 
0.5846 0.2413 0 
 A 
1.0000 0.5133 0.6844 
0.5141 1.0000 0.1610 
0.4685 0.7003 1.0000
International Journal of Computer Networks  Communications (IJCNC) Vol.6, No.5, September 2014 
164 
 B 
1.0000 0.7578 0.0445 
0.8596 1.0000 0.5953 
0.4558 0.0777 1.0000 
 C 
1.0000 0 0.4693 
0 1.0000 0 
0.4928 0 1.0000 
 R 
0 0 0.2455 
0 0 0 
0.0918 0 0 
 B 
1.0000 0.7578 0.0445 
0.8596 1.0000 0.5953 
0.4558 0.0777 1.0000 
 C 
1.0000 0 0.4284 
0 1.0000 0 
0.4634 0 1.0000 
 R 
0 0 0.2864 
0 0 0 
0.1212 0 0 
In summary, the above illustrated table in this section shows the trust values between nodes and 
the risk associated with each node on the others connected to it in a network, the table also shows 
more robust values for combined trust and the associated risk using the new Beta distribution 
method presented in this paper. 
5.2. Fifteen Nodes Network Simulation 
To further verify the algorithm and see the effect on the trust values when many nodes exist in the 
surrounding area, the network should consist of a large number of nodes. Here, a simulated 
network consisting of fifteen nodes is presented as illustrated in Figure 3 below. 
1 
2 3 4 
5 
6 7 8 9 10 
11 
12 13 14 
15 
Figure 3. Network graph of fifteen nodes 
Results are presented in a different way from the previous simulation, that is, risk and trust values 
between nodes are presented as graphs shown in figure 4 and figure 5. The graphs show the risk 
between every node and the other (14) nodes in the network. If there is a direct connection
International Journal of Computer Networks  Communications (IJCNC) Vol.6, No.5, September 2014 
between any two nodes, then there will be a certain risk value, otherwise, the risk value will be 
equal to zero. Figure 4, shows the risk values calculated using the traditional weighting method 
presented in [1] while figure 5 shows the risk values calculated using the Beta distribution method 
presented in this paper and as can be seen from both figures the risk values calculated using Beta 
distribution are also more robust. 
165 
Figure 4. Risk between nodes calculated using the traditional method. 
Figure 5. Risk between nodes calculated using the Beta distribution method. 
6. CONCLUSIONS 
It has been stated that modelling trust requires a thorough understanding of the dynamic aspects 
of trust and the factors affecting trust. This paper has introduced those two topics and briefly 
discussed the main factors of trust - direct trust, indirect trust, reputation and risk- with more 
attention given to the direct and indirect trusts as the most important factors, which can produce 
the other factors. A new approach to weight the direct and indirect trust using the realm of 
statistics (Beta distribution) for calculating trust between nodes and the risk associated with each
International Journal of Computer Networks  Communications (IJCNC) Vol.6, No.5, September 2014 
node is also presented. Simulation results from both approaches (traditional and Beta distribution) 
were also presented, which simply show the trust relationship between nodes and the risk 
associated with them. The results have been presented in tables and in graphic format for easy 
observation and interpretation, showing that, the higher the trust between nodes, the lower the risk 
between them, and vice versa. 
166 
REFERENCES 
[1] M. Momani, et al., A New Framework of Establishing Trust in Wireless Sensor Networks, 
presented at the International Conference on Computer  Communication Engineering (ICCCE '06), 
Kuala Lumpur, Malaysia, 2006. 
[2] B. N. Shand, Trust for Resource Control: Self-enforcing Automatic Rational Contracts between 
Computers, University of Cambridge Computer Laboratory UCAM-CL-TR-600, 2004. 
[3] C. English, et al., Dynamic Trust Models for Ubiquitous Computing Environments, in 
Ubicomp2002 Security Workshop, GÖTEBORG, SWEDEN, 2002. 
[4] H. Chen, et al., Reputation-based Trust in Wireless Sensor Networks, in International Conference 
on Multimedia and Ubiquitous Engineering (MUE '07), Seoul, Korea, 2007, pp. 603-607. 
[5] S. Buchegger and J.-Y. L. Boudec,  A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc 
Networks, in P2PEcon '04, Harvard University, Cambridge MA, U.S.A, 2004. 
[6] G. V. Crosby, et al., A Framework for Trust-based Cluster Head Election in Wireless Sensor 
Networks, in The Second IEEE Workshop on Dependability and Security in Sensor Networks and 
Systems (DSSNS '06), Columbia, Maryland, 2006. 
[7] P. Michiardi and R. Molva, CORE: A Collaborative Reputation Mechanism to Enforce Node 
Cooperation in Mobile Ad-hoc Networks, in The IFIP TC6/TC11 Sixth Joint Working Conference 
on Communications and Multimedia Security: Advanced Communications and Multimedia Security 
Portoroz, Slovenia, 2002, pp. 107-121. 
[8] S. Ganeriwal and M. B. Srivastava, Reputation-based Framework for High Integrity Sensor 
Networks, in The 2nd ACM Workshop on Security of Ad-hoc and Sensor Networks Washington DC, 
USA 2004, pp. 66 - 77. 
[9] A. Abdul-Rahman and S. Hailes, Supporting Trust in Virtual Communities, in The 33rd Hawaii 
International Conference on System Sciences, Maui, Hawaii, 2000, p. 9. 
[10] A. Jøsang and R. Ismail, The Beta Reputation System, presented at the The 15th Bled Electronic 
Commerce Conference, Bled, Slovenia, 2002. 
[11] J. Sabater and C. Sierra, REGRET: A Reputation Model for Gregarious Societies, in The Fifth 
International Conference on Autonomous Agents Montreal, Quebec, Canada 2001. 
[12] Y. Wang and J. Vassileva, Bayesian Network-Based Trust Model, in The International Conference 
on Web Intelligence (WI '03), Halifax, Canada, 2003, pp. 150 - 157. 
[13] Y. Wang and J. Vassileva, Bayesian Network Trust Model in Peer-to-Peer Networks, in Agents and 
Peer-to-Peer Computing. vol. 2872, ed Berlin, Heidelberg: Springer 2005, pp. 23-34. 
[14] Y. Wang and J. Vassileva, Trust and Reputation Model in Peer-to-Peer Networks, in The 3rd 
International Conference on Peer-to-Peer Computing Linköping, Sweden, 2003. 
[15] F. Azzedin and M. Maheswaran, Evolving and Managing Trust in Grid Computing Systems, in 
IEEE Canadian Conference on Electrical and Computer Engineering (CCECE '02), 2002. 
[16] D. Quercia, et al., B-trust: Bayesian Trust Framework for Pervasive Computing, in iTrust 2006 - 4th 
International Conference on Trust Management, Pisa, Italy, 2006. 
[17] S. Buchegger and J. Y. L. Boudec, Performance analysis of the CONFIDANT protocol (Cooperation 
Of Nodes- Fairness In Dynamic Ad-hoc NeTworks), in The 3rd ACM Internationa symposium 
Mobile Ad-hoc Networking  Computing (MobiHoc '02), Lausanne, CH, 2002, pp. 226-236. 
[18] A. Srinivasan, et al., DRBTS: Distributed Reputation-based Beacon Trust System, presented at the 
The 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC 
'06), 2006. 
[19] A. A. Pirzada and C. McDonald, Establishing Trust in Pure Ad-hoc Networks, in The 27th 
Australasian Conference on Computer Science, Dunedin, New Zealand, 2004, pp. 47-54. 
[20] Y. Wang and V. Varadharajan, Trust2: Developing Trust in Peer-to-Peer Environments, in Services 
Computing, 2005 IEEE International Conference Orlando, Florida, USA, 2005. 
[21] April 2006). Bayes' Theorem. Available: http://en.wikipedia.org/wiki/Bayes'_theorem

