Downloads: 134 | Views: 253
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Popularity: 6.9 / 10
Dynamically Adaptive Recommender Filtering Scheme to Defend against Dishonest Recommenders in a MANET
Shirina Samreen, Dr. G. Narsimha
Abstract: Trust management frameworks play a very important role in securing the mobile ad hoc networks against various insider attacks that could occur during data forwarding. The success of a trust management framework greatly depends upon the proper design of each of its major components including the direct trust computation component as well as the indirect trust computation component. Specifically, the indirect trust computation component should be robust to handle the dishonest recommendations. In this paper, we propose a novel and effective scheme used to design a robust indirect trust computation component called as RecommFilter which can overcome the various attacks caused by dishonest recommendations. Four components namely, Recommendation Selection module, Recommendation Filtering module, Recommendation Evaluation module and Recommendation Trust Update module work in close collaboration to filter out the dishonest recommendations and protect against slandering attacks, bad-mouthing attacks as well as collusive attacks. The novelty of the proposed scheme is that it employs a combination of personal experience based approach as well as majority rule based approach wherein the Selection Module using the personal experiences involves a multi-dimensional trust represented using the Dempster Shafer Theory of evidences and the filtering module using the majority rule involves a clustering based approach performed through an opinion similarity measure computed using the Jousselmes distance between two basic probability assignments (bpa). Experimental results show that the proposed scheme is robust to different dishonest recommendation attacks and accurate in the detection of dishonest recommenders.
Keywords: Mobile Ad hoc Networks, Trust Management framework, Dempster Shafer Theory, Dishonest Recommenders, Slandering attack, Self-promoting attack, Collusion attack, Recommendation Filtering, Jousselmes distance, Opinion Similarity measure
Edition: Volume 4 Issue 5, May 2015
Pages: 388 - 398
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera