Abstract
During this new world pandemic, a lot of technical issues have come to life, forcing all industries to reinvent themselves and how the day to day operations are performed. Remote working has become not only a trend but a necessity. Starting from online lecturing to online meetings on a need to know basis, people are concerned about their privacy and security in the online environment. Thus, in this paper, we focus our attention to the concepts of trust and reputation models in Wireless Mobile Networks (WMN), Wireless Sensor Networks (WSN) more accurately, for secure routing of large data packets with respect to Quality of Service (QoS). This paper analyses the current context in wireless mobile networks, more specifically in wireless sensor networks, and proposes a novel adaptive method to evaluate it by defining a Markov based trust function and a new model to manage it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmed, A.I.A., Ab Hamid, S.H., Gani, A., Khan, M.K., et al.: Trust and reputation for internet of things: fundamentals, taxonomy, and open research challenges. J. Netw. Comput. Appl. 145, 102409 (2019)
Aiken, A.: Zooming in on privacy concerns: video app zoom is surging in popularity. In our rush to stay connected, we need to make security checks and not reveal more than we think. Index Censorsh. 49(2), 24–27 (2020)
Alexander, J.: The entire world is streaming more than ever - and it’s straining the internet: governments and ISPs are trying to manage strain (2020)
Bansal, S., Baker, M.: Observation-based cooperation enforcement in ad hoc networks. arXiv preprint cs/0307012 (2003)
Baras, J.S., Jiang, T.: Managing trust in self-organized mobile ad hoc networks. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium Workshop (2005)
Billhardt, H., Hermoso, R., Ossowski, S., Centeno, R.: Trust-based service provider selection in open environments. In: Proceedings of the 2007 ACM symposium on Applied Computing, pp. 1375–1380 (2007)
Blose, T., Umar, P., Squicciarini, A., Rajtmajer, S.: Privacy in crisis: a study of self-disclosure during the coronavirus pandemic. arXiv preprint: 2004.09717 (2020)
Boukerche, A., Li, X.: An agent-based trust and reputation management scheme for wireless sensor networks. In: IEEE Global Telecommunications Conference, GLOBECOM 2005, vol. 3, pp. 5-pp. IEEE (2005)
Brenner, M.: Classifying ITIL processes; a taxonomy under tool support aspects. In: 2006 IEEE/IFIP Business Driven IT Management, pp. 19–28. IEEE (2006)
Chawla, A.: Coronavirus (COVID-19) - ‘zoom’ application boon or bane. SSRN 3606716 (2020)
Chen, H., Wu, H., Zhou, X., Gao, C.: Agent-based trust model in wireless sensor networks. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/distributed Computing (SNPD 2007), vol. 3, pp. 119–124. IEEE (2007)
David, K., Berndt, H.: 6G vision and requirements: is there any need for beyond 5G? IEEE Veh. Technol. Mag. 13(3), 72–80 (2018)
Dhurandher, S.K., Misra, S., Obaidat, M.S., Gupta, N.: QDV: a quality-of-security-based distance vector routing protocol for wireless sensor networks using ant colony optimization. In: 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 598–602. IEEE (2008)
DOCOMO, N.: White paper 5G evolution and 6G. Accessed 1 2020
Giordani, M., Polese, M., Mezzavilla, M., Rangan, S., Zorzi, M.: Toward 6G networks: use cases and technologies. IEEE Comm. Mag. 58(3), 55–61 (2020)
Glaropoulos, I.: Queuing theory 2014-exercises (2014)
Gómez Mármol, F., Marín-Blázquez, J.G., Martínez Pérez, G.: LFTM, linguistic fuzzy trust mechanism for distributed networks. Concurr. Comput. Pract. Exp. 24(17), 2007–2027 (2012)
Gray, L.M., Wong-Wylie, G., Rempel, G.R., Cook, K.: Expanding qualitative research interviewing strategies: zoom video communications. Qual. Rep. 25(5), 1292–1301 (2020)
Guo, J., Chen, R., Tsai, J.J.: A survey of trust computation models for service management in internet of things systems. Comput. Commun. 97, 1–14 (2017)
Kambourakis, G., Gomez Marmol, F., Wang, G.: Security and privacy in wireless and mobile networks (2018)
Mármol, F.G., Pérez, G.M.: Providing trust in wireless sensor networks using a bio-inspired technique. Telecommun. Syst. 46(2), 163–180 (2011)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265 (2000)
Marzi, H., Li, M.: An enhanced bio-inspired trust and reputation model for wireless sensor network. Procedia Comput. Sci. 19, 1159–1166 (2013)
Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security. ITIFIP, vol. 100, pp. 107–121. Springer, Boston (2002). https://doi.org/10.1007/978-0-387-35612-9_9
Pop, F., Dobre, C., Mocanu, B.C., Citoteanu, O.M., Xhafa, F.: Trust models for efficient communication in mobile cloud computing and their applications to e-commerce. Enterp. Inf. Syst. 10(9), 982–1000 (2016)
Ramesh, S., Yaashuwanth, C.: Enhanced approach using trust based decision making for secured wireless streaming video sensor networks. Multimed. Tools Appl., 10157–10176 (2019). https://doi.org/10.1007/s11042-019-7585-5
Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. Econ. Internet E-Commer. 11(2), 23–25 (2002)
Sen, J.: A survey on reputation and trust-based systems for wireless communication networks. arXiv preprint arXiv:1012.2529 (2010)
Srinivasan, A., Teitelbaum, J., Wu, J.: DRBTS: distributed reputation-based beacon trust system. In: 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 277–283. IEEE (2006)
Srinivasan, A., Teitelbaum, J., Wu, J., Cardei, M., Liang, H.: Reputation-and-trust-based systems for ad hoc networks. Algorithms Protoc. Wirel. Mob. Ad Hoc Netw. 375, 375–404 (2009)
Xu, X., Pan, Y., Lwin, P.P.M.Y., Liang, X.: 3D holographic display and its data transmission requirement. In: 2011 International Conference on Information Photonics and Optical Communications, pp. 1–4. IEEE (2011)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 IFIP International Federation for Information Processing
About this paper
Cite this paper
Mocanu (Mihaita), AE., Mocanu, BC., Esposito, C., Pop, F. (2020). Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks. In: Casola, V., De Benedictis, A., Rak, M. (eds) Testing Software and Systems. ICTSS 2020. Lecture Notes in Computer Science(), vol 12543. Springer, Cham. https://doi.org/10.1007/978-3-030-64881-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-64881-7_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-64880-0
Online ISBN: 978-3-030-64881-7
eBook Packages: Computer ScienceComputer Science (R0)