亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks

        2019-06-12 01:23:12AlanoudAlhussainHebaKurdiandLinaAltoaimy
        Computers Materials&Continua 2019年6期

        Alanoud Alhussain,Heba Kurdi, and Lina Altoaimy

        Abstract:Edge devices in Internet of Things (IoT)applications can form peers to communicate in peer-to-peer (P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.However,due to the open nature of P2P networks,they often suffer from the existence of malicious peers,especially malicious peers that unite in groups to raise each other's ratings.This compromises users' safety and makes them lose their confidence about the files or services they are receiving.To address these challenges,we propose a neural networkbased algorithm,which uses the advantages of a machine learning algorithm to identify whether or not a peer is malicious.In this paper,a neural network (NN)was chosen as the machine learning algorithm due to its efficiency in classification.The experiments showed that the NNTrust algorithm is more effective and has a higher potential of reducing the number of invalid files and increasing success rates than other well-known trust management systems.

        Keywords:Trust management,neural networks,peer to peer,machine learning,edge devices.

        1 Introduction

        Internet of things (IoT)is a newly emerging technology that connects enormous numbers of different devices (edge devices)and allows them to exchange and share data as well as other resources.As the number of connected devices is growing exponentially,there has become a need to have a more reliable and scalable distributed system with open architectures to efficiently handle the growing demand placed on IoT applications [Steffenel,Pinheiro,Peres et al.(2018)].

        A peer-to-peer (P2P)network,which is one of the most widely used networks for sharing files [Bradai,Abbasi,Landa et al.(2014)],has the opportunity to improve the direction of IoT and enhance its applications.

        P2P consists of a collection of peers without a centralized control,which makes it more flexible and encourages dynamic and rich communications [Bashmal,Almulifi and Kurdi (2017)].Thus,it allows connected devices to form peers and facilitates the communication among them [Xie,Yuan,Zhou et al.(2018)].However,the open nature of a P2P network means that it also has multiple security threats,which make it highly vulnerable to attacks from different types of peers [Xie,Yuan,Zhou et al.(2018)] such as malicious peers and free-riders.For instance,malicious peers are able to upload inauthentic files to compromise the network [Chuang (2017)].They may also collaborate with other malicious peers to improve their reputations and interpolate good peers [Fan,Liu,Li et al.(2017)].Therefore,it is crucial to identify malicious peers and isolate them from networks,thus allowing good peers to share resources without the fear of such malicious behaviors [Kurdi (2015)].Many mechanisms have been introduced to solve the problems caused by malicious peers [Hawa,Al-Zubi,Darabkh et al.(2017)].Reputation and trust management are examples of well-known and powerful mechanisms that reduce the effect of malicious behaviors in P2P networks.Despite their efficiency,existing reputation management algorithms face difficulties in identifying malicious groups [Alkharji,Kurdi,Altamimi et al.(2017)].Malicious groups are intelligent models of malicious peers that form groups and mislead good peers [Alhussain and Kurdi (2018)].They do this by giving malicious peers high reputation values or by being inconsistent about the authenticity of the files they provide [Kurdi,Alfaries,Al-Anazi et al.(2018)].

        Trust management systems are crucial in all environments that involve exchanging and sharing data or services between different entities,including edge computing,cloud computing,and P2P network environments.Number of reputation systems have been introduced in the P2P network,which is considered a main precursor for edge computing [Lopez,Montresor,Epema et al.(2015)]

        The EigenTrust algorithm [Kamvar,Schlosser and Garcia-Molina (2003)] is a wellestablished reputation algorithm;it has many reputation systems that appear to enhance it in order to eliminate the need for pre-trusted peers,as seen in Kurdi [Kurdi (2015)].This study hypothesizes that the honest peer is the one with the maximum reputation value.A similar goal was discussed in the trust mirroring that was used in Shirgahi et al.[Shirgahi,Mohsenzadeh and Javadi (2017)] to predict trust in social networks without the need for global trust information.However,a limitation existed in that study:the trust value could not be calculated unless direct trust existed between the two nodes.

        The inverse of the PageRank (PR)algorithm used in Lee [Lee (2016)] is the idea that if one can recognize peers as dishonest,he can reasonably filter out their dishonest friend peers from the environment,which is the opposite of the approach taken with most reputation systems,such as subjective logic [Jsang,Hayward and Pope (2006)] and its variants [Kurdi,Alfaries,Al-Anazi et al.(2018);Kurdi,Alshayban,Altoaimy et al.2018)].

        Despite that the previous mentioned schemes have improved its efficiency,there is still a need to identify more complicated types of malicious peers,such as collective malicious peers.

        To the best of our knowledge,no studies have combined the advantages of traditional trust algorithms and machine learning.Therefore,this paper introduces the NNTrust algorithm for the purpose of reputation management in P2P networks.It focuses on recognizing malicious peers using a neural network algorithm that analyzes peers' transaction histories.In addition,we use a well-controlled experimental framework to evaluate NNTrust against other benchmark algorithms.

        The remainder of this paper is organized as follows.Section 2 introduces the proposed NNTrust algorithm.Sections 3 and 4 discuss the evaluation plan and the experimental results.Finally,Section 5 summarizes and concludes the paper.

        2 System design

        This section describes the design and architecture of the proposed NNTrust system,which determines trustworthiness among interacting edge devices (peers)to enhance the robustness of the file-sharing network in a P2P environment.The NNTrust system uses EigenTrust to compute local and global trust values among peers and an NN to predict malicious behaviors.The architecture of the NNTrust system,shown in Fig.1,consists of the following components:

        Figure 1:System architecture

        1.System registry:

        This database contains a list of the files and their owners.It arranges the file requests as a queue of transaction requests,and it links each receiver to the sender in a relationship.It also maintains all files and dynamically updates their statuses.

        2.Reputation database management system:

        This database stores and updates the reputation matrix calculated using EigenTrust.

        3.Peers:

        Each peer has the following three components:

        3.1.Trust calculator:It receives the sender and its score from the transaction manager to compute the trust matrix,and it sends the updates to the local trust database.

        3.2.Trust database:It contains the matrices of trust for all peers in the system and the history of the peer's transactions itself.It also receives requests from the trust calculator to store or update the matrix and the to-whom list after each transaction.

        3.3.Transaction manager:It contains the list of files and accepts the requests for the files.It finds the best senders and sends their information to the NN to predict whether the senders are malicious.In addition,it rates and normalizes the received files.It also sends the scores of rated senders and their files to the trust calculator.

        4.Neural network (NN):

        The NN contains the following:

        4.1.The trainer:It takes the offline dataset and constructs the layers of the NN to teach the network how to classify each peer.The trained network is used later by the predictor to predict the type of sender.

        4.2.The predictor:It receives the peer’s information,analyzes it to extract the peer’s features,and enters it into the NN to predict the type of provider.The transaction manager,based on the type of provider,will decide to either accept or reject its offer.

        3 Evaluation methodology

        This paper introduces a very well-controlled evaluation framework in a P2P network model.All the control variables and performance measures were obtained from the application field,which is file sharing to increase the level of assurance that no specific strategy in the selection is favored over any other strategies.Two performance measures were considered:

        1.The percentage of invalid files exchanged by good peers,which needs to be minimized.

        2.The success rate,which represents the number of valid files received by good peers over the number of transactions attempted by good peers as:

        3.1 Dataset

        The dataset was constructed by simulating a P2P network using TM-SIM [West,Kannan,Lee et al.(2010)].The network contains 5,000 users,and 100,000 files,and 100,000 transactions.Regarding users,there are 2,500 well-behaved users,including 500 pretrusted ones.The network also contains five different types of malicious peers,which are purely malicious users,feedback-skewing users,malignancy-providing users,disguised malicious users,and sybil attack users,in order to teach the machine all possible scenarios of malicious behavior.Each type of malicious peer has 500 peers that represent its behavior.Tab.1 summarizes the dataset characteristics.

        The dataset contains 5,000 instances and nine numeric attributes:1)positive ratings from a good peer,2)negative ratings from a good peer,3)positive ratings from a malicious peer,4)negative ratings from a malicious peer,5)positive ratings for a good peer,6)negative ratings for a good peer,7)positive ratings for a malicious peer,8)negative ratings for a malicious peer,and 9)transactions.Peers are classified using the class attribute,which is either 0 or 1,where 0 represents a good user and 1 represents a malicious user.

        Table 1:Dataset characteristics

        4 Experimental setup

        In an approach similar to that used in Kurdi et al.[Kurdi (2015);Lu,Wang,Xie et al.2016)],the number of peers and files were varied to represent a meaningful sample of P2P environments.There were two sets of experiments,as summarized in Tab.2.

        Table 2:Experimental settings

        As in Kurdi et al.[Kurdi,Alshayban,Altoaimy et al.(2018)],the peer models included pre-trusted,good,and malicious peers.The pre-trusted peers had high trust values.In this paper,we considered two types of malicious peers:purely single malicious peers and purely collective malicious peers.We also selected three benchmark trust systems to compare and evaluate the performance of the proposed NNTrust system.These were:1)EigenTrust [Kamvar,Schlosser and Gareia-Molina (2003)].2)Incremental EigenTrust [West,Kannan and Lee (2010)] and 3)the base case,None,in which there was no reputation management system and each peer randomly chose its file provider.

        5 Results and discussion

        A summary of the results of running 100,000 transactions for the two sets of experiments is shown in Figs.2-9.As discussed previously,we used the percentage of invalid files and the success rates to evaluate the efficiency of NNTrust.

        Figs.2 and 3 illustrate the relationship between the percentage of invalid files exchanged by good peers and the number of files in the system.On the other hand,Figs.4 and 5 show the relationship between the percentage of invalid services exchanged by good peers and the number of peers in the network.From the figures,we can see that for both malicious types,NNTrust had more success decreasing the percentage of invalid files than other benchmark systems.

        Figure 2:Percentage of invalid files when different numbers of files are considered (purely single malicious peers)

        Figure 3:Percentage of invalid files when different numbers of files are considered (purely collective malicious)

        Figure 4:Percentage of invalid files when different numbers of peers are considered (purely single malicious)

        Figure 5:Percentage of invalid files when different numbers of peers are considered (purely collective malicious)

        Figure 6:Success rate when different numbers of files are considered (purely single malicious)

        Figure 7:Success rate when different numbers of files are considered (purely collective malicious)

        In Figs.6 and 7,the success rate is plotted against the number of files in the system.Although the success rate of NNTrust dropped slightly in the case of 500 files and purely single malicious peers,its performance increased with increased number of files in the system.The reason behind this is that NNTrust analyzed larger log histories that increased as the number of transactions increased,and thus,improved its performance.In Figs.8 and 9 the success rate is plotted against the number of peers in the network.We can see that for all scenarios,NNTrust had a higher success rate than other benchmark systems.

        Figure 8:Success rate when different numbers of peers are considered (purely single malicious)

        Figure 9:Success rate when different numbers of peers are considered (purely collective malicious)

        6 Conclusion

        In this paper,we proposed the use of historical data to keep track of all transactions that had been processed by edge devices in P2P networks.In the simulation setup,we compared the proposed NNTrust system with EigenTrust,Incremental EigenTrust,and the base case,None.We also evaluated the performance in terms of the percentage of invalid files and success rates of good peers.The results showed that NNTrust outperformed the other systems,minimizing the percentage of invalid files and maximizing the success rate of good peers.In our future work,we plan to produce a new dataset according to different patterns of malicious behaviors.

        Acknowledgement:This research was supported by a grant from the Research Center of the Center for Female Scientific and Medical Colleges Deanship of Scientific Research,King Saud University.

        4444亚洲人成无码网在线观看 | 色婷婷亚洲精品综合影院| 五月开心婷婷六月综合| 内射少妇36p亚洲区| 亚洲AV无码专区一级婬片毛片| 最大色网男人的av天堂| 国产精品熟女一区二区三区| 亚洲精品成人av在线| 无码人妻丰满熟妇精品区| 亚洲人成网站在线播放小说| 亚洲国产精品悠悠久久琪琪| 人妻精品久久无码区| 亚洲人成网站在线观看播放| 特级毛片a级毛片在线播放www| 亚洲一区二区三区日韩在线观看| 日本丰满熟妇videossex一| 国产成人精品三级麻豆| 日本一区二区三本视频在线观看| 人妻少妇精品视频一区二区三 | 亚洲Av无码专区尤物| 国产91精品一区二区麻豆亚洲 | 久久亚洲av成人无码电影a片| 蜜臀av一区二区| 久久精品国产亚洲av麻豆四虎| 国产一区二区黄色网页 | 精品亚洲一区二区99| 一区二区视频在线国产| 亚洲欧美日韩成人高清在线一区| 日韩久久一级毛片| 毛片色片av色在线观看| 美女视频黄是免费| 吃奶摸下的激烈视频| 级毛片无码av| 91偷拍与自偷拍亚洲精品86 | 国产免费午夜福利蜜芽无码| 亚洲第一幕一区二区三区在线观看 | 亚洲电影一区二区三区| 日韩亚洲一区二区三区在线| 国产美女精品视频线免费播放软件| 精品性影院一区二区三区内射| 久久亚洲精品国产精品婷婷|