Page 57 - Trust in ICT 2017
P. 57

Trust in ICT                                                1


            Various performance metrics that have been used to evaluate trust management schemes for MANETs. Note
            that a single work may use multiple performance metrics. Standard system performance metrics typically
            used  to  evaluate  trust  management  systems;  these  metrics  include  overhead  (e.g.,  control  packet
            overheads), throughput, packet dropping rate, and delay. “Route usage” refers to the number of routes
            selected particularly when the purpose is for secure routing. “Trust level” is a recently used system metric.
            Example metrics using the trust level include confidence level of the trust value, trustworthiness, opinion
            values  about  other  nodes,  and  trust  level  per  session.  “Others”  indicates  metrics  that  consider  system
            tolerance based on incorrect reputation threshold, availability, convergence time to reach steady state in
            trustworthiness of all participating nodes, and percentage of malicious nodes.

            6.2.8   Decision Making
            Trust is collected to judge the credibility of the cooperative entities in the system, based on which make a
            decision to deliver a service or application. The decision making is personalized, service/app-specific and
            context-aware that is similar as trust. A machine learning mechanism should be used for decision making
            trust provisioning in which all trust score, context, and user preferences are taken into account for making
            good decisions.

            6.3     Trust Provisioning in Networking Domain

            6.3.1   Security and Privacy
            Trust Establishment provisioning for security and privacy:

            As mentioned before, Laih [26] proposed a challenge response protocol to identify malicious or unreliable
            peers in P2P systems. The proposed protocol verifies every contacted peer and records the corresponding
            trust value making it more effective than the traditional polling algorithms. Only in the worst case, the
            protocol may use the same number of messages as a polling algorithm when the requesting peer specifies
            the same Time to Live (TTL) and every peer returns all of its neighbours as referrals. Additionally, since all
            challenge information is chosen at random, malicious peers have little opportunity to tamper with the P2P
            systems. This protocol illustrates the details in the processes for rating, gathering, and trust construction. It
            can be applied in both hybrid and distributed P2P networks.
            Opposed  to  P2P  networks,  in  open  Multi  Agent  Systems  (MASs),  agents  are  owned  by  a  variety  of
            stakeholders and they can participate or leave a system dynamically. It may be noted that participating agents
            are likely to be unreliable, self-interested and possessed with incomplete knowledge. Moreover, since agents
            are designed to behave intelligently and work in team therefore their intensions don’t remain static and
            hence might change with time. Hence it is required to implement a protocol that could establish a level of
            trust among interacting agents. In order to meet the above stated need, a trust establishment protocol has
            been proposed in [19] by using existing protocol called contract net protocol (CNP) to help monitoring and
            selecting their interaction partners.
            6.3.2   Region

            A trust management provisioning strategy for data usage policy in smart cities could be integrated with Smart
            city Data manager for data analytic and data protection

            A general architecture for Smart Cities consists of three layers:
            •       Infrastructure Layer: The layer contains variety of IoT objects that are deployed to send their data
                    to different applications. Because of IoT scenario, it considers that these IoT objects can belong to
                    different domains, such as, smart sensors from the WSN domain, smart street lights/traffic signal
                    poles  from  smart  city  domain  or  home  alarms  system/intelligent  Heating,  Ventilating,  and  Air
                    Conditioning HVAC system from smart home/building domain. It also considers that some kind of
                    infrastructure access/control mechanism is used by each of these domains independent of each
                    other’s.
            •       Platform  Layer:  The  layer  consists  of  the  several  functional  entities:  Trust  Manager,  Ontology
                    Manager, Policy Manager, Data Manager, and Application Manager. For the trusted data usage
                    model, the Trust Manager will collaborate with the Ontology Manager and Data Manager to set the

                                                                                                           49
   52   53   54   55   56   57   58   59   60   61   62