TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things

Size: px
Start display at page:

Download "TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things"

Transcription

1 DOI: /CSIS C TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs Dong Chen 1, Guran Chang 2, Dawe Sun 1, Jaa L 1, Je Ja 1, and Xngwe Wang 1 1 College of Informaton Scence and Engneerng, Northeastern Unversty, Shenyang, Chna chend.2008@gmal.com 2 Computng Center, Northeastern Unversty, Shenyang, Chna chang@neu.edu.cn Abstract. Snce a large scale Wreless Sensor Network (WSN) s to be completely ntegrated nto Internet as a core part of Internet of Thngs (IoT) or Cyber Physcal System (CPS), t s necessary to consder varous securty challenges that come wth IoT/CPS, such as the detecton of malcous attacks. Sensors or sensor embedded thngs may establsh drect communcaton between each other usng 6LoWPAN protocol. A trust and reputaton model s recognzed as an mportant approach to defend a large dstrbuted sensor networks n IoT/CPS aganst malcous node attacks, snce trust establshment mechansms can stmulate collaboraton among dstrbuted computng and communcaton enttes, facltate the detecton of untrustworthy enttes, and assst decson-makng process of varous protocols. In ths paper, based on n-depth understandng of trust establshment process and quanttatve comparson among trust establshment methods, we present a trust and reputaton model TRM-IoT to enforce the cooperaton between thngs n a network of IoT/CPS based on ther behavors. The accuracy, robustness and lghtness of the proposed model s valdated through a wde set of smulatons. Keywords: Internet of Thngs, Cyber Physcal System, Wreless Sensor Network, Trust, Reputaton, Fuzzy Sets. 1. Introducton Cyber-Physcal Systems (CPS) are systems deployed n large geographcal areas and generally consst of a massve number of dstrbuted computng devces tghtly coupled wth ther physcal envronment [1]. CPS and Internet of Thngs (IoT) have always been closely related, snce both of them employ physcal obects and events, ncludng WSNs, RFID-based systems, moble phones, etc. Cyber-Physcal Internet [1], whch can roughly be vewed as a

2 Dong Chen, Guran Chang, Dawe Sun, Jaa L, Je Ja, and Xngwe Wang large-scale unversal network that nterconnects several heterogeneous CPS n order to ensure worldwde nteroperablty of cyber-physcal devces. Therefore, we argue that the proposed fuzzy theory based trust and reputaton model s not only sutable for CPS, but also sutable for IoT. IoT and CPS cannot perceve physcal nformaton from physcal world themselves. Intellgent thngs are usually labeled wth RFID tags or equpped wth sensors and sensors are wdely regarded as the nerve endngs of IoT/CPS [2] [3]. Sensors or sensor embedded thngs can usually form a wreless mult-hoc network-wsn employng ZgBee, W-F, Bluetooth and etc. In a future IoT/CPS, a large number of embedded, possbly moble computng devces wll be nterconnected through WSNs, consttutng varous autonomous subsystems that provde ntellgent servces for end users. IoT/CPS can beneft from WSNs from the perspectve that so far, sensors and RFID readers are the most effcent tools to obtan sensed data from the physcal world, turnng ubqutous computng of IoT/CPS nto a realty. Therefore, Internet connectvty n WSNs of the IoT/CPS s hghly desrable, featurng sensng servces at a global scale all over the world [4]. However, such networks present some new challenges when compared wth tradtonal computer networks, namely n terms of smart node hardware constrants, very lmted computng and energy resources. Unlke other networks usng dedcated nodes to support basc functons lke packet forwardng, routng, and network management, n WSNs of IoT/CPS, those functons are carred out by all avalable nodes. Ths sgnfcant dfference s at the core of the ncreased senstvty to node msbehavor. Due to the wreless nature of ths knd of WSNs, t s also qute possble that a node could be captured by an adversary, whch may lead to ts non-cooperatve behavor or msbehavor wth the rest of the nodes n the network and even become a malcous node. Malcous nodes am at damagng other nodes by causng network outage by parttonng. In order to facltate the detecton of untrustworthy nodes, and assst decson-makng process of varous protocols n a WSN whch s vtal for carryng out specfc tasks as t ads sensors establsh collaboratons, t s necessary to provde a trust and reputaton mechansm for WSNs of IoT/CPS. One strategy to mprove the securty of WSNs s to develop trust mechansms that allow a node to evaluate trustworthness of other nodes [5] [6]. Such trust and reputaton systems not only help n node behavor detecton, but also mprove network performance snce honest nodes can avod workng wth untrustworthy nodes [7]. The measurement and computaton of trust and reputaton to secure nteractons between sensor nodes n IoT/CPS s crucal for the development of trust and reputaton management mechansms. The calculaton and measurement of trust and reputaton n a supervsed ad-hoc envronment nvolves complex aspects such as credble ratng for opnons delvered by a node, the honesty of recommendatons provded by a sensor node, or the assessment of past experences wth the node one wshes to nteract wth. The deployment of sutable algorthms and models mtatng fuzzy logc can help to solve these problems. Therefore, the focus of ths paper s to develop 1208 ComSIS Vol. 8, No. 4, Specal Issue, October 2011

3 TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs a fuzzy theory based trust and reputaton model for IoT/CPS envronment. The proposed theoretcal models are then appled to mprove the performance of routng algorthms and detect node behavors of WSNs n IoT/CPS. The contrbuton of ths paper can be categorzed as follows. (1) Analyss of specal features and unque trust challenges of IoT/CPS; (2) Concepts of trust and reputaton and dscusson of the relatonshp between trust and reputaton n IoT/CPS; (3) A novel fuzzy theory based trust and reputaton management model towards IoT/CPS; (4) Trust evaluaton metrcs, local trust relatonshp evaluaton and global trust relatonshp evaluaton; (5) A wde set of smulatons, performance evaluatons of the proposed fuzzy trust and reputaton management model. The remander of the paper s organzed as follows. We gve an overvew of related nfluental works n Secton 2. In Secton 3, a novel trust and reputaton model for choosng trusted source nodes base on the fuzzy relatonshp theory n fuzzy mathematcs TRM-IoT s proposed and further dscussed n detal n WSNs of IoT/CPS. The smulaton results n Secton 4 show that TRM-IoT model can effectvely prevent malcous and selfsh nodes. TRM-IoT scheme can promote data forwardng and cooperaton between nodes and mprove the performance of the entre network, followed by the concluson and future work of the paper n Secton Related Works Establshng securty communcaton channels based on trust and reputaton models among sensor nodes s an mportant consderaton when desgnng a secure routng soluton n IoT/CPS. ATRM [8] s an agent-based trust and reputaton management scheme for WSNs where trust and reputaton management s carred out locally wth mnmal overhead n terms of extra messages and tme delay. However, snce moble agents are desgned to travel over the entre network and run on remote nodes, they must be launched by trusted enttes. An agent-based trust model for WSN s presented n [9] usng a watchdog scheme to observe the behavor of nodes and broadcast ther trust ratngs. Sensor nodes receve the trust ratngs from the agent nodes, whch are responsble for montorng the former and computng and broadcastng those trust ratngs. In [10], a reputaton-based scheme called DRBTS s proposed to provde a method by whch beacon nodes, BN, can montor each other and provde nformaton so that sensor nodes, SN, can choose who to trust, and based on a quorum votng approach. However, n order to trust a BN s nformaton, a sensor must get votes for ts trustworthness from at least half of ther common neghbors. BTRM-WSN [11] s a bo-nspred trust and reputaton model for WSN amed to acheve to the most trustworthy path leadng to the most reputable node n a WSN offerng a certan servce. Each node must mantan a pheromone trace for each of ts neghbors. CONFIDANT [12] s proposed to extend ComSIS Vol. 8, No. 4, Specal Issue, October

