In reputation we believe: Query processing in mobile ad-hoc networks

被引:0
|
作者
Perich, F [1 ]
Undercoffer, J [1 ]
Kagal, L [1 ]
Joshi, A [1 ]
Finin, T [1 ]
Yesha, Y [1 ]
机构
[1] Univ Maryland Baltimore Cty, Baltimore, MD 21250 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Research on data management in mobile ad-hoc networks focuses on discovering sources and acquiring information. Mobile devices assume answers to be correct and do not verify the veracity of the information or the providers. This assumption is suitable for most client-server environments; however peer-to-peer environments lack the intrinsic stability of "anchored" sources. In mobile ad-hoc networks, sources may provide faulty information, which can lead to incorrect conclusions. Consequently, devices need a mechanism to evaluate the integrity of their peers and the accuracy of peer provided information. To address this problem we propose a query processing model that relies on distributed trust and belief. Each device maintains and shares beliefs regarding the degree of trust it has for its peers - where trust is determined by experience and reputation. Additionally, each device associates a value indicating its belief in the accuracy of the information it holds. This knowledge is used by devices to determine the reliability of query responses. We implement our model in GloMoSim and provide experimental results for different combinations of trust and accuracy algorithms.
引用
收藏
页码:326 / 334
页数:9
相关论文
共 50 条
  • [1] Network-Aware Stream Query Processing in Mobile Ad-Hoc Networks
    O'Keeffe, Dan
    Salonidis, Theodoros
    Pietzuch, Peter
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1335 - 1340
  • [2] Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
    Mundinger, Jochen
    Le Boudec, Jean-Yves
    [J]. PERFORMANCE EVALUATION, 2008, 65 (3-4) : 212 - 226
  • [3] Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
    Mundinger, J
    Le Boudec, JY
    [J]. Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2005, : 41 - 46
  • [4] Query processing in mobile ad hoc wireless networks
    Li, JB
    Li, JZ
    [J]. FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 633 - 638
  • [5] Reputation based selfishness prevention techniques for mobile ad-hoc networks
    Alberto Rodriguez-Mayol
    Javier Gozalvez
    [J]. Telecommunication Systems, 2014, 57 : 181 - 195
  • [6] Reputation based selfishness prevention techniques for mobile ad-hoc networks
    Rodriguez-Mayol, Alberto
    Gozalvez, Javier
    [J]. TELECOMMUNICATION SYSTEMS, 2014, 57 (02) : 181 - 195
  • [7] Reputation based localized access control for mobile ad-hoc networks
    Sukumaran, Sangheethaa
    Blessing, Elijah
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2006, 4104 : 197 - 210
  • [8] KNN Query Processing Methods in Mobile Ad Hoc Networks
    Komai, Yuka
    Sasaki, Yuya
    Hara, Takahiro
    Nishio, Shojiro
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (05) : 1090 - 1103
  • [9] On-demand query processing in mobile ad hoc networks
    Li, Longjiang
    Leng, Supeng
    Mao, Yuming
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 364 - 368
  • [10] Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks
    Kanellopoulos, Dimitris
    Cuomo, Francesca
    [J]. ELECTRONICS, 2021, 10 (04)