Abstract

Online social networking is expanding gradually in our professional as well as personal life in a variety of natures, beliefs, attitudes, and personalities. During communicating through the networks, the trust plays a very significant role while undertaking the communication process. This article proposes a secure trusted hypothetical mathematical model for ensuring secure communication among devices by computing the individual trust of each node. In addition, a decision making model is integrated with the hypothetical model for further speeding up the real time communication decision within the network. The proposed phenomenon is validated against variety of security threats by considering both ideal and adversarial models. Furthermore, the proposed framework is compared to a baseline approach against various security threats such as system accuracy, DDoS attack, data falsification threat,and number of processed requests. The proposed scheme is verified by simulating over synthesized data-set.

Highlights

  • In conventional human societies, individuals apprehend to interact among each other in order to meet their needs and demands

  • We have shown how a hypothetical mathematical model and decision based schemes cooperation can solve the above-mentioned issues

  • The number of compromised nodes are increasing at the rate of 5% upon increasing the network scalability where adversarial model is verified by the proposed mechanism to validate whether AHP and mathematical model are able to identify the adversarial nodes in the network or not

Read more

Summary

INTRODUCTION

Individuals apprehend to interact among each other in order to meet their needs and demands. OSN are becoming huge platforms for data generation among users through rating, discussion or reviews, but the tremendous information can be unreliable, irreverent, non-trusted and very different to filter. Various trust based approaches have been evaluated by authors/scientists, such as Machine learning, deep learning, regression or prediction based strategies in order to improve/analyze the trust on OSN [13], [14] These methods/processes may face variety of issues or challenges such as context-awareness, scarcity of trust relations and change in the trust rate with change in time in cyber-physical environment [15], [16].

RELATED WORK
SYSTEM ERROR
TOPSIS FOR SECURED DECISION
IMPLEMENTATION SETUP
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call