4 Dong Chen, Guran Chang, Dawe Sun, Jaa L, Je Ja, and Xngwe Wang reactve routng protocols wth a reputaton-based system n order to solate msbehavng nodes. Each node montors the behavors of ts next hop neghbors. Trust relatonshps and routng decsons are based on experenced, observed, or reported routng and forwardng behavor of other nodes. SORI [13] scheme s proposed to encourage packet forwardng and dscplne selfsh behavor. The reputaton of a node s quantfed by obectve measures, and the propagaton of reputaton s effcently secured by a oneway-hash-chan-based authentcaton scheme. Watchdog and Pathrater mechansms [14], are ust two extensons to the DSR algorthm. However, not all of the most known works take nto account the strong restrctons about processng, storage or communcaton capabltes. Some of them rely on a watchdog mechansm wth or wthout usng a mult-agent system. IoT/CPS assumes that trllons of thngs whch are used on a daly bass wll eventually be connected to the Internet employng 6LoWPAN [15] protocol and provde ntellgent servce through cooperatng wth each other. Most thngs have the followng sgnfcant characterstcs [16] [17], lmted power capablty, wreless recevers and transmtters wth lmted range facng the use of mult-hop communcaton, moblty (thngs wll move, possbly become dsconnected) and volablty (thngs may be swtched on and off frequently). All the above ssues rase the need for the development of a novel management model, dfferent from those beng n use today. Based on the research of characterstcs of IoT/CPS and n-depth understandng of ATRM [8], ATSN [9], DRBTS [10], BTRM-WSN [11], CONFIDANT [12], SORI [13] and WP [14], we propose a novel trust and reputaton model TRM-IoT to enforce the cooperaton between thngs n a network of IoT/CPS based on ther behavors. 3. TRM-IoT: A Trust Model for IoT/CPS The trust between sensor nodes cannot be set up smply by usng the tradtonal trust mechansms. In a human socal communty, trust between two ndvduals s developed based on the reputaton evaluaton of ther actons over tme. When faced wth uncertanty, ndvduals wll trust and rely on the actons and evaluatons of others who have behaved well n the past. Trust s one of the most fuzzy, dynamc and complex concepts n both socal and busness relatonshps. The dffculty n measurng trust and predctng trustworthness n servce-orented network envronments leads to many problems. These nclude ssues such as how to measure the wllngness and capablty of ndvduals n the trust dynamcs and how to assgn a concrete level of trust to an ndvdual. Wreless networks of IoT/CPS have several salent characterstcs, such as dynamc topologes, bandwdth constrants, varable capacty lnks, energy constraned operaton, and lmted physcal securty. Due to these features, WSNs of IoT/CPS are partcularly vulnerable to all knds of attacks launched through malcous nodes. Unrelable wreless lnks are vulnerable to ammng and 1210 ComSIS Vol. 8, No. 4, Specal Issue, October 2011

5 TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs eavesdroppng. Constrants n bandwdth, computng power, and battery power n moble devces may lead to ther trade-offs between securty and resource consumpton. Dynamcs make t hard to evaluate node behavors, because routes n ths knd of networks change frequently. Sensors or sensor embedded thngs are more lkely to form a wreless mult-hoc network. Therefore, they cannot rely on central authortes and nfrastructures for key management. In ths paper, we propose a generalzed and unfed mechansm to address the trust and reputaton ssue by developng a communty of sensor nodes n the WSNs of IoT/CPS. Our motvaton s to develop a smlar behavor and fuzzy theory-based trust and reputaton model for sensor nodes or sensorembedded nodes, where each node develops a drect reputaton for each other node by makng drect observatons and ndrect reputaton between ndvduals set up upon recommendatons of other ndvduals about these other nodes n the neghborhood. The two knds of reputatons are used together to help a node evaluate the trustworthness of other sensor nodes, detect the malcous nodes, and assst decson-makng wthn the wreless network. The proposed scheme can be employed n any WSNs routng protocol to enforce cooperaton among nodes and counter wth noncooperatve nodes n IoT/CPS nfrastructure. The resource constrants of WSNs such as lmted battery lfetme, memory space and computng capablty n IoT/CPS make t easy to attack and farly hard to protect. Therefore, t s farly crtcal to detect the compromsed nodes n order to avod beng msled by those compromsed or malcous nodes. However, malcous nodes are so dffcult to detect even a cryptography mechansm s appled, snce most low-cost tny sensor nodes are not tamperresstant and easy to be cracked by the adversary. Therefore, n ths paper we argue that behavors-based trust and reputaton mechansm can be used to resolve ths problem effcently. Based on ths motvaton, ths paper proposes a novel behavor-based trust and reputaton for IoT/CPS. The management model of trust and reputaton s related to the creaton, update and deleton of trust and reputaton degree. Frst, an effectve lghtweght authentcaton mechansm must exst to ensure all the denttes are trustworthy [18] [19] [20]. That means the dentty of each sensor node s unque and trustworthy, on the bass of cryptographc prmtves [21] [22] [23]. In fact, we have proposed a novel lghtweght parwse key management scheme towards IoT/CPS n a prevous paper before ths one. Second, the task evaluaton component evaluates the performance of the nodes, ncludng sensors nodes and sensor-embedded devce nodes. The tasks here nclude data processng and routng. Thrd, evaluaton combnaton component s n charge of the result combnaton of the old trust degree and the ndrect nformaton from the thrd node n order to form the new trust degree whch s used n future task allocaton and evaluaton. Throughout ths paper we assume a scenaro where a WSN of IoT/CPS s composed of hundreds of sensor nodes wth relatvely hgh sensor actvty. Wthout loss of generalty, we consder some sensor nodes requestng lghtweght common servces and some nodes provdng these servces. We ComSIS Vol. 8, No. 4, Specal Issue, October

6 Dong Chen, Guran Chang, Dawe Sun, Jaa L, Je Ja, and Xngwe Wang also assume that every sensor node n the WSN only knows ts neghbors and nothng else about the whole topology of the WSN. Addtonally, the topology s consdered to be relatvely hghly dynamc, wth many nodes onng or leavng the communty. The contrbuton of the proposed model s amed to help a sensor node requestng a specfc servce to fnd the most trustworthy route leadng to another sensor node provdng the correspondng servce. An untrustworthy node n ths paper can be consdered ether because t ntentonally provdes a fraudulent servce or because t provdes a wrong servce due to hardware falures or performance deteroraton. In ths paper, takng costly decsons depends on the expectatons created accordng to past behavor of others. Usually, ths knd of nformaton s called reputaton and t s one of the most sgnfcant factors to trust merchants and recommenders towards IoT/CPS Defntons of Trust and Reputaton Although we experence and rely on trust n everyday lfe, t s so challengng to defne trust accurately. The lterature on trust s also qute confusng, snce t manfests tself n farly dfferent forms. In ths paper, we adopt the followng defntons for trust and reputaton. Defnton 1. Trust s the subectve probablty by whch an ndvdual, A, expects that another ndvdual, B, performs a gven acton on whch ts welfare depends [24]. Defnton 2. Reputaton s what s generally sad or beleved about a thng s character or standng [25]. Reputaton exsts only n a communty whch s observng ts members n one way or the other. Accordngly, reputaton s the collected and processed nformaton about one partner s former behavor as experenced by others. Josanga [25] gves a survey of trust and reputaton systems and ponts out that there s sgnfcant dfference between trust and reputaton. Trust s a subectve phenomenon whch s based on varous factors or evdences. In fact, frsthand experence always carres more weght than the secondhand trust recommendaton or reputaton. Snce the nodes n the data collecton layer of IoT/CPS usually are heterogeneous and moble, trust establshment model can sgnfcantly stmulate collaboraton among dstrbuted computng and communcaton enttes, facltate the detecton of untrustworthy enttes, and assst decson-makng process of varous protocols. Based on [24] and [25], we try to gve the followng more detaled trust and reputaton defntons towards IoT/CPS ComSIS Vol. 8, No. 4, Specal Issue, October 2011

7 TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs Defnton 3. In a wreless network of IoT/CPS, a node S s trust n another node P s the subectve expectaton of node S recevng postve outcomes through the transactons wth node P. Defnton 4. In IoT/CPS, a node S s reputaton s the global percepton of ts trustworthness n the wreless network. Furthermore, the trustworthness can be evaluated from ts past and current behavors. Trust n ths paper descrbes the relyng node s trust n a servce or resource provder node and t s relevant when the relyng party s a user seekng protecton from malcous or unrelable servce provders Relatonshp between Trust and Reputaton The term trust and reputaton have strongly lnked meanngs. Especally n WSNs of IoT/CPS, trust s often defned as an abstract acqured attrbute relatve to some sensor nodes whch s due to the amount of reputaton held by such sensor nodes. By makng full use of observng good long-term behavor, reputaton ratngs can be mproved; therefore, trust relatonshps wll be easly establshed [5]. In real-lfe communtes, trust s the consequence of the satsfacton of certan desred propertes [26]. As dscussed n [25], the concept of reputaton s closely lnked to that of trust; however, there s a clear and sgnfcant dfference. A node S can trust n another node P because of ts good reputaton. Lkewse, node S can also trust n node P n spte of ts bad reputaton. Reputaton s usually nspred by the past behavors observed. Trust reflects the relyng party s subectve vew of an entty s trustworthness, whereas reputaton s a score whch can be seen by the whole communty. Note that, n ths paper, trust s consdered as a subectve probablty value whle reputaton s regarded as an obectve and acknowledged value n a specfc communty context Fuzzy Trust Model Descrpton An entty s trustworthness s the qualty ndcator of the entty s servces, whch s used to predct the future behavor of the entty (stored n sensors or sensor-embedded thngs). Intutvely, f t s trustworthy enough, the entty wll provde good servces for future transactons. In most trust models, the doman of trustworthness s assumed to be [0, 1]. Snce the key ssue n nvestgatng fuzzy problems s to establsh membershp functons (membershp degrees) by employng the fuzzy set theory, we have to create the mathematcal model of fuzzy trust frstly [27]. ComSIS Vol. 8, No. 4, Specal Issue, October

8 Dong Chen, Guran Chang, Dawe Sun, Jaa L, Je Ja, and Xngwe Wang Suppose that SN { SN1, SN2,, SN n } s a problem doman of the fuzzy trust model. Note that, SN ( 1,2,, n) s a subset n the correspondng doman. Then we can get the followng mappng, MappngFucton : SN SN [0,1], (1) ( SN, SN ) ( SN, SN ) [0,1]. where ( SN, SN ) represents the degree of trust relatonshp between SN and SN. MappngFuctons a fuzzy relaton mappng from SN SN to [0,1]. In the proposed scheme, a neghbor montorng process s used to collect nformaton of the package forwardng behavors of the neghbors. Each sensor node n the network mantans a data forwardng transacton table as follows, DFT Souce, Destnaton, RF, F, TTL (2),,, where Souce s the trust and evaluaton evaluatng nodes, Destnaton s the evaluated destnaton nodes, RF, denotes the tmes of successful transactons whch node postve transactons. SN has made wth node F SN, and, denotes the 3.4. Trust Evaluaton Metrcs Wthn the realm of IoT/CPS securty, we nterpret the concept of trust as a relaton between enttes stored n sensor nodes that partcpate n varous protocols. Trust relatons are based on evdence or reputaton created by the prevous nteractons of enttes wthn a protocol. Each node employs a neghbor montorng process n order to collect nformaton about the packet forwardng behavors of the neghbor nodes. Furthermore, each node s capable of overhearng the transmssons of ts neghbors n the promscuous mode. Each node ndependently overhears ts neghborng nodes packet forwardng actvtes. Ths overhearng s related to the proporton of correctly forwarded packets wth respect to the total number of packets to be forwarded durng a fxed tme wndow. Then, each node n the network mantans a data forwardng nformaton table. The table ncludes only the data forwardng transacton nformaton by overhearng ts neghborng nodes. In the proposed model, we consder the followng trust evaluaton metrcs for the establshment and valdaton of the proposed trust management model. (1) End-to-end packet forwardng rato (EPFR). EPFR s defned as the rato between the numbers of packets receved by the applcaton layer of destnaton nodes to the numbers of packets sent by the applcaton layer of the source node. The EPFR can be calculated by k RECV EPFR,0 k n. n SEND (3) 1214 ComSIS Vol. 8, No. 4, Specal Issue, October 2011

9 where TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs RECV and SEND denote the packages receved and sent by the -th destnaton node and the -th source node, respectvely. And k denotes the successful recevng tmes, whle n denotes the total tmes of packages sendng. (2) AEC. The key crteron for the desgn of a WSN n IoT/CPS Infrastructure s the energy consumpton. In order to research and analyze the energy consumpton of our TRM-IoT model, we defne the energy consumpton metrc as follows, AEC n 1 consume send recv n 1 where send and recv denotes the energy consumpton when the th sensor node sendng and recevng messages, respectvely. consume denotes the total energy cost of consumpton the trust and reputaton values of the correspondng sensor node. And represents the other energy consumng whch s used to mantan the normal runnng of the node tself. (3) PDR. In fact, the package delvery rato (PDR) s affected by the packet loss and packet retransmssons. Packet loss may occur for many reasons. In ths paper we only focus on the behavor that an ntermedate node ntentonally drops the receved data packets nstead of forwardng them to the next hop node. (4) 3.5. Reputaton Evaluaton Node SN evaluates the reputaton of node SN wth whch t tres to make transactons by ratng each package forwardng process as ether postve or negatve, dependng on whether SN has completely done the transacton correctly. As dscussed above, we use Con to descrbe the evaluaton of the whole metrcs n order to udge whether ths transacton s successful. The Con can be computed by Con EPFR, AEC, PDR EPFR AEC PDR (5) where,, represent the correspondng aspect weghts of the dfferent resources. We also defne a parameter Sat to descrbe the satsfacton Threshold degree. That means, f Con Sat, then t ndcates that node SN get a Threshold negatve reputaton evaluaton to nodesn ; f Con Sat, t ndcates that Threshold node SN gets a postve reputaton evaluaton to node SN. The reputaton evaluaton of all nteractons from node defned as follows, SN to node SN s ComSIS Vol. 8, No. 4, Specal Issue, October

10 Dong Chen, Guran Chang, Dawe Sun, Jaa L, Je Ja, and Xngwe Wang F, [0,1]. (6) RF, Reputaton evaluaton s the bass of trust management. In our trust model, the reputaton s evaluated consderng three metrcs, EPFR, AEC and PDR. Compared wth other reputaton evaluaton methods, we consder more factors whch can more accurately evaluate the behavors of nodes accordng to specfc characterstcs of IoT/CPS Local Trust Evaluaton From dfferent ponts of vew, trust can usually be categorzed nto dfferent classes: drect trust and ndrect trust. When we say node SN s trustworthy or untrustworthy for the node SN, t means that there must be a trust and reputaton model between node SN and node SN. If a trust relatonshp statement s based on the reputaton of drect observatons on nodesn, the correspondng model mentoned above s the drect trust model. Snce the drect trust relatonshp also has some sgnfcant fuzzy propertes, we can descrbe the drect trust model employng the fuzzy theory. Accordng to the data forwardng transacton table, fuzzy reputaton membershp based drect trust model can be defned as d T (7), (1 ) RF, where denotes the weght of the past negatve behavor that can be regulated to punsh the malcous node acton. represents the uncertanty trust for the weght value. Snce the behavor of a node s not always constant but often changes n tme and volatlty, t s sgnfcant that the recent events are more credble d than the hstorcal events. Let T ( t 1) be the most recent trust evaluaton, and d T ( t ) be the past trust evaluaton durng a tme nterval t. We, d combne the recent events and hstorcal events to update T, () t : d d d T ( t) T ( t 1) T ( t ),, 1, 2, 1 1, [0,1] Therefore, the new trust of T () t s dependent on the three factors,, d d T ( t 1), T ( t) and. Then we can get the local trust updatng equaton,,, (8) 1216 ComSIS Vol. 8, No. 4, Specal Issue, October 2011

11 TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs d 1 d 1 d T, ( t) (1 ) T, ( t 1) T, ( t ). (9) 2 2 However, t s arbtrary and dffcult to decde whether a moble sensor node behavor s good or bad only based on a few nteractons. Therefore, we must have an nteracton threshold value of nteracton tmes C threshold. Consequently, the fuzzy drect trust evaluaton can be computed by 1 (1 ), RF C, threshold 2 Cthreshold d T, (10), RF C, threshold (1 ) RF, When node SN and node SN has no drect relatonshp and cannot establsh drect communcaton channel to exchange data, node SN can evaluate the trust of node SN based on the recommendaton trust of a thrd party node SN. k As s dscussed n [28], the recommendaton trust and reputaton model can be dvded nto two categores, transtvty and consensus recommendaton trust and reputaton management models. The fuzzy transtvty recommendaton trust and reputaton model defnes a degree of recommendng relatonshp between node SN and node SN. RR denotes the number of request recommendatons, and HR,, represents the number of the postve recommendatons. CR threshold s defned as threshold value of the recommendaton tmes. Therefore, the membershp functon for fuzzy recommendaton trust model s defned as: 1 (1 ), RR, CRthreshold 2 CRthreshold r Tk, (11), RR, CRthreshold (1 ) RR, HR, where [0,1]. RR, The dfferent sensor nodes may provde dverse recommendatons on the same nodes. That means, dfferent nodes may have the dfferent or even opposte trust evaluatons towards the same sensor node. Assume that node r SNk gves the recommendaton trust evaluaton of Tk, and nodesnt provdes r the recommendaton trust evaluaton of T t, to node SN. Also there have two drect trust relatonshps between node SN and node SN k, node SN and node SN, respectvely. t ComSIS Vol. 8, No. 4, Specal Issue, October

12 Dong Chen, Guran Chang, Dawe Sun, Jaa L, Je Ja, and Xngwe Wang Here we combne the two recommendaton trust evaluaton and the two drect trust evaluatons to make a relatvely obectve assessment for node SN, T, ( D( SN, SNk ) R( SNk, SN )) ( D( SN, SNt ) R( SN, SN )), SN, SN SN. t k t (12) Therefore, n a smlar way, the fuzzy membershp functon of n-level fuzzy consensus recommendaton trust and reputaton model can be defned as T ( R D) ( R D) ( R D) (13), n In concluson, the fuzzy local trust relatonshp can be calculated through the combnaton based on drect and ndrect trust evaluaton by d d r T X T Y,, T T,,,1 Y X 0 k k k (14) X Y 1 where X, Y denotes the weght of drect trust value and ndrect trust value n the whole fuzzy local trust value, respectvely. Note that, 1 Y X 0 means that compared wth the ndrect recommendatons, our fuzzy local trust evaluaton s more focused on the drect observatons. Snce nodes n IoT/CPS may dynamcally on n the WSNs and qut the WSNs, t stands to reason that the long hstorcal recommendatons should have relatvely small weghts n the Equaton (14) Global Trust Evaluaton In fact, node SN may have not only the drect observaton on the node SN, but also ndrect experences by askng ts acquantances. Therefore, there are two fuzzy trust models between node SN and node SN, fuzzy drect trust model and fuzzy ndrect trust model. Obvously, f a node wants to obtan more accurate trust value wth another node, t must ntegrate more drect and ndrect experences. Note that, the drect trust may vary wth tme. In order to get the most accurate trust value, we must dscover the most wde ndrect trust set. In ths paper, the fuzzy global trust relaton s defned as a unon of fuzzy drect trust relaton, 1-level fuzzy ndrect trust relatonshp, 2-levels ndrect trust relatonshp, and n- levels fuzzy ndrect trust relaton ( n ). Let us consder an example of the fuzzy trust relatonshp evaluaton between node SN and node SN n a communty of (n+16) nodes, as shown n Fg.1. In the example the source node SN has fve routes to the destnaton node SN. If we want to obtan the most accurate trust evaluaton between them, all of the fve routes must be contaned and evaluated. Therefore, the fuzzy global trust relatonshp evaluaton can be calculated by 1218 ComSIS Vol. 8, No. 4, Specal Issue, October 2011

13 TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs 2 3 n T D R D R D R D R D, 2 3 n ( SN R R R R ) D. (15) D Source Node D R a D R b c Destnaton Node D R R 2 R 3 d e f R 2 D R g h n +1 Nodes Fg. 1. Illustraton of the fuzzy global trust relatonshp evaluaton between node SN and node SN Obvously, node SN can make the fuzzy global trust evaluaton to node SN whch s computed as, 2 n T lm ( SN R R R ) D., n (16) WSNs of IoT/CPS have dynamc topologes, bandwdth constrants, varable capacty lnks, energy constraned operaton, and lmted physcal securty. Dynamcs make t hard to evaluate behavors, because routes n ths knd of network change frequently. In ths case, fuzzy global trust evaluaton reflects the past nteractons of the communty wth the correspondng node beng evaluated. Ths evaluaton s globally avalable to all member nodes of the communty and updated each tme a member node ssues a new evaluaton of a sensor node. R n 4. Smulaton and Dscusson 4.1. NS-3 Setup In ths paper, we perform our smulaton on a NS-3 smulator [29]. Every plot s taken as an average of ten dfferent runs. And each run s executed wth source and destnaton pars selected randomly from the WSN. Snce we rely on TCP acknowledgments and retransmsson as ndcatons of successful and faled package delvery events, respectvely, we employ AODV protocol [30] as the communcaton protocol n our smulaton. The ComSIS Vol. 8, No. 4, Specal Issue, October

14 Dong Chen, Guran Chang, Dawe Sun, Jaa L, Je Ja, and Xngwe Wang NS-3 setup parameters and model confguraton parameters are lsted n Table 1 and Table 2. Table 1. NS-3 Setup Parameters. Parameter Value Smulator NS-3 MAC Layer IEEE Nodes Number 300 Node Placement Random, unform Package Sze 512 bytes Maxmum Connecton 30 Transmsson Range 250 Applcaton Traffc CBR Table 2. Model Confguraton Parameters. Parameter Value t 0.5 C threshold 12 CR threshold 12 Reply Delay 60ms Note that, snce the maxmum connecton number of a servce node s no more than 30, C threshold and CR threshold have to be ntalzed as a value whch s no more than 0.5 (0 MAX _ Connectons ) 15. Hgher value of the two parameters wll reduce the success rate of recommendatons from neghbor nodes. In ths smulaton experment, we dvde the sensor nodes nto two types, good nodes and malcous nodes. Moreover, accordng to the behavor n route dscovery, route mantenance and data forwardng, malcous nodes can be dvded nto two categores further. For the frst type (Type 1): the malcous nodes do not perform the package forwardng functon; for the second type (Type 2), the malcous nodes do not partcpate n the route dscovery phase. Those malcous nodes are selected randomly n each run accordng to the setup percentage, as shown n Fg.2. The trust and reputaton relatonshp s ntalzed randomly at the very begnnng of smulaton. Therefore, after several rounds, we establsh a smlar behavor and fuzzy theory-based trust and reputaton model for WSNs of IoT/CPS, where each node develops a drect reputaton for each other node by makng drect observatons and ndrect reputaton between 1220 ComSIS Vol. 8, No. 4, Specal Issue, October 2011

15 TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs ndvduals whch are set up on recommendatons of other ndvduals about these other nodes n the neghborhood. Fg. 2. The random dstrbuton of malcous and msbehavor nodes n the smulatons EPFR End-to-end packet forwardng rato (EPFR) s defned as the rato between the number of packets receved by the applcaton layer of destnaton nodes to the number of packets sent by the applcaton layer of the source node. As dscussed n [28], ths parameter sgnfcantly reflects the effect on the drop rato, the path nterrupton repar, sendng buffer overflow, nterface queue overflow, the conflct MAC packet and end-to-end packet n the process of data packet. The lost packets cover all packet losses due to drops, route falures, congeston and wreless channel losses. As shown n Fg. 1, some sensor nodes are set to be malcous nodes randomly. The percentage of malcous sensor nodes s ncreased and taken values from 10% to 60%, whle other nodes of the network behave benevolently. The results ndcate that some ndvdual selfsh nodes obvously result n the lnear regresson of EPFR. Therefore, the secure mechansms manly focus on Type 1 to correctly perform the packet forwardng functon. When 60% of the nodes follow Type 1 and Type 2, EPFR degrades by 53% and 82%, respectvely. However, when the number of normal nodes becomes so smaller to a certan degree, such as 50%, the correspondng EPFR wll decrease sgnfcantly. ComSIS Vol. 8, No. 4, Specal Issue, October

16 Dong Chen, Guran Chang, Dawe Sun, Jaa L, Je Ja, and Xngwe Wang Fg. 3. The relatonshp between EPFR and dfferent percentage of malcous nodes. As shown n Fg. 3, EPFR can be degraded by malcous nodes. Through employng the proposed behavor-based trust and reputaton model, the WSNs of IoT/CPS performance can be enhanced, snce t enables the best loyal route selecton process to avod askng the less trustworthy nodes to forward messages. By examnaton of EPFR, we can see mprovements by BRM-IoT under attacks of type 1 and 2, compared to the orgnal AODV protocol. Moreover, as the percentage of malcous nodes ncreases, Type 2 has a less obvous nfluence on EPFR than Type I AEC As shown n Fg. 4, we make malcous nodes whch change between 10% and 60% of the sensor nodes n the network, ncreasng 10% for each runnng of the experment, whle the other nodes of the network behave vrtuously. Snce any malcous node does not partcpate n the route dscovery phase of the AODV protocol or t not be honestly execute data packets forwardng, AEC of malcous nodes s less than that of other normal nodes. The expermental results show that even f ndvdual malcous nodes of type 1 serously affect the network performance, the trust and reputaton mechansm, whch prompts the tmes of nodes transmttng data packets, s the basc securty need for the non-malcous routng n WSNs. TRM-IoT model effectvely cubes the malcous nodes, and sgnfcantly reduces the energy consumpton of good sensor nodes ComSIS Vol. 8, No. 4, Specal Issue, October 2011

17 TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs Fg.4. The relatonshp between AEC and dfferent percentages of malcous nodes Package Delvery Rato Fg. 5 shows a comparson between the proposed trust and reputaton scheme for IoT/CPS, TRM-IoT, and two exstng trust models based on reputaton mechansms, namely DRBTS [10] and BRTM-WSN [11], n terms of PDR. In fact, package delvery rato (PDR) s affected by packet loss and packet retransmssons. Packet loss may occur for many reasons. In ths paper, we focus on the behavor that an ntermedate node ntentonally drops receved data packets nstead of forwardng them to the next hop node. From Fg. 5, we can see that the proposed trust and reputaton model outperforms the other two schemes especally at hgher loads on the network. Fg. 5. The relatonshp between load and package delvery rato. ComSIS Vol. 8, No. 4, Specal Issue, October

18 Dong Chen, Guran Chang, Dawe Sun, Jaa L, Je Ja, and Xngwe Wang 4.5. Convergence Speed Convergence speed (CS) s defned as the least number of cycles requred makng the number of the faled data forwardng transacton. That s, the greater of the CS, the more unfar represents that f a trust model works, the good nodes can be dfferentated from the msbehavor nodes by ther trust values after a few transacton cycles [31]. At the begnnng, all sensor nodes have the same ntal trust value, and the source sensor nodes randomly select a node for data packet forwardng. After a small numbers of transactons, the good nodes can get the hgher trust value than the other bad malcous nodes. Fg. 6. The relatonshp between cycles and convergence speed. The falure numbers of all data forwardng packets of the normal nodes reflect CS wth the change of the smulaton cycles. Snce nodes always select the nodes wth the hgher trust values, the fewer cycles the faster the convergence of the model. Fg. 6 descrbe TRM-IoT almost completely elmnates the falure of data packet forwardng after the frst eght cycles n WSNs. However, selfsh nodes of Type 1 ntentonally drop the receved packets nstead of forwardng them, and ncrease n the falure rato of the normal packet forwardng ncreasng. The system s not the very good convergence, and has slow convergence speed n comparson wth the selfsh nodes of Type Detecton Probablty Detecton Probablty (DP) ndcates that whether a trust and reputaton model can better handle ncorrect recommendatons from the thrd party. In Fg. 7, BRTM-WSN [11] model performs better than DRBTS [10] model. Ths s 1224 ComSIS Vol. 8, No. 4, Specal Issue, October 2011

19 TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs because BRTM-WSN model can better handle ncorrect recommendatons from the thrd party. Moreover, TRM-IoT model performs well than the other two exstng models. Ths s manly because TRM-IoT model consders the possble estmaton error when evaluatng the trust and reputaton values. Therefore, compared wth the two other exstng models, our model, TRM-IoT, has better performance. Fg. 7. The relatonshp between false probablty and detecton probablty. 5. Concluson and Future Works Snce WSNs are to be completely ntegrated nto Internet or Next Generaton Internet as a core part of IoT/CPS, t s necessary to consder varous securty challenges that come wth IoT/CPS, such as the detecton of malcous attacks. A trust and reputaton model s recognzed as an mportant approach to defend a large dstrbuted sensor networks n IoT/CPS aganst malcous node attacks, snce trust establshment mechansms can stmulate collaboraton among dstrbuted computng and communcaton enttes, facltate the detecton of untrustworthy enttes, and assst the decson-makng process of varous protocols. Based on n-depth understandng of trust establshment process and quanttatve comparson among trust establshment methods, ths paper present a trust and reputaton model TRM-IoT to enforce thngs cooperaton n a WSN of IoT/CPS based on ther behavors. The potental benefts of employng fuzzy sets to manage trust and reputaton relatonshps are analyzed accordng to the excellent NS-3 smulatons. Although the proposed model TRM-IoT has better performance compared wth two other exstng models, we have ncreasngly aware of the necessty ComSIS Vol. 8, No. 4, Specal Issue, October

20 Dong Chen, Guran Chang, Dawe Sun, Jaa L, Je Ja, and Xngwe Wang of elmnatng the nfluence upon the evaluaton results affected by malcous recommendaton and defamaton behavors of the thrd party. The mechansm by whch global trust s updated whle local trust changes can be mproved n order to be more effcent n future works. Acknowledgement. Ths work s supported by the Natonal Natural Scence Foundaton of Chna under Grant No and the Fundamental Research Funds for the Central Unverstes under Grant No. N References 1. Wolf, W.: Cyber-Physcal Systems. Computer, Vol. 42, No. 3, (2009) 2. Zhu, Q., Wang, R. C., Chen Q., Lu Y., Qn W. J.: IOT Gateway: Brdgng Wreless Sensor Networks nto Internet of Thngs. In Proc. of 2010 IEEE/IFIP Internatonal Conference on Embedded and Ubqutous Computng, USA, CA, Los Alamtos, (2010) 3. Khoo, B.: RFID- from Trackng to the Internet of Thngs: A Revew of Developments. In Proc. of 2010 IEEE/ACM Int'l Conference on Green Computng and Communcatons & Int'l Conference on Cyber, Physcal and Socal Computng, Hangzhou, (2010) 4. Joel, J. P. C. Rodrgues, Paulo, A. C. S. Neves.: A survey on IP-based wreless sensor network solutons. Internatonal Journal of Communcaton Systems, Vol. 23, Issue 8, (2010) 5. Sun, Y. L., Yang, Y.: Trust establshment n dstrbuted networks: Analyss and modelng. In Proc. of 2007 IEEE Internatonal Conference on Communcatons, ICC 07, Unted Kngdom, Glasgow, (2007) 6. Sun, Y., Yu, W., Han, Z., Lu, K.: Trust modelng and evaluaton n ad-hoc networks. In Proc. of Global Telecommuncatons Conference 2005 GLOBECOM 05, Vol. 3, (2005) 7. Buttyan, L., Hubaux, J. P.: Stmulatng cooperaton n self-organzng moble ad hoc networks. Moble Networks and Applcatons, Vol. 8, No. 5, (2003) 8. Boukercha, A., Xua, L., EL-Khatbb, K.: Trust-based securty for wreless ad hoc and sensor networks. Computer Communcatons Vol. 30, Issues 11-12, (2007) 9. Chen, H. G., Wu, H. F., Zhou, X. and Gao, C. S.: Agent-based Trust Model n Wreless Sensor Networks. In Proc. of the Eghth ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng and Parallel/Dstrbuted Computng, (2007) 10. Srnvasan, A., Tetelbaum, J. and Wu, J.: DRBTS: Dstrbuted Reputaton-based Beacon Trust System. In Proc. of 2nd IEEE Internatonal Symposum on Dependable, Autonomc and Secure Computng (DASC'06), (2006) 11. Marmol, G., Perez, M.: Provdng trust n wreless sensor networks usng a bonspred technque. Telecommuncaton Systems, Vol. 46, Number 2, pp (2010) 12. Buchegger, S., Boudec, J. Y. L.: Performance analyss of the confdant protocol. In Proc. of MobHoc 02: Proceedngs of the 3rd ACM nternatonal symposum on Moble Ad-hoc networkng & computng, ACM, New York, NY, USA, (2002) 1226 ComSIS Vol. 8, No. 4, Specal Issue, October 2011

21 TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs 13. He Q., Wu D., Khosla P.: Sor: A secure and obectve reputaton-based ncentve scheme for ad-hoc networks. In Proc. of 2004 Wreless Communcatons and Networkng Conference, Vol. 2, 21-25, (2004) 14. Zhong, S., Chen, J., Yang, Y.: Sprte: a smple, cheat-proof, credt-based system for moble ad-hoc networks. In Proc. of INFOCOM 2003, Twenty- Second Annual Jont Conference of the IEEE Computer and Communcatons Socetes, Vol. 3, (2003) 15. Hu, J. W., Culler, D. E.: Extendng IP to Low-Power Wreless Personal Area Networks. IEEE Internet Computng, Vol. 12, No. 4, (2008) 16. Lekenbrock, D.: The Internet of Thngs State-of-the-Art and Perspectves for Future Research. Communcatons n Computer and Informaton Scence, Vol. 32, No. 2, (2009) 17. Lug, A., Antono, I., Gacomo, M.: The Internet of Thngs: A survey. Computer Networks, Vol. 54, No. 15, (2010) 18. Eshenauer, L., Glgor, V. D.: A Key-Management Scheme for Dstrbuted Sensor Network. In Proc. of 9th ACM Conf. Computer and Comm. Securty (CCS 02), Unted states, Washngton, DC, (2002) 19. Lu, D., Nng, P., Rongfang, L. I.: Establshng Parwse Keys n Dstrbuted Sensor Networks. ACM Transactons on Informaton and System Securty, Vol. 8, No. 1, (2005) 20. Zhu, S., Sea S., Jaoda S.: LEAP+: Effcent Securty Machansms for Large- Scale Dstrbuted Sensor Networks. ACM Transactons on Sensor Networks, Vol. 2, (2006) 21. Lu, F., Cheng, X., Ma, L., Xng, K.: SBK: A Self-Confgurng Framework for Bootstrappng Keys n Sensor Network. IEEE Transactons on Moble Computng, Vol. 7, No. 7, (2008) 22. Loree, P., Nygard, K., Du, X. J.: An Effcent Post-Deployment Key Establshment Scheme for Heterogeneous Sensor Networks. In Proc of 2009 Global Telecommuncatons Conference, GLOBECOM 2009, Unted states, HI, Honolulu, 1-6. (2009) 23. Sun, Y., Trappe, W., Lu, K. J. R.: A scalable multcast key management scheme for heterogeneous wreless networks. IEEE/ACM Transactons on Networkng, Vol. 12, No. 4, (2004) 24. Gambetta, T.: Can we trust trust? In: D. Gambetta (Ed.), Trust: makng and Breakng Cooperatve Relatons, Basl Blackwell, Oxford, (1990) 25. Josang, A., Ismal, R., Boyd, C.: A survey of trust and reputaton systems for onlne servce provson. Decs. Support Syst, Vol. 43, No. 2, (2007) 26. Better Busnes Bureau. [Onlne]. Avalable: Azzedn, F., Rdha, A., Rzv, A.: Fuzzy trust for peer-to-peer based systems. In Proc. of World Academy of Scence, Engneerng and Technology, Vol. 21, (2007) 28. Luo, J. H., Lu, X., Fan, M. Y.: A trust model based on fuzzy recommendaton for moble ad-hoc networks. Computer Networks, Vol. 53, (2009) 29. NS-3. [Onlne]. Avalable: Perkns, C., Beldng-Royer, E., Das, S.: Ad hoc on-demand dstance vector (AODV) routng, IETF RFC 3561, July Grffths, N., Chao, K. M., Younas, M.: Fuzzy trust for peer-to-peer systems. In Proc. of 26th IEEE Internatonal Conference on Dstrbuted Computng Systems Workshop, Portugal, Lsboa, (2006) ComSIS Vol. 8, No. 4, Specal Issue, October

22 Dong Chen, Guran Chang, Dawe Sun, Jaa L, Je Ja, and Xngwe Wang Dong Chen s a PhD canddate at the school of Informaton Scence and Engneerng, Northeastern Unversty, Shenyang, Chna. He receved hs MSc n Computer Scence from Northeastern Unversty n Hs current researches nterests nclude Internet of Thngs, Cyber Physcal System. Guran Chang receved hs Ph.D. degree n electrcal engneerng from the Unversty of Ten-nessee, Knoxvlle, Tennessee n He s currently a Professor at the computng center of Northeastern Unversty, Chna. Hs current research nterests nclude computer networks, Internet of Thngs and nformaton securty. Dawe Sun s a PhD canddate at the school of Informaton Scence and Engneerng, North-eastern Unversty, Chna. He receved hs MSc n Computer Scence from Northeastern Unversty n Hs current researches nterests nclude cloud computng and vrtualzaton technology. Jaa L s a PhD canddate at the school of Informaton Scence and Engneerng, Northeastern Unversty, Chna. He receved hs MSc n Computer Scence from Northeastern Unversty n Hs current researches nterests nclude Spatal-Temporal Database and XML Database. Je Ja receved her Ph.D degree n computer scence from Northeastern Unversty, Chna. She s currently an Assocate Professor at the School of Informaton Scence and Engneerng, Northeastern Unversty, Chna. Her research nterests are manly on RFID systems and Wreless Sensor Network. Xngwe Wang receved hs Ph.D degree n computer scence from Northeastern Unversty, Chna n He s currently a Professor at the School of Informaton Scence and Engneerng, Northeastern Unversty. Hs research nterests are manly on routng algorthms and protocols, moblty management n NGI. Receved: March 3, 2011; Accepted: Aprl 22, ComSIS Vol. 8, No. 4, Specal Issue, October 2011

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu

More information

Trust Formation in a C2C Market: Effect of Reputation Management System

Trust Formation in a C2C Market: Effect of Reputation Management System Trust Formaton n a C2C Market: Effect of Reputaton Management System Htosh Yamamoto Unversty of Electro-Communcatons htosh@s.uec.ac.jp Kazunar Ishda Tokyo Unversty of Agrculture k-shda@noda.ac.jp Toshzum

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Overview of monitoring and evaluation

Overview of monitoring and evaluation 540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng

More information

HP Mission-Critical Services

HP Mission-Critical Services HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol 246 JOURNA OF SOFTWAR, VO. 9, NO. 1, JANUARY 2014 An Ad Hoc Network oad alancng nergy- ffcent Multpath Routng Protocol De-jn Kong Shanx Fnance and Taxaton College, Tayuan, Chna mal: dejnkong@163.com Xao-lng

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Managing Resource and Servent Reputation in P2P Networks

Managing Resource and Servent Reputation in P2P Networks Managng Resource and Servent Reputaton n P2P Networks Makoto Iguch NTT Informaton Sharng Platform Laboratores guch@sl.ntt.co.jp Masayuk Terada NTT DoCoMo Multmeda Laboratores te@mml.yrp.nttdocomo.co.jp

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks : A Stateless Protocol for Real-Tme Communcaton n Sensor Networks Tan He a John A Stankovc a Chenyang Lu b Tarek Abdelzaher a a Department of Computer Scence b Department of Computer Scence & Engneerng

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Research on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises

Research on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises 3rd Internatonal Conference on Educaton, Management, Arts, Economcs and Socal Scence (ICEMAESS 2015) Research on Evaluaton of Customer Experence of B2C Ecommerce Logstcs Enterprses Yle Pe1, a, Wanxn Xue1,

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Self-Motivated Relay Selection for a Generalized Power Line Monitoring Network

Self-Motivated Relay Selection for a Generalized Power Line Monitoring Network Self-Motvated Relay Selecton for a Generalzed Power Lne Montorng Network Jose Cordova and Xn Wang 1, Dong-Lang Xe 2, Le Zuo 3 1 Department of Electrcal and Computer Engneerng, State Unversty of New York

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

A New Quality of Service Metric for Hard/Soft Real-Time Applications

A New Quality of Service Metric for Hard/Soft Real-Time Applications A New Qualty of Servce Metrc for Hard/Soft Real-Tme Applcatons Shaoxong Hua and Gang Qu Electrcal and Computer Engneerng Department and Insttute of Advanced Computer Study Unversty of Maryland, College

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Abteilung für Stadt- und Regionalentwicklung Department of Urban and Regional Development

Abteilung für Stadt- und Regionalentwicklung Department of Urban and Regional Development Abtelung für Stadt- und Regonalentwcklung Department of Urban and Regonal Development Gunther Maer, Alexander Kaufmann The Development of Computer Networks Frst Results from a Mcroeconomc Model SRE-Dscusson

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

Semantic Link Analysis for Finding Answer Experts *

Semantic Link Analysis for Finding Answer Experts * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 51-65 (2012) Semantc Lnk Analyss for Fndng Answer Experts * YAO LU 1,2,3, XIAOJUN QUAN 2, JINGSHENG LEI 4, XINGLIANG NI 1,2,3, WENYIN LIU 2,3 AND YINLONG

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Selecting Best Employee of the Year Using Analytical Hierarchy Process

Selecting Best Employee of the Year Using Analytical Hierarchy Process J. Basc. Appl. Sc. Res., 5(11)72-76, 2015 2015, TextRoad Publcaton ISSN 2090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com Selectng Best Employee of the Year Usng Analytcal Herarchy

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

Dsaster Management and Network Analysis

Dsaster Management and Network Analysis A Smulaton Study for Emergency/Dsaster Management by Applyng Complex Networks Theory L Jn 1, Wang Jong 2 *, Da Yang 3, Wu Huapng 4 and Dong We 5 1,4 Earthquake Admnstraton of Guangdong Provnce Key Laboratory

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

ERP Software Selection Using The Rough Set And TPOSIS Methods

ERP Software Selection Using The Rough Set And TPOSIS Methods ERP Software Selecton Usng The Rough Set And TPOSIS Methods Under Fuzzy Envronment Informaton Management Department, Hunan Unversty of Fnance and Economcs, No. 139, Fengln 2nd Road, Changsha, 410205, Chna

More information

M-applications Development using High Performance Project Management Techniques

M-applications Development using High Performance Project Management Techniques M-applcatons Development usng Hgh Performance Project Management Technques PAUL POCATILU, MARIUS VETRICI Economc Informatcs Department Academy of Economc Studes 6 Pata Romana, Sector, Bucharest ROMANIA

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks : An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support

More information

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks A Resource-tradng Mechansm for Effcent Dstrbuton of Large-volume Contents on Peer-to-Peer Networks SmonG.M.Koo,C.S.GeorgeLee, Karthk Kannan School of Electrcal and Computer Engneerng Krannet School of

More information

Evaluation of Coordination Strategies for Heterogeneous Sensor Networks Aiming at Surveillance Applications

Evaluation of Coordination Strategies for Heterogeneous Sensor Networks Aiming at Surveillance Applications Evaluaton of Coordnaton Strateges for Heterogeneous Sensor Networs Amng at Survellance Applcatons Edson Pgnaton de Fretas, *, Tales Hemfarth*, Carlos Eduardo Perera*, Armando Morado Ferrera, Flávo Rech

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information