Skip to main content

Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks

  • Conference paper
  • First Online:
Testing Software and Systems (ICTSS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 12543))

Included in the following conference series:

Abstract

During this new world pandemic, a lot of technical issues have come to life, forcing all industries to reinvent themselves and how the day to day operations are performed. Remote working has become not only a trend but a necessity. Starting from online lecturing to online meetings on a need to know basis, people are concerned about their privacy and security in the online environment. Thus, in this paper, we focus our attention to the concepts of trust and reputation models in Wireless Mobile Networks (WMN), Wireless Sensor Networks (WSN) more accurately, for secure routing of large data packets with respect to Quality of Service (QoS). This paper analyses the current context in wireless mobile networks, more specifically in wireless sensor networks, and proposes a novel adaptive method to evaluate it by defining a Markov based trust function and a new model to manage it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmed, A.I.A., Ab Hamid, S.H., Gani, A., Khan, M.K., et al.: Trust and reputation for internet of things: fundamentals, taxonomy, and open research challenges. J. Netw. Comput. Appl. 145, 102409 (2019)

    Google Scholar 

  2. Aiken, A.: Zooming in on privacy concerns: video app zoom is surging in popularity. In our rush to stay connected, we need to make security checks and not reveal more than we think. Index Censorsh. 49(2), 24–27 (2020)

    Google Scholar 

  3. Alexander, J.: The entire world is streaming more than ever - and it’s straining the internet: governments and ISPs are trying to manage strain (2020)

    Google Scholar 

  4. Bansal, S., Baker, M.: Observation-based cooperation enforcement in ad hoc networks. arXiv preprint cs/0307012 (2003)

    Google Scholar 

  5. Baras, J.S., Jiang, T.: Managing trust in self-organized mobile ad hoc networks. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium Workshop (2005)

    Google Scholar 

  6. Billhardt, H., Hermoso, R., Ossowski, S., Centeno, R.: Trust-based service provider selection in open environments. In: Proceedings of the 2007 ACM symposium on Applied Computing, pp. 1375–1380 (2007)

    Google Scholar 

  7. Blose, T., Umar, P., Squicciarini, A., Rajtmajer, S.: Privacy in crisis: a study of self-disclosure during the coronavirus pandemic. arXiv preprint: 2004.09717 (2020)

    Google Scholar 

  8. Boukerche, A., Li, X.: An agent-based trust and reputation management scheme for wireless sensor networks. In: IEEE Global Telecommunications Conference, GLOBECOM 2005, vol. 3, pp. 5-pp. IEEE (2005)

    Google Scholar 

  9. Brenner, M.: Classifying ITIL processes; a taxonomy under tool support aspects. In: 2006 IEEE/IFIP Business Driven IT Management, pp. 19–28. IEEE (2006)

    Google Scholar 

  10. Chawla, A.: Coronavirus (COVID-19) - ‘zoom’ application boon or bane. SSRN 3606716 (2020)

    Google Scholar 

  11. Chen, H., Wu, H., Zhou, X., Gao, C.: Agent-based trust model in wireless sensor networks. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/distributed Computing (SNPD 2007), vol. 3, pp. 119–124. IEEE (2007)

    Google Scholar 

  12. David, K., Berndt, H.: 6G vision and requirements: is there any need for beyond 5G? IEEE Veh. Technol. Mag. 13(3), 72–80 (2018)

    Article  Google Scholar 

  13. Dhurandher, S.K., Misra, S., Obaidat, M.S., Gupta, N.: QDV: a quality-of-security-based distance vector routing protocol for wireless sensor networks using ant colony optimization. In: 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 598–602. IEEE (2008)

    Google Scholar 

  14. DOCOMO, N.: White paper 5G evolution and 6G. Accessed 1 2020

    Google Scholar 

  15. Giordani, M., Polese, M., Mezzavilla, M., Rangan, S., Zorzi, M.: Toward 6G networks: use cases and technologies. IEEE Comm. Mag. 58(3), 55–61 (2020)

    Article  Google Scholar 

  16. Glaropoulos, I.: Queuing theory 2014-exercises (2014)

    Google Scholar 

  17. Gómez Mármol, F., Marín-Blázquez, J.G., Martínez Pérez, G.: LFTM, linguistic fuzzy trust mechanism for distributed networks. Concurr. Comput. Pract. Exp. 24(17), 2007–2027 (2012)

    Article  Google Scholar 

  18. Gray, L.M., Wong-Wylie, G., Rempel, G.R., Cook, K.: Expanding qualitative research interviewing strategies: zoom video communications. Qual. Rep. 25(5), 1292–1301 (2020)

    Google Scholar 

  19. Guo, J., Chen, R., Tsai, J.J.: A survey of trust computation models for service management in internet of things systems. Comput. Commun. 97, 1–14 (2017)

    Article  Google Scholar 

  20. Kambourakis, G., Gomez Marmol, F., Wang, G.: Security and privacy in wireless and mobile networks (2018)

    Google Scholar 

  21. Mármol, F.G., Pérez, G.M.: Providing trust in wireless sensor networks using a bio-inspired technique. Telecommun. Syst. 46(2), 163–180 (2011)

    Article  Google Scholar 

  22. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265 (2000)

    Google Scholar 

  23. Marzi, H., Li, M.: An enhanced bio-inspired trust and reputation model for wireless sensor network. Procedia Comput. Sci. 19, 1159–1166 (2013)

    Article  Google Scholar 

  24. Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security. ITIFIP, vol. 100, pp. 107–121. Springer, Boston (2002). https://doi.org/10.1007/978-0-387-35612-9_9

    Chapter  Google Scholar 

  25. Pop, F., Dobre, C., Mocanu, B.C., Citoteanu, O.M., Xhafa, F.: Trust models for efficient communication in mobile cloud computing and their applications to e-commerce. Enterp. Inf. Syst. 10(9), 982–1000 (2016)

    Article  Google Scholar 

  26. Ramesh, S., Yaashuwanth, C.: Enhanced approach using trust based decision making for secured wireless streaming video sensor networks. Multimed. Tools Appl., 10157–10176 (2019). https://doi.org/10.1007/s11042-019-7585-5

  27. Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. Econ. Internet E-Commer. 11(2), 23–25 (2002)

    Google Scholar 

  28. Sen, J.: A survey on reputation and trust-based systems for wireless communication networks. arXiv preprint arXiv:1012.2529 (2010)

  29. Srinivasan, A., Teitelbaum, J., Wu, J.: DRBTS: distributed reputation-based beacon trust system. In: 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 277–283. IEEE (2006)

    Google Scholar 

  30. Srinivasan, A., Teitelbaum, J., Wu, J., Cardei, M., Liang, H.: Reputation-and-trust-based systems for ad hoc networks. Algorithms Protoc. Wirel. Mob. Ad Hoc Netw. 375, 375–404 (2009)

    Google Scholar 

  31. Xu, X., Pan, Y., Lwin, P.P.M.Y., Liang, X.: 3D holographic display and its data transmission requirement. In: 2011 International Conference on Information Photonics and Optical Communications, pp. 1–4. IEEE (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Alexandra-Elena Mocanu (Mihaita) , Bogdan-Costel Mocanu , Christian Esposito or Florin Pop .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mocanu (Mihaita), AE., Mocanu, BC., Esposito, C., Pop, F. (2020). Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks. In: Casola, V., De Benedictis, A., Rak, M. (eds) Testing Software and Systems. ICTSS 2020. Lecture Notes in Computer Science(), vol 12543. Springer, Cham. https://doi.org/10.1007/978-3-030-64881-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-64881-7_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-64880-0

  • Online ISBN: 978-3-030-64881-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics