Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/598563
Title: | A Synergic Model For Trust Management System For Fog Computing |
Researcher: | Choudhary, Ashutosh Kumar |
Guide(s): | Soni, Goldi and Rahamatkar, Surendra |
Keywords: | Computer Science Computer Science Artificial Intelligence Engineering and Technology |
University: | Amity University Chhattisgarh |
Completed Date: | 2024 |
Abstract: | In order to successfully implement trust levels in fog networks an efficient routing protocol design is required. The routing protocol chooses nodes based on their high trust values. As a result data that is sent through these nodes is transmitted with great energy efficiency low latency high throughput and little packet loss. In order to develop such a protocol several network properties need to be analyzed and nodes need to be grouped according to the results of these analyses. In addition to this the categorization has to be complemented by dynamic routing based behaviour which enables routers to adjust the category of nodes in order to improve routing efficiency. A machine learning model for Quality of Service QoS aware routing is proposed as part of this body of work in order to facilitate the construction of a dynamic trust based routing network. This model takes into account the distance between nodes the energy of each node and the clustering of nodes in order to increase the overall routing trust levels. It is based on the Dempster Shaffer theory. When the suggested algorithm is compared to an adhoc on demand distance vector routing AODV based non trust routing algorithm a 10% increase in quality of service is shown as a result of the comparison. When measured against the previously implemented AODV based non-trust routing network this enhancement resulted in a 20% decrease in the amount of time spent waiting as well as a 15% decrease in the amount of energy used. Fog networks are subject to persistent assaults from enemies both within and outside of the organization. Researchers have developed a broad range of dynamic security models that are based on machine learning in order to identify and stop these attacks. Each of these models has its own set of functional properties that make it unique from the others. The vast majority of these models make use of a dynamic encryption technique of some kind which raises the bar for the complexity of its implementation while other simpler models are vulnerable to |
Pagination: | xxii, 172p. |
URI: | http://hdl.handle.net/10603/598563 |
Appears in Departments: | Amity School of Engineering and Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 133.88 kB | Adobe PDF | View/Open |
02_preliminary pages.pdf | 2.83 MB | Adobe PDF | View/Open | |
03_content.pdf | 982.33 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 971.92 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 1.12 MB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 1.1 MB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 2.24 MB | Adobe PDF | View/Open | |
08 chapter 4.pdf | 1.39 MB | Adobe PDF | View/Open | |
09 chapter 5.pdf | 1.05 MB | Adobe PDF | View/Open | |
10_annexures.pdf | 1.73 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 996.94 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: