Browse > Article
http://dx.doi.org/10.3837/tiis.2016.02.026

LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment  

Liu, Zhiquan (School of Computer Science and Technology, Xidian University)
Ma, Jianfeng (School of Computer Science and Technology, Xidian University)
Jiang, Zhongyuan (School of Cyber Engineering, Xidian University)
Miao, Yinbin (School of Telecommunication Engineering, Xidian University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.2, 2016 , pp. 914-934 More about this Journal
Abstract
In the mobile distributed environment, an entity may move across domains with great frequency. How to utilize the trust information in the previous domains and quickly establish trust relationships with others in the current domain remains a challenging issue. The classic trust models do not support cross-domain and the existing cross-domain trust models are not in a fully distributed way. This paper improves the outstanding Certified Reputation (CR) model and proposes a Lightweight Cross-domain Trust (LCT) model for the mobile distributed environment in a fully distributed way. The trust certifications, in which the trust ratings contain various trust aspects with different interest preference weights, are collected and provided by the trustees. Furthermore, three factors are comprehensively considered to ease the issue of collusion attacks and make the trust certifications more accurate. Finally, a cross-domain scenario is deployed and implemented, and the comprehensive experiments and analysis are conducted. The results demonstrate that our LCT model obviously outperforms the Bayesian Network (BN) model and the CR model in our cross-domain scenario, and significantly improves the successful interaction rates of the honest entities without increasing the risks of interacting with the malicious entities.
Keywords
Trust model; lightweight; cross-domain; mobile distributed environment; fully distributed;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Chang, S. Ling and S. Srirama, "Trustworthy service discovery for mobile social network in proximity," in Proc. of IEEE Int. Conf. on Pervasive Computing and Communications, pp. 478- 483, March 24-28, 2014. Article (CrossRef Link)
2 Z. Wei, H. Tang, F. R. Yu, M. Wang and P. Mason, “Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning,” IEEE Transactions on Vehicular Technology, vol. 63, no. 9, pp. 4647-4658, November, 2014. Article (CrossRef Link)   DOI
3 B. Wang, X. Chen and W. Chang, “A light-weight trust-based QoS routing algorithm for ad hoc networks,” Pervasive and Mobile Computing, vol. 13, pp. 164-180, August, 2014. Article (CrossRef Link)   DOI
4 X. M. Cao, H. T. Zhu, H. Y. Shen and G. H. Chen, "Proxy-based security-feedback trust model in MP2P network," in Proc. of Applied Mechanics and Materials, pp. 1144-1151, February, 2014. Article (CrossRef Link)
5 S. Hazra and S. K. Setua, "Probabilistic trust management in wireless communication system," in Proc. of IEEE Int. Conf. on Electrical and Computer Engineering, pp. 54-57, December 20-22, 2014. Article (CrossRef Link)
6 W. Jiang, G. Wang and J. Wu, “Generating trusted graphs for trust evaluation in online social networks,” Future Generation Computer Systems, vol. 31, pp. 48-58, February, 2014. Article (CrossRef Link)   DOI
7 S. Y. Chou, Y. H. Chang and C. Y. Shen, “A fuzzy simple additive weighting system under group decision-making for facility location selection with objective/subjective attributes,” European Journal of Operational Research, vol. 189, no. 1, pp. 132-145, August, 2008. Article (CrossRef Link)   DOI
8 Q. Han, H. Wen, M. Ren, B. Wu and S. Li, “A topological potential weighted community-based recommendation trust model for P2P networks,” Peer-to-Peer Networking and Applications, pp. 1-11, June, 2014. Article (CrossRef Link)
9 L. Tian and W. Jiang, "A multi trust chain scheme in trusted cross-domain interaction," in Proc. of IEEE Int. Conf. on Industrial Control and Electronics Engineering, pp. 550-553, August 23-25, 2012. Article (CrossRef Link)
10 T. D. Huynh, N. R. Jennings and N. R. Shadbolt, "Certified reputation: how an agent can trust a stranger," in Proc. of the 5th ACM Int. Joint Conf. on Autonomous Agents and Multiagent Systems, pp. 1217-1224, May 8-12, 2006. Article (CrossRef Link)
11 T. D. Huynh, N. R. Jennings and N. R. Shadbolt, “An integrated trust and reputation model for open multi-agent systems,” Autonomous Agents and Multi-Agent Systems, vol. 13, no. 2, pp. 119- 154, March, 2006. Article (CrossRef Link)   DOI
12 H. T. Nguyen, W. Zhao and J. Yang, "A trust and reputation model based on Bayesian network for web services," in Proc. of IEEE Int. Conf. on Web Services, pp. 251-258, July 5-10, 2010. Article (CrossRef Link)
13 A. Jøsang and J. Golbeck, "Challenges for robust trust and reputation systems," in Proc. of the 5th Int. Workshop on Security and Trust Management, September, 2009. Article (CrossRef Link)
14 S. Che, R. Feng, X. Liang and X. Wang, “A lightweight trust management based on Bayesian and Entropy for wireless sensor networks,” Security and Communication Networks, vol. 8, no. 2, pp. 168-175, January, 2015. Article (CrossRef Link)   DOI
15 Number Of Active Mobile Devices Surpasses World Population, 2014. Article (CrossRef Link)
16 J. H. Cho, A. Swami and I. R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE Communications Surveys and Tutorials, vol. 13, no. 4, pp. 562-583, November, 2011. Article (CrossRef Link)   DOI
17 Y. Wang and J. Vassileva, "Bayesian network-based trust model," in Proc. of IEEE Int. Conf. on Web Intelligence, pp. 372-378, October 13-17, 2003. Article (CrossRef Link)
18 J. Dubey and V. Tokekar, "Bayesian network based trust model with time window for pure P2P computing systems," in Proc. of IEEE Global Conf. on Wireless Computing and Networking, pp. 219-223, December 22-24, 2014. Article (CrossRef Link)
19 Z. Wei, H. Tang, F. R. Yuand and P. Mason, "Trust establishment based on Bayesian networks for threat mitigation in mobile ad hoc networks," in Proc. of IEEE Int. Conf. on Military Communications, pp. 171-177, October 6-8, 2014. Article (CrossRef Link)
20 G. Liu, Y. Wang and M. A. Orgun, "Trust transitivity in complex social networks," in Proc. of American Association for Artificial Intelligence, vol. 11, pp. 1222-1229, August 7-11, 2011. Article (CrossRef Link)
21 A. M. Shabut, K. Dahal and I. Awan, "Friendship based trust model to secure routing protocols in mobile ad hoc networks," in Proc. of IEEE Int. Conf. on Future Internet of Things and Cloud, pp. 280-287, August 27-29, 2014. Article (CrossRef Link)
22 R. Deepa and S. Swamynathan, “A trust model for directory-based service discovery in mobile ad hoc networks,” Recent Trends in Computer Networks and Distributed Systems Security, pp. 115-126, March, 2014. Article (CrossRef Link)
23 S. K. Dhurandher, M. S. Obaidat, K. Verma, P. Gupta and P. Dhurandher, “Faces: friend-based ad hoc routing using challenges to establish security in MANETs systems,” IEEE Systems Journal, vol. 5, no. 2, pp. 176-188, June, 2011. Article (CrossRef Link)   DOI