File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: A Dynamic Trust Framework for Opportunistic Mobile Social Networks

TitleA Dynamic Trust Framework for Opportunistic Mobile Social Networks
Authors
KeywordsAd-hoc and sensor networks
Distributed management
Distributed platforms
Security management
Self-management and autonomic networks
Issue Date2017
PublisherIEEE.
Citation
IEEE Transactions on Network and Service Management, 2017, v. 15 n. 1, p. 319-329 How to Cite?
AbstractOpportunistic mobile social network (OMSN) enables users to form an instant social network for information sharing (e.g., people watching the same soccer game can share their instant comments). OMSN is ad hoc in nature, thus relies on the cooperation of members regarding message transmission. However, some uncooperative or malicious behavior from abnormal members may reduce network performance, even damage the entire network. Currently, there does not exist effective mechanisms to detect selfish and malicious nodes. To tackle this problem, we propose a dynamic trust framework to facilitate a node to derive a trust value of another node based on the behavior of the latter. The novelty of our framework includes the following: 1) we design a new metric for a trust value of a node and 2) we propose a 'two-hop feedback method' that requires intermediate nodes in a forwarding path to generate ACK messages to verify a node's honesty if they are two hops away. In most existing trust models, final ACK messages are considered as critical factors. In OMSN, nodes are not fully connected and final ACK messages cannot be reliably received. In order to avoid the problem that few final ACK messages can be received, we propose a 'two-hop feedback method.' Simulation results show that our approach is able to detect a majority of abnormal nodes including malicious nodes, selfish nodes, and those nodes launching conspiracy attacks. Thus, the entire network efficiency can be improved without negative impact of abnormal nodes. Besides, our trust framework can be easily applied to the current popular routing protocols of opportunistic networks.
Persistent Identifierhttp://hdl.handle.net/10722/262220
ISSN
2017 Impact Factor: 3.286
2015 SCImago Journal Rankings: 1.021
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorWang, EK-
dc.contributor.authorLi, YP-
dc.contributor.authorYe, YM-
dc.contributor.authorYiu, SM-
dc.contributor.authorHui, CK-
dc.date.accessioned2018-09-28T04:55:29Z-
dc.date.available2018-09-28T04:55:29Z-
dc.date.issued2017-
dc.identifier.citationIEEE Transactions on Network and Service Management, 2017, v. 15 n. 1, p. 319-329-
dc.identifier.issn1932-4537-
dc.identifier.urihttp://hdl.handle.net/10722/262220-
dc.description.abstractOpportunistic mobile social network (OMSN) enables users to form an instant social network for information sharing (e.g., people watching the same soccer game can share their instant comments). OMSN is ad hoc in nature, thus relies on the cooperation of members regarding message transmission. However, some uncooperative or malicious behavior from abnormal members may reduce network performance, even damage the entire network. Currently, there does not exist effective mechanisms to detect selfish and malicious nodes. To tackle this problem, we propose a dynamic trust framework to facilitate a node to derive a trust value of another node based on the behavior of the latter. The novelty of our framework includes the following: 1) we design a new metric for a trust value of a node and 2) we propose a 'two-hop feedback method' that requires intermediate nodes in a forwarding path to generate ACK messages to verify a node's honesty if they are two hops away. In most existing trust models, final ACK messages are considered as critical factors. In OMSN, nodes are not fully connected and final ACK messages cannot be reliably received. In order to avoid the problem that few final ACK messages can be received, we propose a 'two-hop feedback method.' Simulation results show that our approach is able to detect a majority of abnormal nodes including malicious nodes, selfish nodes, and those nodes launching conspiracy attacks. Thus, the entire network efficiency can be improved without negative impact of abnormal nodes. Besides, our trust framework can be easily applied to the current popular routing protocols of opportunistic networks.-
dc.languageeng-
dc.publisherIEEE.-
dc.relation.ispartofIEEE Transactions on Network and Service Management-
dc.rightsIEEE Transactions on Network and Service Management. Copyright © IEEE.-
dc.rights©20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.-
dc.subjectAd-hoc and sensor networks-
dc.subjectDistributed management-
dc.subjectDistributed platforms-
dc.subjectSecurity management-
dc.subjectSelf-management and autonomic networks-
dc.titleA Dynamic Trust Framework for Opportunistic Mobile Social Networks-
dc.typeArticle-
dc.identifier.emailYiu, SM: smyiu@cs.hku.hk-
dc.identifier.emailHui, CK: hui@cs.hku.hk-
dc.identifier.authorityYiu, SM=rp00207-
dc.identifier.authorityHui, CK=rp00120-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TNSM.2017.2776350-
dc.identifier.scopuseid_2-s2.0-85035749416-
dc.identifier.hkuros292127-
dc.identifier.volume15-
dc.identifier.issue1-
dc.identifier.spage319-
dc.identifier.epage329-
dc.identifier.isiWOS:000427420100023-
dc.publisher.placeUnited States-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats