International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 134 | Views: 253

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Popularity: 6.9 / 10


     

Dynamically Adaptive Recommender Filtering Scheme to Defend against Dishonest Recommenders in a MANET

Shirina Samreen, Dr. G. Narsimha


Abstract: Trust management frameworks play a very important role in securing the mobile ad hoc networks against various insider attacks that could occur during data forwarding. The success of a trust management framework greatly depends upon the proper design of each of its major components including the direct trust computation component as well as the indirect trust computation component. Specifically, the indirect trust computation component should be robust to handle the dishonest recommendations. In this paper, we propose a novel and effective scheme used to design a robust indirect trust computation component called as RecommFilter which can overcome the various attacks caused by dishonest recommendations. Four components namely, Recommendation Selection module, Recommendation Filtering module, Recommendation Evaluation module and Recommendation Trust Update module work in close collaboration to filter out the dishonest recommendations and protect against slandering attacks, bad-mouthing attacks as well as collusive attacks. The novelty of the proposed scheme is that it employs a combination of personal experience based approach as well as majority rule based approach wherein the Selection Module using the personal experiences involves a multi-dimensional trust represented using the Dempster Shafer Theory of evidences and the filtering module using the majority rule involves a clustering based approach performed through an opinion similarity measure computed using the Jousselmes distance between two basic probability assignments (bpa). Experimental results show that the proposed scheme is robust to different dishonest recommendation attacks and accurate in the detection of dishonest recommenders.


Keywords: Mobile Ad hoc Networks, Trust Management framework, Dempster Shafer Theory, Dishonest Recommenders, Slandering attack, Self-promoting attack, Collusion attack, Recommendation Filtering, Jousselmes distance, Opinion Similarity measure


Edition: Volume 4 Issue 5, May 2015


Pages: 388 - 398



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Shirina Samreen, Dr. G. Narsimha, "Dynamically Adaptive Recommender Filtering Scheme to Defend against Dishonest Recommenders in a MANET", International Journal of Science and Research (IJSR), Volume 4 Issue 5, May 2015, pp. 388-398, URL: https://www.ijsr.net/getabstract.php?paperid=SUB154139, DOI: https://www.doi.org/10.21275/SUB154139



Downloads: 656 | Views: 2004

Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj


Downloads: 401 | Views: 722

Computer Science & Engineering, India, Volume 7 Issue 11, November 2018

Pages: 1951 - 1955

Hadoop Performance Improvement using Metadata and Securing with Oauth Token

Swapnali A. Salunkhe, Amol B. Rajmane


Downloads: 386 | Views: 703

Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.


Downloads: 354 | Views: 700

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Downloads: 336 | Views: 690

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2148 - 2152

The Impact and Application of 3D Printing Technology

Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera


Top