Abstract
Conventional reputation system follows 2-dimensional Betadistribution to do one rule observation. However, complex environments with high BER and propagation delay, strong interference or moving protocol will cut down the accuracy of detection. Apart from that, the response times of reputation value are various from different circumstances, which demand an adaptable mechanic. Therefore in this paper, we propose a highly adaptable reputation system with the ability of results category, fluctuation toleration, response time adjustment, and attack prevention. The results show our system has great performance on fuzzy state detection, effectively filters the burst fluctuation and rapidly responds to the long term variation with low power cost. Practically, the performance under wormhole attacks such as jam-and-reply attacks is promising.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wang, X., Ding, L., Bi, D.: Reputation-Enabled Self-Modification for Target Sensing in Wireless Sensor Networks. IEEE Transactions on Instrumentation and Measurement 59(1), 171–179 (2010)
Bao, F., Chen, I., Chang, M., Cho, J.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management 9(2), 169–183 (2012)
Maarouf, I., Baroudi, U., Naseer, A.R.: Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks. IET Communications 3(5), 846–858 (2008)
Harbin, J., Mitchell, P.: Reputation routing to avoid sybil attacks in wireless sensor networks using distributed beamforming. In: ISWCS 2011 (2011)
Momani, M., Aboura, K., Challa, S.: RBATMWSN: Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks. In: Intelligent Sensors, Sensor Networks and Information (ISSNIP 2007), Melbourne (2007)
Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Communications of the ACM, 45–48 (2000)
Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A Survey of Trust and Reputation Management Systems in Wireless Communications. Proceedings of the IEEE 98(10), 1755–1772 (2010)
Hongjun, D., Zhiping, J., Xiaona, D.: A Entropy-based Trust modeling and Evaluation for Wireless Sensor Networks. In: International Conference on Embedded Software and Systems (ICESS 2008), Sichuan (2008)
He, Q., Wu, D., Pradeep, K.: SORI:a secure objective reputation-based incentive scheme for ad-hoc networks. In: Wireless Communications and Networking Conference (WCNC 2004) (2004)
Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN) 4(3), 1–37 (2008)
Jøsang, A., Ismail, R.: The Beta Reputation System. In: 15th Bled Electronic Commerce Conference, pp. 1–14 (2002)
Ren, Y., Zadorozhny, V.I., Oleshchuk, V.A., Li, F.Y.: A Novel Approach to Trust Management in Unattended Wireless Sensor Networks. IEEE Transations on Mobile Computing (2013)
Chen, H., Wu, H., Gao, C.: Agent-based Trust Model in Wireless Seneor Networks. In: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Qingdao (2007)
Qin, T., Yu, H., Leung, C., Shen, Z., Miao, C.: Towards a trust aware cognitive radio architecture. ACM SIGMOBILE Mobile Computing and Communications Review 12(2), 86–95 (2009)
Rasmusson, L., Jansson, S.: Simulated social conreol for secure Internet commerce. In: Proceedings of the 1996 Workshop on New Security Paradigms, pp. 18–25 (1996)
Leonard, T.: A Bayesian Approach to Some Mulinomial Estimation and Pretesting Problems. Journal of the American Statistical Association 72(360a), 869–874 (1977)
Wang, X., Ma, X., Grimson, E.: Unsupervised Activity Perception by Hierarchical Bayesian Models. In: Computer Vision and Pattern Recognition, CVPR 2007, Minneapolis (2007)
Jøsang, A., Haller, J.: Dirichlet Reputation Systems. In: The Proceedings of the 2nd International Conference on Availability, Reliability and Security (ARES 2007), Vienna (2007)
Buchegger, S., Boudec, J.-Y.L.: A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In: PP2PEcon 2004, Cambridge, MA (2004)
Zhou, R., Hwang, K.: PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing. IEEE Transactions on Parallel and Distributed Systems 18(4), 460–473 (2007)
Hu, Y.-C., Perrig, A., Johnson, D.: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications 24(2), 370–380 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Xiao, X., Chen, L., Li, Y. (2014). A Highly Adaptable Reputation System Based on Dirichlet Distribution. In: Han, W., Huang, Z., Hu, C., Zhang, H., Guo, L. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8710. Springer, Cham. https://doi.org/10.1007/978-3-319-11119-3_33
Download citation
DOI: https://doi.org/10.1007/978-3-319-11119-3_33
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11118-6
Online ISBN: 978-3-319-11119-3
eBook Packages: Computer ScienceComputer Science (R0)