On the other side reputation based approach based on numerical and

On the other side reputation based approach based on

This preview shows page 1 - 3 out of 5 pages.

On the other side, reputation-based approach based on numerical and computational mechanism is too dependent on specific application to enough versatile. In addition, for example, a seller might be interested in protecting behalf on sale in different scenarios depending on the value of the product: based on reputation if the price is low value or based on policies if it is a high transaction (e.g., requiring a credit card for buying a car). Based on the above scenarios we propose the integration of policy-based and reputation-based approaches into an adaptive trust management framework capable of addressing the firm/objective security as well as the social/subjective security. By combining the two different approaches, our integrated trust mechanism enhances the security and flexibility of the existing approach. 2007 International Conference on Computational Intelligence and Security 0-7695-3072-9/07 $25.00 © 2007 IEEE DOI 10.1109/CIS.2007.80 804
Image of page 1
In Section 2, we identify three important characteristics of trust in MANET, context , evaluation and deducing . The overview of integrated trust management framework is presented in Section 3. We conclude the paper with final remark in Section 4. 2. Adaptive Trust Management in MANET 2.1 Context (Condition/Constrain) In many scenarios, trust relationship [6][7] among the subjects is restricted by environmental or system status. For instance, trust relationship changes with time due to internal or external factors, which can never be captured explicitly and change over time. These factors are called contexts . Contexts are environmental variables that have to be indicated explicitly before or during evaluating trust level. According to different forms of the content, we define following contexts in trust management: z A finite set, P , of principals. Each participant should be identified explicitly. z A finite set, A , of actions. An action is something that each user either requests or query. For example, customer trusts supermarket about selling a product. From customer to supermarket, the action is “ sell ” and from supermarket to customer is “ buy ”. This is due to the different role each subject acts as in an interaction. z An infinite time series, {… t i , t i +1 t j …}. Trust relationship is not constant or stable but always changing as time passes, which induce to the dynamic nature of trust. So time flag is a necessary item in order to depict accurately the trustworthiness among subjects. 2.2 Trust evaluation and deducing 2.2.1 Trust evaluation Reputation-based trust management lies on collecting, aggregating and distributing feedbacks among the subjects due to that a subject’s past history is informative to forecast its future behavior [5]. In the past, feedbacks among the subjects can be classified to two types: direct feedback and recommendation feedback. Direct feedback donates the history that a subject interacts directly with others and recommendation path may not exist between the two principals. Recommendation feedback represents that a subject trusts the ability of another to recommend others.
Image of page 2
Image of page 3

You've reached the end of your free preview.

Want to read all 5 pages?

  • Fall '19
  • Integrated Trust

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture