999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks

2019-06-12 01:23:12AlanoudAlhussainHebaKurdiandLinaAltoaimy
Computers Materials&Continua 2019年6期

Alanoud Alhussain,Heba Kurdi, and Lina Altoaimy

Abstract:Edge devices in Internet of Things (IoT)applications can form peers to communicate in peer-to-peer (P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.However,due to the open nature of P2P networks,they often suffer from the existence of malicious peers,especially malicious peers that unite in groups to raise each other's ratings.This compromises users' safety and makes them lose their confidence about the files or services they are receiving.To address these challenges,we propose a neural networkbased algorithm,which uses the advantages of a machine learning algorithm to identify whether or not a peer is malicious.In this paper,a neural network (NN)was chosen as the machine learning algorithm due to its efficiency in classification.The experiments showed that the NNTrust algorithm is more effective and has a higher potential of reducing the number of invalid files and increasing success rates than other well-known trust management systems.

Keywords:Trust management,neural networks,peer to peer,machine learning,edge devices.

1 Introduction

Internet of things (IoT)is a newly emerging technology that connects enormous numbers of different devices (edge devices)and allows them to exchange and share data as well as other resources.As the number of connected devices is growing exponentially,there has become a need to have a more reliable and scalable distributed system with open architectures to efficiently handle the growing demand placed on IoT applications [Steffenel,Pinheiro,Peres et al.(2018)].

A peer-to-peer (P2P)network,which is one of the most widely used networks for sharing files [Bradai,Abbasi,Landa et al.(2014)],has the opportunity to improve the direction of IoT and enhance its applications.

P2P consists of a collection of peers without a centralized control,which makes it more flexible and encourages dynamic and rich communications [Bashmal,Almulifi and Kurdi (2017)].Thus,it allows connected devices to form peers and facilitates the communication among them [Xie,Yuan,Zhou et al.(2018)].However,the open nature of a P2P network means that it also has multiple security threats,which make it highly vulnerable to attacks from different types of peers [Xie,Yuan,Zhou et al.(2018)] such as malicious peers and free-riders.For instance,malicious peers are able to upload inauthentic files to compromise the network [Chuang (2017)].They may also collaborate with other malicious peers to improve their reputations and interpolate good peers [Fan,Liu,Li et al.(2017)].Therefore,it is crucial to identify malicious peers and isolate them from networks,thus allowing good peers to share resources without the fear of such malicious behaviors [Kurdi (2015)].Many mechanisms have been introduced to solve the problems caused by malicious peers [Hawa,Al-Zubi,Darabkh et al.(2017)].Reputation and trust management are examples of well-known and powerful mechanisms that reduce the effect of malicious behaviors in P2P networks.Despite their efficiency,existing reputation management algorithms face difficulties in identifying malicious groups [Alkharji,Kurdi,Altamimi et al.(2017)].Malicious groups are intelligent models of malicious peers that form groups and mislead good peers [Alhussain and Kurdi (2018)].They do this by giving malicious peers high reputation values or by being inconsistent about the authenticity of the files they provide [Kurdi,Alfaries,Al-Anazi et al.(2018)].

Trust management systems are crucial in all environments that involve exchanging and sharing data or services between different entities,including edge computing,cloud computing,and P2P network environments.Number of reputation systems have been introduced in the P2P network,which is considered a main precursor for edge computing [Lopez,Montresor,Epema et al.(2015)]

The EigenTrust algorithm [Kamvar,Schlosser and Garcia-Molina (2003)] is a wellestablished reputation algorithm;it has many reputation systems that appear to enhance it in order to eliminate the need for pre-trusted peers,as seen in Kurdi [Kurdi (2015)].This study hypothesizes that the honest peer is the one with the maximum reputation value.A similar goal was discussed in the trust mirroring that was used in Shirgahi et al.[Shirgahi,Mohsenzadeh and Javadi (2017)] to predict trust in social networks without the need for global trust information.However,a limitation existed in that study:the trust value could not be calculated unless direct trust existed between the two nodes.

The inverse of the PageRank (PR)algorithm used in Lee [Lee (2016)] is the idea that if one can recognize peers as dishonest,he can reasonably filter out their dishonest friend peers from the environment,which is the opposite of the approach taken with most reputation systems,such as subjective logic [Jsang,Hayward and Pope (2006)] and its variants [Kurdi,Alfaries,Al-Anazi et al.(2018);Kurdi,Alshayban,Altoaimy et al.2018)].

Despite that the previous mentioned schemes have improved its efficiency,there is still a need to identify more complicated types of malicious peers,such as collective malicious peers.

To the best of our knowledge,no studies have combined the advantages of traditional trust algorithms and machine learning.Therefore,this paper introduces the NNTrust algorithm for the purpose of reputation management in P2P networks.It focuses on recognizing malicious peers using a neural network algorithm that analyzes peers' transaction histories.In addition,we use a well-controlled experimental framework to evaluate NNTrust against other benchmark algorithms.

The remainder of this paper is organized as follows.Section 2 introduces the proposed NNTrust algorithm.Sections 3 and 4 discuss the evaluation plan and the experimental results.Finally,Section 5 summarizes and concludes the paper.

2 System design

This section describes the design and architecture of the proposed NNTrust system,which determines trustworthiness among interacting edge devices (peers)to enhance the robustness of the file-sharing network in a P2P environment.The NNTrust system uses EigenTrust to compute local and global trust values among peers and an NN to predict malicious behaviors.The architecture of the NNTrust system,shown in Fig.1,consists of the following components:

Figure 1:System architecture

1.System registry:

This database contains a list of the files and their owners.It arranges the file requests as a queue of transaction requests,and it links each receiver to the sender in a relationship.It also maintains all files and dynamically updates their statuses.

2.Reputation database management system:

This database stores and updates the reputation matrix calculated using EigenTrust.

3.Peers:

Each peer has the following three components:

3.1.Trust calculator:It receives the sender and its score from the transaction manager to compute the trust matrix,and it sends the updates to the local trust database.

3.2.Trust database:It contains the matrices of trust for all peers in the system and the history of the peer's transactions itself.It also receives requests from the trust calculator to store or update the matrix and the to-whom list after each transaction.

3.3.Transaction manager:It contains the list of files and accepts the requests for the files.It finds the best senders and sends their information to the NN to predict whether the senders are malicious.In addition,it rates and normalizes the received files.It also sends the scores of rated senders and their files to the trust calculator.

4.Neural network (NN):

The NN contains the following:

4.1.The trainer:It takes the offline dataset and constructs the layers of the NN to teach the network how to classify each peer.The trained network is used later by the predictor to predict the type of sender.

4.2.The predictor:It receives the peer’s information,analyzes it to extract the peer’s features,and enters it into the NN to predict the type of provider.The transaction manager,based on the type of provider,will decide to either accept or reject its offer.

3 Evaluation methodology

This paper introduces a very well-controlled evaluation framework in a P2P network model.All the control variables and performance measures were obtained from the application field,which is file sharing to increase the level of assurance that no specific strategy in the selection is favored over any other strategies.Two performance measures were considered:

1.The percentage of invalid files exchanged by good peers,which needs to be minimized.

2.The success rate,which represents the number of valid files received by good peers over the number of transactions attempted by good peers as:

3.1 Dataset

The dataset was constructed by simulating a P2P network using TM-SIM [West,Kannan,Lee et al.(2010)].The network contains 5,000 users,and 100,000 files,and 100,000 transactions.Regarding users,there are 2,500 well-behaved users,including 500 pretrusted ones.The network also contains five different types of malicious peers,which are purely malicious users,feedback-skewing users,malignancy-providing users,disguised malicious users,and sybil attack users,in order to teach the machine all possible scenarios of malicious behavior.Each type of malicious peer has 500 peers that represent its behavior.Tab.1 summarizes the dataset characteristics.

The dataset contains 5,000 instances and nine numeric attributes:1)positive ratings from a good peer,2)negative ratings from a good peer,3)positive ratings from a malicious peer,4)negative ratings from a malicious peer,5)positive ratings for a good peer,6)negative ratings for a good peer,7)positive ratings for a malicious peer,8)negative ratings for a malicious peer,and 9)transactions.Peers are classified using the class attribute,which is either 0 or 1,where 0 represents a good user and 1 represents a malicious user.

Table 1:Dataset characteristics

4 Experimental setup

In an approach similar to that used in Kurdi et al.[Kurdi (2015);Lu,Wang,Xie et al.2016)],the number of peers and files were varied to represent a meaningful sample of P2P environments.There were two sets of experiments,as summarized in Tab.2.

Table 2:Experimental settings

As in Kurdi et al.[Kurdi,Alshayban,Altoaimy et al.(2018)],the peer models included pre-trusted,good,and malicious peers.The pre-trusted peers had high trust values.In this paper,we considered two types of malicious peers:purely single malicious peers and purely collective malicious peers.We also selected three benchmark trust systems to compare and evaluate the performance of the proposed NNTrust system.These were:1)EigenTrust [Kamvar,Schlosser and Gareia-Molina (2003)].2)Incremental EigenTrust [West,Kannan and Lee (2010)] and 3)the base case,None,in which there was no reputation management system and each peer randomly chose its file provider.

5 Results and discussion

A summary of the results of running 100,000 transactions for the two sets of experiments is shown in Figs.2-9.As discussed previously,we used the percentage of invalid files and the success rates to evaluate the efficiency of NNTrust.

Figs.2 and 3 illustrate the relationship between the percentage of invalid files exchanged by good peers and the number of files in the system.On the other hand,Figs.4 and 5 show the relationship between the percentage of invalid services exchanged by good peers and the number of peers in the network.From the figures,we can see that for both malicious types,NNTrust had more success decreasing the percentage of invalid files than other benchmark systems.

Figure 2:Percentage of invalid files when different numbers of files are considered (purely single malicious peers)

Figure 3:Percentage of invalid files when different numbers of files are considered (purely collective malicious)

Figure 4:Percentage of invalid files when different numbers of peers are considered (purely single malicious)

Figure 5:Percentage of invalid files when different numbers of peers are considered (purely collective malicious)

Figure 6:Success rate when different numbers of files are considered (purely single malicious)

Figure 7:Success rate when different numbers of files are considered (purely collective malicious)

In Figs.6 and 7,the success rate is plotted against the number of files in the system.Although the success rate of NNTrust dropped slightly in the case of 500 files and purely single malicious peers,its performance increased with increased number of files in the system.The reason behind this is that NNTrust analyzed larger log histories that increased as the number of transactions increased,and thus,improved its performance.In Figs.8 and 9 the success rate is plotted against the number of peers in the network.We can see that for all scenarios,NNTrust had a higher success rate than other benchmark systems.

Figure 8:Success rate when different numbers of peers are considered (purely single malicious)

Figure 9:Success rate when different numbers of peers are considered (purely collective malicious)

6 Conclusion

In this paper,we proposed the use of historical data to keep track of all transactions that had been processed by edge devices in P2P networks.In the simulation setup,we compared the proposed NNTrust system with EigenTrust,Incremental EigenTrust,and the base case,None.We also evaluated the performance in terms of the percentage of invalid files and success rates of good peers.The results showed that NNTrust outperformed the other systems,minimizing the percentage of invalid files and maximizing the success rate of good peers.In our future work,we plan to produce a new dataset according to different patterns of malicious behaviors.

Acknowledgement:This research was supported by a grant from the Research Center of the Center for Female Scientific and Medical Colleges Deanship of Scientific Research,King Saud University.

主站蜘蛛池模板: 国产精选自拍| 97久久人人超碰国产精品| 毛片免费在线| 无码免费的亚洲视频| 亚洲天堂日韩在线| 国内精品自在欧美一区| 永久成人无码激情视频免费| 中文字幕 欧美日韩| A级全黄试看30分钟小视频| 成人午夜免费视频| 自偷自拍三级全三级视频| 免费毛片网站在线观看| 中文字幕中文字字幕码一二区| 91欧美亚洲国产五月天| 激情无码字幕综合| 欧美自慰一级看片免费| 大陆精大陆国产国语精品1024| 国产综合亚洲欧洲区精品无码| 白浆视频在线观看| 国产欧美视频一区二区三区| 中文字幕亚洲乱码熟女1区2区| 亚洲最大福利视频网| 国产男女免费视频| 亚洲欧美国产高清va在线播放| 国产女人在线视频| 一级成人a毛片免费播放| 国产成人91精品| 亚洲二区视频| 日本欧美视频在线观看| 国产高清在线观看91精品| 亚洲免费三区| 久久国产香蕉| 午夜国产大片免费观看| 麻豆国产在线观看一区二区| 成人久久18免费网站| 国产精品免费露脸视频| 91久久偷偷做嫩草影院电| 午夜在线不卡| 亚洲第一成人在线| 波多野结衣中文字幕一区二区 | 国产区精品高清在线观看| 一本久道热中字伊人| 国产成人精品高清在线| 欧美精品v欧洲精品| 亚洲开心婷婷中文字幕| 国产视频a| 99热这里只有精品在线观看| 日韩高清在线观看不卡一区二区| 日本欧美精品| 伊人中文网| 久久久精品国产SM调教网站| 亚洲无码高清免费视频亚洲| 久久这里只有精品66| 亚洲美女视频一区| 日韩av在线直播| 国产91高跟丝袜| 国产精品蜜臀| 国产成人精品视频一区视频二区| 国产成熟女人性满足视频| 日本精品视频| 日本欧美中文字幕精品亚洲| 91久久性奴调教国产免费| 日本在线免费网站| 华人在线亚洲欧美精品| 无码在线激情片| 伊人色综合久久天天| 午夜爽爽视频| 久久夜色精品国产嚕嚕亚洲av| 欧美福利在线播放| 亚洲欧洲日产国产无码AV| 久久特级毛片| 国产在线视频自拍| 人妻一本久道久久综合久久鬼色| 9cao视频精品| 国产欧美视频综合二区 | 色婷婷狠狠干| aaa国产一级毛片| 国产va在线观看免费| 国产精品一老牛影视频| 女人18一级毛片免费观看| 制服丝袜无码每日更新| 黄色网在线|