More Related Content

What's hot

An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksLogicMindtech Nologies
 
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICING
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICINGA NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICING
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICINGIJNSA Journal
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGijp2p
 
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...rahulmonikasharma
 
CDAP13-070_ResearchPaper
CDAP13-070_ResearchPaperCDAP13-070_ResearchPaper
CDAP13-070_ResearchPaperYehan Gunaratne
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peerSnehith
 
12 Cognitive Social Structure
12 Cognitive Social Structure12 Cognitive Social Structure
12 Cognitive Social StructureMaksim Tsvetovat
 
BNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingBNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingIRJET Journal
 
Final Report
Final ReportFinal Report
Final Reportimu409
 
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...IRJET Journal
 

What's hot (13)

Eco secu infocom
Eco secu infocomEco secu infocom
Eco secu infocom
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
 
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICING
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICINGA NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICING
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICING
 
Bachelor Thesis
Bachelor ThesisBachelor Thesis
Bachelor Thesis
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
 
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
 
CDAP13-070_ResearchPaper
CDAP13-070_ResearchPaperCDAP13-070_ResearchPaper
CDAP13-070_ResearchPaper
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peer
 
12 Cognitive Social Structure
12 Cognitive Social Structure12 Cognitive Social Structure
12 Cognitive Social Structure
 
BNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingBNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid Computing
 
Final Report
Final ReportFinal Report
Final Report
 
sanju
sanjusanju
sanju
 
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
 

Viewers also liked

Name a naming mechanism for delay disruption tolerant network
Name a naming mechanism for delay disruption tolerant networkName a naming mechanism for delay disruption tolerant network
Name a naming mechanism for delay disruption tolerant networkIJCNCJournal
 
Analyzing peer selection policies for
Analyzing peer selection policies forAnalyzing peer selection policies for
Analyzing peer selection policies forIJCNCJournal
 
A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...IJCNCJournal
 
Domain partitioned element management systems employing mobile agents for dis...
Domain partitioned element management systems employing mobile agents for dis...Domain partitioned element management systems employing mobile agents for dis...
Domain partitioned element management systems employing mobile agents for dis...IJCNCJournal
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
 
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...IJCNCJournal
 
A novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsA novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsIJCNCJournal
 
Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobileIJCNCJournal
 
Threats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesThreats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesIJCNCJournal
 
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...IJCNCJournal
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNIJCNCJournal
 
My direct a middleware for p2 p mobile social networks
My direct a middleware for p2 p mobile social networksMy direct a middleware for p2 p mobile social networks
My direct a middleware for p2 p mobile social networksIJCNCJournal
 
Distributed vertex cover
Distributed vertex coverDistributed vertex cover
Distributed vertex coverIJCNCJournal
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicasIJCNCJournal
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area ofIJCNCJournal
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
 
Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...IJCNCJournal
 
Performance analysis of economic model and radio resource management in heter...
Performance analysis of economic model and radio resource management in heter...Performance analysis of economic model and radio resource management in heter...
Performance analysis of economic model and radio resource management in heter...IJCNCJournal
 

Viewers also liked (19)

Name a naming mechanism for delay disruption tolerant network
Name a naming mechanism for delay disruption tolerant networkName a naming mechanism for delay disruption tolerant network
Name a naming mechanism for delay disruption tolerant network
 
Analyzing peer selection policies for
Analyzing peer selection policies forAnalyzing peer selection policies for
Analyzing peer selection policies for
 
A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...
 
Domain partitioned element management systems employing mobile agents for dis...
Domain partitioned element management systems employing mobile agents for dis...Domain partitioned element management systems employing mobile agents for dis...
Domain partitioned element management systems employing mobile agents for dis...
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
 
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
 
A novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsA novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manets
 
Ijcnc050209
Ijcnc050209Ijcnc050209
Ijcnc050209
 
Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobile
 
Threats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesThreats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking Websites
 
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
 
My direct a middleware for p2 p mobile social networks
My direct a middleware for p2 p mobile social networksMy direct a middleware for p2 p mobile social networks
My direct a middleware for p2 p mobile social networks
 
Distributed vertex cover
Distributed vertex coverDistributed vertex cover
Distributed vertex cover
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicas
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area of
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
 
Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...
 
Performance analysis of economic model and radio resource management in heter...
Performance analysis of economic model and radio resource management in heter...Performance analysis of economic model and radio resource management in heter...
Performance analysis of economic model and radio resource management in heter...
 

Similar to RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION

AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...graphhoc
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...IJECEIAES
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksPvrtechnologies Nellore
 
Trust based security in manet
Trust based security in manetTrust based security in manet
Trust based security in maneteSAT Journals
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
 
Secure Routing Path Using Trust Values for Wireless Sensor Networks
Secure Routing Path Using Trust Values for Wireless Sensor Networks Secure Routing Path Using Trust Values for Wireless Sensor Networks
Secure Routing Path Using Trust Values for Wireless Sensor Networks ijcisjournal
 
Secure routing path using trust values for
Secure routing path using trust values forSecure routing path using trust values for
Secure routing path using trust values forijcisjournal
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
 
A TRUST-BASED PREDICTIVE MODEL FOR MOBILE AD HOC NETWORKS
A TRUST-BASED PREDICTIVE MODEL FOR MOBILE AD HOC NETWORKSA TRUST-BASED PREDICTIVE MODEL FOR MOBILE AD HOC NETWORKS
A TRUST-BASED PREDICTIVE MODEL FOR MOBILE AD HOC NETWORKSpijans
 
A Trust-Based Predictive Model for Mobile Ad Hoc Networks
A Trust-Based Predictive Model for Mobile Ad Hoc NetworksA Trust-Based Predictive Model for Mobile Ad Hoc Networks
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manetIAEME Publication
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manetIAEME Publication
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATIONA COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATIONnexgentechnology
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust modelnexgentech15
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...Nexgen Technology
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
 

Similar to RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION (20)

AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
 
Trust based security in manet
Trust based security in manetTrust based security in manet
Trust based security in manet
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
Secure Routing Path Using Trust Values for Wireless Sensor Networks
Secure Routing Path Using Trust Values for Wireless Sensor Networks Secure Routing Path Using Trust Values for Wireless Sensor Networks
Secure Routing Path Using Trust Values for Wireless Sensor Networks
 
Secure routing path using trust values for
Secure routing path using trust values forSecure routing path using trust values for
Secure routing path using trust values for
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
 
A TRUST-BASED PREDICTIVE MODEL FOR MOBILE AD HOC NETWORKS
A TRUST-BASED PREDICTIVE MODEL FOR MOBILE AD HOC NETWORKSA TRUST-BASED PREDICTIVE MODEL FOR MOBILE AD HOC NETWORKS
A TRUST-BASED PREDICTIVE MODEL FOR MOBILE AD HOC NETWORKS
 
A Trust-Based Predictive Model for Mobile Ad Hoc Networks
A Trust-Based Predictive Model for Mobile Ad Hoc NetworksA Trust-Based Predictive Model for Mobile Ad Hoc Networks
A Trust-Based Predictive Model for Mobile Ad Hoc Networks
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manet
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manet
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATIONA COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust model
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
 

More from IJCNCJournal

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 

More from IJCNCJournal (20)

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 

Recently uploaded

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Recently uploaded (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION Mohammad Momani1, Maen Takruri2 and Rami Al-Hmouz3 1University of Technology, Sydney, Australia 2American University of Ras Al Khaimah, United Arab Emirates 3King Abdulaziz University, Saudi Arabia ABSTRACT This paper introduces the Beta distribution as a novel technique to weight direct and indirect trust and assessing the risk in wireless sensor networks. This paper also reviews the trust factors, which play a major role in building trust in wireless sensor networks and explains the dynamic aspects of trust. This is an extension of a previous work done by the authors using a new approach to assess risk. Simulation results related to the previous work and to the new approach introduced in this paper are also presented for easy comparison. KEYWORDS Wireless Sensor Networks, Trust, Algorithm, Risk, Beta Distribution 1. INTRODUCTION Trust establishment is a prerequisite for any network to function, that is, establishing trust between nodes is the first step in building the actual Wireless Sensor Network (WSN), as the creation, operation, management and survival of the WSN are dependent upon the cooperative and trusting nature of its nodes. Modelling trust requires a thorough understanding of the dynamic aspects of trust and the factors that affect trust [1]. So, in this paper, a new risk assessment algorithm for establishing trust in WSNs using Beta distribution is presented after introducing the trust factors and the main aspects of trust. This algorithm is adopting new techniques unique to WSNs. More details about the algorithm can be found in [1], which is omitted from this paper to avoid repetition. Whenever a node in a WSN decides on whether or not to communicate with other nodes, it has to assess the other nodes’ trustworthiness. Trust-modelling represents the trustworthiness of each node in the opinion of another node; thus each node associates a trust value with every other node [2], and, based on that trust value, a risk value required from the node to finish a job can be calculated. Section 2 in this paper introduces the trust factors, followed by dynamic aspects of trust discussed in section 3. Risk assessment algorithm using Beta distribution is discusses in section 4. Simulation results are presented in section 5 and section 6 concludes the paper. 2. TRUST FACTORS As discussed in our previous work presented in [1], the main factors that affect the trust evaluation process of one node about other nodes are: • Direct interactions DOI : 10.5121/ijcnc.2014.6511 157
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 158 • Indirect interactions • Reputation • Risk Direct interactions are based on self-experience or observations by one node of the other node’s behaviour. A watchdog mechanism is required on each node to monitor the behaviour of other nodes in the surrounding. Indirect interactions are based on recommendations from other trusted nodes in the surrounding area about that other node. A propagation mechanism is required to propagate the recommendations. Reputation represents the past behaviour of a node in the absence of direct experience or recommendations. Risk refers to the amount of risk the node is ready to take in the case of forming trust with new or unknown nodes, or in case the trust value between nodes is less than a required trust value to finish a job. Every node in the network keeps a trust table for all the surrounding nodes it interacts with, which can include the direct trust with each node, the indirect trust, the update on both trusts, the total or combined trust and eventually the risk associated with each node. 3. DYNAMIC ASPECTS OF TRUST One of the trust characteristics is dynamism, that is, trust is dependent on time, it can increase or decrease as new evidence becomes available, so the process needs to be evaluated continuously. Dynamic aspects of trust, such as the formation, evolution, revocation and propagation of trust have been discussed in depth in [3]. A brief discussion about trust formation and trust evolution in WSNs is presented below. 3.1. Trust Formation Establishing trust between nodes in WSNs is the most important dynamic aspect of trust. Trust formation in WSN is the process of establishing the initial trust between nodes and in general it involves the assessment of the two main sources for calculating trust, direct and indirect interactions. Figure 1, below, shows a general trust computational model used to calculate trust in WSNs. The reputation factor is omitted from Figure 1, because it represents the past direct and indirect trust. The dispositional trust (risk) is introduced as a third source for trust calculations. The total trust is calculated by combining both trust values, direct and indirect. Knowing the trust value will lead to the risk involved in the interaction: the lower the trust value, the higher the risk, and the higher the trust value, the lower the risk.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 159 Direct Trust Indirect Trust Trust calculation Dispositional Trust (Risk) Trust value Figure 1. General trust computational model [1] Initially, when nodes are just being deployed for the first time or when new nodes are introduced to the network, the presence of some optimistic nodes willing to take risks is required, as there is no evidence of nodes’ past behaviour. Initial trust value between nodes can be assigned based on the applications and/or the deployed environment as discussed in [1]. 3.2. Trust Evolution The evolution process is another important dynamic aspect of trust and can be regarded as iterating the process of trust formation as additional evidence becomes available. It is the process of updating the trust level between nodes. Trust values regarding other nodes should be maintained locally and updated periodically as new evidence becomes available, and that will eventually change the risk assessment of the node. In order for nodes in a network to receive updates regarding the trusted behaviours of nodes or even threats, a mechanism for trust reporting is necessary. As previously discussed in [1], updating trust can be achieved using the first-hand information only: direct trust, as in [4], the second-hand information only: indirect trust, as in [5, 6], the indirect positive trust only, as in [7, 8]; and/or both: direct and indirect trust, as in [9-18]. As can be seen, most systems proposed so far use both: first-hand and second-hand information. The main issue here is how to combine these two trust sources to achieve the total trust. The traditional answer to this question is to combine them using the “weighting” approach. Some trust systems give more weights to the old experience, some give more weight to recent experience and others give more weight to direct trust rather than to indirect trust. In summary, the trust evolution process involves: updating direct trust, updating indirect trust and updating total trust, based on the updated values of direct and indirect trust. 4. RISK ASSESSMENT ALGORITHM Based on the above discussion regarding trust factors and dynamic aspects of trust, a new algorithm for establishing trust in WSNs was presented as a flowchart in our work presented in [1]. The whole idea of the algorithm given in [1] is that there is a risk value associated with every job to be processed by a node, which is derived from the trust value required to do a specific task. The first thing a node will do if it has been asked to perform a task, is to compare the predefined risk value associated the task with the actual risk between the two nodes, and if the risk value is less than the predefined threshold, then the task will be performed, otherwise the task will be declined unless the node is ready to take that risk. The algorithm is just comparing risk values and combining direct trust and indirect trust to achieve the total trust and eventually calculate the
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 actual risk associated, that is, it does not calculate the direct or indirect trust, but the node itself does that. A more detailed illustration of the algorithm follows. It is assumed that there is a required trust value (T) associated with each job to be processed by a node and eventually a risk value is derived from that trust value. The trust value (T) is then tested against the sources of trust, the direct trust value (A), the indirect trust value (B), and the combined trust value (C) and at the same time calculates the risk value (R). If any combination of these values is greater than or equal to the required trust value, that is, the risk value is less than or equals to the predefined risk value (threshold), then the job will be processed, otherwise it will be declined unless the node is ready to take the risk associated with that job. It is assumed that nodes are capable of calculating (A), (B) and (R) using their own criteria, be this as presented in [19] using weight and situational trust or as presented in [20] using weight and rating or any other criteria specific to a node. The challenge here, as discussed before, is how to calculate the combined trust value (C) as it represents a data fusion. In the following section a new statistical approach is presented to weight the direct and indirect trust. 160 4.1. Combined Trust Combining direct trust and indirect trust to obtain the total trust of one node on the others was and still is the issue for many researchers. Most of the models, which use the weighting approach, assign different weights to each trust type without describing the methodology behind their assignments. Here, a new methodology using the Beta distribution is introduced to weight different trust components - direct trust value (A) and indirect trust value (B) - and eventually to calculate the total trust. The reason behind using the Beta distribution is that, it is being used widely in risk and decision analysis, due to its flexibility, and also it can be estimated very easily [8, 10]. The density function for a beta random variable X on domain [0, 1] is given by equation (1): ( ) 1 1 ( , ) (1 ) a b a b a b G + − − = − G G f x x ( ) ( ) a b (1) p is the probability that the event occurs p ı Beta (a ,b ) (2) Substituting equation (2) in equation (1) will result in the following density function given in (3): ( ) 1 1 f p p p a b a b G + − − ( ) (1 ) = − G ( a ) G ( b ) (3) The expected value μ is given in equation (4): E( p) a a b = + (4) 2 is given in equation (5): and the variance 2 ( ) ( ) * ( 1) ( ) V p a b a b a b = + + * + (5)
  • 5. International Journal of Computer Networks Communications (IJCNC) Vol.6, No.5, September 2014 161 It is assumed that trust value (A) provides the prior estimate for p, as given in equation (6): a a b ( ) A ˆ = = A A E p P + A A (6) and the variance value, as given in equation (7): ( ) 2 A A V p =s (7) From the above illustration in equations (6) and (7), A a and A b can be represented as in equations (8) and (9) respectively: ˆ ˆ P (1 − P ˆ ) A A 1 = − (8) 2 A A A a P s (1 ˆ ) ˆ A A A A P P a b * − = (9) Trust value (B) provides the estimate ˆB p of p, as given in equation (10): a ( ) = B = ˆ B B E p P + a b B B (10) and the variance value as given in equation (11): ( ) 2 B B V P =s (11) From equations (10) and (11), B a and B b can be represented as in equations (12) and (13) respectively: ˆ ˆ P (1 − P ˆ ) B B 1 = − (12) 2 B B B a P s (1 ˆ ) ˆ B B B B P P a b * − = (13) Assuming that trust value (A) represents the prior, then according to Bayes’ theorem [21], ( | ˆ ) ( ˆ | ) ( ) B B P p P µ P P p *P p (14) where, P( p) represents the prior and equals to ( , ) A A Beta a b , and ( ˆ | ) B P P p is the likelihood, which needs to be modelled. From the above discussion, equation (14) can be rewritten as shown in equation (15):
