Opinion Based Trust Model for Delay Tolerant Networks using Fuzzy Logic

Authors

  • Santhana Lakshmi M  IT, Mepco Schlenk Engineering College, Sivakasi, Tamil Nadu, India
  • Hemaanand M  ECE, Amrita Vishwa Vidhyapeetam, Coimbatore, Tamil Nadu, India

DOI:

https://doi.org/10.32628/CSEIT217125

Keywords:

Delay Tolerant Networks, Trustworthiness, Fuzzy logic

Abstract

Delay Tolerant Network is designed for long distance communication where end-to-end connectivity is not established due to frequent disconnections or delay. Long latency is encountered in this type of network. This work proposes a reliable model for secure communication in DTN that aims to achieve correct estimation of trust value between the nodes and to minimize the relay rate i.e cost involved in the message transmission with minimum delay based on the history of ownership of information. In this model, we have used data driven approach so that the malicious or selfish nodes are prevented from consuming more resources in the resource constrained network environment. This approach checks the trustworthiness of the source of information. This work adopts computing based approach to evaluate the performance of the proposed model using fuzzy logic. We conduct two comparative analyses in which one compares the four variants of the proposed model to find the best variant of the proposed model and other compares our trust model with the other existing trust models to prove the efficiency of our model over other routing protocols.

References

  1. A. Vahdat and D. Becker, “Epidemic routing for partially connected ad hoc networks,” Duke Univ., Durham, NC, Tech. Rep. CS-200006, 2000.
  2. A. Lindgren, A. Doria, O. Schelen, “Probabilistic routing in intermittently connected networks,” ACM SIGMOBILE Mobile Comput. Com- mun. Rev., vol. 7, no. 3, pp. 19–20, Jul. 2003.
  3. E. Ayday and F. Fekri, “An iterative algorithm for trust management and adversary detection for delay-tolerant networks,” IEEE Trans. Mobile Comput., vol. 11, no. 9, pp. 1514–1531, Sep. 2012.
  4. Y. Zhu, B. Xu, X. Shi, and Y. Wang, “A survey of social-based routing in delay tolerant networks: Positive and negative social effects,” IEEE Commun. Surv. Tuts., vol. 15, no. 1, pp. 387–401, Jan.-Mar. 2013.
  5. I.-R. Chen, F.Bao, M. Chang, and J.-H. Cho, “Trust management for encounter-based routing in delay tolerant networks,” in Proc. IEEE Global Telecommun. Conf., 6-10 Dec. 2010, pp. 1–6.
  6. U. Lee, S. Y. Oh, K.-W. Lee, and M. Gerla, “RelayCast: Scalable multicast routing in delay tolerant networks,” in Proc. IEEE Int. Conf. Netw. Protocols, 2008, pp. 218–227.
  7. M. Musolesi and C. Mascolo, “CAR: Context-aware adaptive rout- ing for delay-tolerant mobile networks,” IEEE Trans. Mobile Com- put., vol. 8, no. 2, pp. 246–260, Feb. 2009.
  8. P. Costa, C. Mascolo, M. Musolesi, and G. Picco, “Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks,” IEEE J. Sel. Areas Commun., vol. 26, no. 5, pp. 748–760, Jun. 2008.
  9. Y. Li, P. Hui, D. Jin, L. Su, and L. Zeng, “Evaluating the impact of social selfishness on the epidemic routing in delay tolerant networks,” IEEE Commun. Lett., vol. 24, no. 12, pp. 2472–2481, Nov. 2010.
  10. W. Gao and G. Cao, “User-centric data dissemination in disrup- tion tolerant networks,” in Proc. IEEE INFOCOM, 10-15 Apr. 2011, pp. 3119–3127.
  11. L. Gao, M. Li, A. Bonti, W. Zhou, and S. Yu, “Multidimensional routing protocol in human-associated delay-tolerant networks,” IEEE Trans. Mobile Comput., vol. 12, no. 11, pp. 2132–2144, Nov. 2013.
  12. Y. Wang, W.-S. Yang, and J. Wu, “Analysis of a hypercube-based social feature multipath routing in delay tolerant networks,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1706–1716, Sep. 2013.
  13. T.Abdelkader, K. Naik, A.Nayak, N. Goel, and V. Srivastava,“ SGBR: A routing protocol for delay tolerant networks using social grouping,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 12, pp. 2472–2481, Dec. 2013.
  14. Z. Li and H. Shen, “SEDUM: Exploiting social networks in utilitybased distributed routing for DTNs,” IEEE Trans. Comput., vol. 62, no. 1, pp. 83–97, Jan. 2013.
  15. H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, “A probabilistic mis- behavior detection scheme toward efficient trust establishment in delay-tolerant networks,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 22–32, Jan. 2014.
  16. S. Kamvar, M. Schlosser, and H. Garcia-Molina, “The eigentrust algorithm for reputation management in P2P networks,” in Proc. 12th Int. Conf. World Wide Web, 2003, pp. 640–651.
  17. S. Buchegger and J. Boudec, “A robust reputation system for P2P and mobile ad-hoc networks,” in Proc. 2nd Workshop Econ. Peer-to- Peer Syst., 2004, pp. 1–11
  18. R. Hasan, R. Sion, and M. Winslett, “Introducing secure prove- nance: Problems and challenges,” in Proc. ACM Workshop ACM Workshop Storage Security Survivability, 2007, pp. 13–18.
  19. U. Braun, A. Shinnar, and M. Seltzer, “Securing provenance,” in Proc. 3rd Conf. Hot Topics Security, 2008, pp. 1–5.
  20. R. Hasan, R. Sion, and M. Winslett, “The case of the fake picasso: Preventing history forgery with secure provenance,” in Proc. 7th Conf. File Storage Technol., 2009, pp. 1–14.
  21. X. Wang, K. Zeng, K. Govindan, and P. Mohapatra, “Chaining for securing data provenance indistribute dinformation networks,”inProc. IEEE Mil. Commun. Conf., 2012, pp. 1–6.
  22. L. Gadelha and M. Mattoso, “Kairos: An architecture for securing authorship and temporal information of provenance data in gridenabled workflow management systems,” in Proc. IEEE 4th Int. Conf. eSci., 2009, pp. 597–602.
  23. R. Lu, X. Lin, X. Liang, and X. Shen, “Secure provenance: The essential of bread and butter of data forensics in cloud computing,” in Proc. ACM Symp. Inf., Comput. Commun. Security, 2010, pp. 282–292.
  24. S. Rajbhandari, I. Wootten, A. Ali, and O. Rana, “Evaluating provenance-based trust for scientific workflows,” in Proc. 6th IEEE Int. Symp. Cluster Comput. Grid, vol. 1, 16-19 May 2006, pp. 365–372.
  25. E. Bertino, C. Dai, D. Lin, and M. Kantarcioglu, “An approach to evaluate data trustworthiness based on data provenance,” in Proc. 5th VLDB Workshop Secure Data Manage., Aug. 2008, vol. 5159, pp. 82–98.
  26. B. Yu, S. Kallurkar, and R. Flo, “A demspter-shafer approach to provenance-aware trust assessment,” in Proc. Int. Symp. Collaborative Technol. Syst., May 2008, pp. 383–390.
  27. J. Golbeck, “Combining provenance with trust in social networks for Semantic Web content filtering,” in Proc. Int. Conf. Provenance Annotation Data, 2006, vol. 4145, pp. 101–108.
  28. W. Zhou, E. Cronin, and B. T. Loo, “Provenance-aware secure networks,” in Proc. IEEE 24th Int. Conf. Data Eng. Workshop, 2008, pp. 188–193.
  29. L. Koczy, K. Hirota, "Interpolative reasoning with insufficient evidence in sparse fuzzy rule bases", Inf. Sci., vol. 71, no. 1/2, pp. 169-201, 1993.
  30. Z. C. Johanyak, S. Kovacs, "Fuzzy rule interpolation by the least squares method", Proc. Int. Symp. Hung. Researchers Comput. Intell., pp. 495-506, 2006.
  31. S. M. Chen, S. H. Cheng, Z. J. Chen, "Fuzzy interpolative reasoning based on the ratio of fuzziness of rough-fuzzy sets", Inf. Sci., vol. 299, pp. 394-411, 2015.
  32. L. Yang, Q. Shen, "Adaptive fuzzy interpolation", IEEE Trans. Fuzzy Syst., vol. 19, no. 6, pp. 1107-1126, Dec. 2011
  33. P. Angelov, R. Buswell, "Automatic generation of fuzzy rule-based models from data by genetic algorithms", Inf. Sci., vol. 150, no. 1/2, pp. 17-31, 2003.
  34. S. Wu, M. Joo, "A fast approach for automatic generation of fuzzy rules by generalized dynamic fuzzy neural networks", IEEE Trans. Fuzzy Syst., vol. 9, no. 4, pp. 578-594, Aug. 2001.
  35. D. Tikk, P. Baranyi, "Comprehensive analysis of a new fuzzy rule interpolation method", IEEE Trans. Fuzzy Syst., vol. 8, no. 3, pp. 281-296, Jun. 2000.
  36. T. D. Gedeon, L. T. Koczy, "Conservation of fuzziness in rule interpolation", Proc. Symp. New Trends Control Large Scale Syst., pp. 13-19, 1999

Downloads

Published

2021-02-28

Issue

Section

Research Articles

How to Cite

[1]
Santhana Lakshmi M, Hemaanand M, " Opinion Based Trust Model for Delay Tolerant Networks using Fuzzy Logic " International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 1, pp.113-130, January-February-2021. Available at doi : https://doi.org/10.32628/CSEIT217125