  • 6. International Journal of Computer Networks Communications (IJCNC) Vol.6, No.5, September 2014 162 1 1 1 − − − ( | ˆ ) 1 (1 ) (1 ) B B A A µ − − P p P p p p p ( + − 1 − 1) ( + ) (1 ) 1 , 1) ( A B A B A B A B B p p Beta b a b b b a a a a a b b − − − + − µ ı + (15) Substituting equation (15) in equation (4), the following expected value will result, as shown in equation (16): ( | ˆ ) 1 1 a + a a + a A B A B = = 2 B A B A B K E p P b b a a + − − + − + (16) Let K in equation (16) be represented as given in equation (17): 2 A B A B K =a +a +b +b − (17) So, equation (16) can be written as given in equation (18): ( a a a a a a a a ˆ )( 1) ( | ) B A A A B B B B A A B B B K K E p P b b b b − = * + * * + + + + (18) ( | ˆ ) B E p P in equation (18) simply represents the combined trust value, and can be written as shown below in equation (19): ( | ˆ ) ˆ * ˆ B A A B B E P P = P W + P *W (19) As can be seen from equations (18) and (19), the weights for direct trust A W and indirect trust B W are represented in equations (20) and (21) respectively: + a b = W A A A K (20) ( )( 1) B a b a B B B B W K a − = * + (21) If the trust values (A) and (B) are known, then it is very easy to calculate, A a , A b , B a and B b , as shown in equations (8), (9), (12) and (13), and eventually A W and B W will be calculated using equations (20) and (21) respectively. As discussed before, the total trust value is a combination of direct trust and indirect trust values. One way of combining these trust values using the probability theory has been presented here. 5. SIMULATION RESULTS This section presents two example simulations conducted on two different networks using MATLAB. The first network consists of three nodes for simplicity, and to be able to verify the algorithm and show the results in tables as illustrated below. The second simulation is for a
  • 7. International Journal of Computer Networks Communications (IJCNC) Vol.6, No.5, September 2014 network of fifteen nodes to further verify the algorithm when the number of nodes is high, and to show the results in a graph, as described below. 163 5.1. Three Nodes Network Simulation Figure 2 below depicts a network topology of three nodes. Trust values between nodes are asymmetric, which means that the trust value from node (1) to node (2) is different from the trust value from node (2) to node (1). Table 1 below shows the complete direct trust values (A) between nodes, the required trust values (T) between nodes to perform the task, the indirect trust values (B) from the surrounding nodes, the combined trust values (C) and the risk values (R). As can be seen from Table 1 below, the diagonal values for T and R are always zeros, which reflects the required trust value and the risk value associated with the node to itself; that is, there is no required trust value or risk associated with a node when it is doing a job for itself. The same is valid for A, B and C, which have the diagonal values set to ones, which means the node blindly trusts itself; all the values in the diagonals in all tables are from the node to itself and they do not participate in the calculations. The risk value (R) of (0) in the diagonal means the risk from the node to itself as mentioned before, and the other (0) values, not in the diagonal, mean the actual trust is greater than or equal to the required trust and there is no need for any risk to be taken. Figure 2. Network graph of three nodes Table 1 below consists of two columns, the first column is related to trust and risk values between nodes calculated using the traditional method presented in [1] and the second column is related to trust and risk values between nodes calculated using the new method (Beta distribution) presented in this paper. Table 1. Risk and Trust Values between nodes Traditional weighting method used to weight A and B The New (Beta distribution) weighting method used to weight A and B T = 0 0.4546 0.7148 0.7688 0 0.5383 0.5846 0.2413 0 A 1.0000 0.5133 0.6844 0.5141 1.0000 0.1610 0.4685 0.7003 1.0000 T = 0 0.4546 0.7148 0.7688 0 0.5383 0.5846 0.2413 0 A 1.0000 0.5133 0.6844 0.5141 1.0000 0.1610 0.4685 0.7003 1.0000
  • 8. International Journal of Computer Networks Communications (IJCNC) Vol.6, No.5, September 2014 164 B 1.0000 0.7578 0.0445 0.8596 1.0000 0.5953 0.4558 0.0777 1.0000 C 1.0000 0 0.4693 0 1.0000 0 0.4928 0 1.0000 R 0 0 0.2455 0 0 0 0.0918 0 0 B 1.0000 0.7578 0.0445 0.8596 1.0000 0.5953 0.4558 0.0777 1.0000 C 1.0000 0 0.4284 0 1.0000 0 0.4634 0 1.0000 R 0 0 0.2864 0 0 0 0.1212 0 0 In summary, the above illustrated table in this section shows the trust values between nodes and the risk associated with each node on the others connected to it in a network, the table also shows more robust values for combined trust and the associated risk using the new Beta distribution method presented in this paper. 5.2. Fifteen Nodes Network Simulation To further verify the algorithm and see the effect on the trust values when many nodes exist in the surrounding area, the network should consist of a large number of nodes. Here, a simulated network consisting of fifteen nodes is presented as illustrated in Figure 3 below. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Figure 3. Network graph of fifteen nodes Results are presented in a different way from the previous simulation, that is, risk and trust values between nodes are presented as graphs shown in figure 4 and figure 5. The graphs show the risk between every node and the other (14) nodes in the network. If there is a direct connection
  • 9. International Journal of Computer Networks Communications (IJCNC) Vol.6, No.5, September 2014 between any two nodes, then there will be a certain risk value, otherwise, the risk value will be equal to zero. Figure 4, shows the risk values calculated using the traditional weighting method presented in [1] while figure 5 shows the risk values calculated using the Beta distribution method presented in this paper and as can be seen from both figures the risk values calculated using Beta distribution are also more robust. 165 Figure 4. Risk between nodes calculated using the traditional method. Figure 5. Risk between nodes calculated using the Beta distribution method. 6. CONCLUSIONS It has been stated that modelling trust requires a thorough understanding of the dynamic aspects of trust and the factors affecting trust. This paper has introduced those two topics and briefly discussed the main factors of trust - direct trust, indirect trust, reputation and risk- with more attention given to the direct and indirect trusts as the most important factors, which can produce the other factors. A new approach to weight the direct and indirect trust using the realm of statistics (Beta distribution) for calculating trust between nodes and the risk associated with each
  • 10. International Journal of Computer Networks Communications (IJCNC) Vol.6, No.5, September 2014 node is also presented. Simulation results from both approaches (traditional and Beta distribution) were also presented, which simply show the trust relationship between nodes and the risk associated with them. The results have been presented in tables and in graphic format for easy observation and interpretation, showing that, the higher the trust between nodes, the lower the risk between them, and vice versa. 166 REFERENCES [1] M. Momani, et al., A New Framework of Establishing Trust in Wireless Sensor Networks, presented at the International Conference on Computer Communication Engineering (ICCCE '06), Kuala Lumpur, Malaysia, 2006. [2] B. N. Shand, Trust for Resource Control: Self-enforcing Automatic Rational Contracts between Computers, University of Cambridge Computer Laboratory UCAM-CL-TR-600, 2004. [3] C. English, et al., Dynamic Trust Models for Ubiquitous Computing Environments, in Ubicomp2002 Security Workshop, GÖTEBORG, SWEDEN, 2002. [4] H. Chen, et al., Reputation-based Trust in Wireless Sensor Networks, in International Conference on Multimedia and Ubiquitous Engineering (MUE '07), Seoul, Korea, 2007, pp. 603-607. [5] S. Buchegger and J.-Y. L. Boudec, A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks, in P2PEcon '04, Harvard University, Cambridge MA, U.S.A, 2004. [6] G. V. Crosby, et al., A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks, in The Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems (DSSNS '06), Columbia, Maryland, 2006. [7] P. Michiardi and R. Molva, CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad-hoc Networks, in The IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security Portoroz, Slovenia, 2002, pp. 107-121. [8] S. Ganeriwal and M. B. Srivastava, Reputation-based Framework for High Integrity Sensor Networks, in The 2nd ACM Workshop on Security of Ad-hoc and Sensor Networks Washington DC, USA 2004, pp. 66 - 77. [9] A. Abdul-Rahman and S. Hailes, Supporting Trust in Virtual Communities, in The 33rd Hawaii International Conference on System Sciences, Maui, Hawaii, 2000, p. 9. [10] A. Jøsang and R. Ismail, The Beta Reputation System, presented at the The 15th Bled Electronic Commerce Conference, Bled, Slovenia, 2002. [11] J. Sabater and C. Sierra, REGRET: A Reputation Model for Gregarious Societies, in The Fifth International Conference on Autonomous Agents Montreal, Quebec, Canada 2001. [12] Y. Wang and J. Vassileva, Bayesian Network-Based Trust Model, in The International Conference on Web Intelligence (WI '03), Halifax, Canada, 2003, pp. 150 - 157. [13] Y. Wang and J. Vassileva, Bayesian Network Trust Model in Peer-to-Peer Networks, in Agents and Peer-to-Peer Computing. vol. 2872, ed Berlin, Heidelberg: Springer 2005, pp. 23-34. [14] Y. Wang and J. Vassileva, Trust and Reputation Model in Peer-to-Peer Networks, in The 3rd International Conference on Peer-to-Peer Computing Linköping, Sweden, 2003. [15] F. Azzedin and M. Maheswaran, Evolving and Managing Trust in Grid Computing Systems, in IEEE Canadian Conference on Electrical and Computer Engineering (CCECE '02), 2002. [16] D. Quercia, et al., B-trust: Bayesian Trust Framework for Pervasive Computing, in iTrust 2006 - 4th International Conference on Trust Management, Pisa, Italy, 2006. [17] S. Buchegger and J. Y. L. Boudec, Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes- Fairness In Dynamic Ad-hoc NeTworks), in The 3rd ACM Internationa symposium Mobile Ad-hoc Networking Computing (MobiHoc '02), Lausanne, CH, 2002, pp. 226-236. [18] A. Srinivasan, et al., DRBTS: Distributed Reputation-based Beacon Trust System, presented at the The 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC '06), 2006. [19] A. A. Pirzada and C. McDonald, Establishing Trust in Pure Ad-hoc Networks, in The 27th Australasian Conference on Computer Science, Dunedin, New Zealand, 2004, pp. 47-54. [20] Y. Wang and V. Varadharajan, Trust2: Developing Trust in Peer-to-Peer Environments, in Services Computing, 2005 IEEE International Conference Orlando, Florida, USA, 2005. [21] April 2006). Bayes' Theorem. Available: http://en.wikipedia.org/wiki/Bayes'_theorem