Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/598563
Title: A Synergic Model For Trust Management System For Fog Computing
Researcher: Choudhary, Ashutosh Kumar
Guide(s): Soni, Goldi and Rahamatkar, Surendra
Keywords: Computer Science
Computer Science Artificial Intelligence
Engineering and Technology
University: Amity University Chhattisgarh
Completed Date: 2024
Abstract: In order to successfully implement trust levels in fog networks an efficient routing protocol design is required. The routing protocol chooses nodes based on their high trust values. As a result data that is sent through these nodes is transmitted with great energy efficiency low latency high throughput and little packet loss. In order to develop such a protocol several network properties need to be analyzed and nodes need to be grouped according to the results of these analyses. In addition to this the categorization has to be complemented by dynamic routing based behaviour which enables routers to adjust the category of nodes in order to improve routing efficiency. A machine learning model for Quality of Service QoS aware routing is proposed as part of this body of work in order to facilitate the construction of a dynamic trust based routing network. This model takes into account the distance between nodes the energy of each node and the clustering of nodes in order to increase the overall routing trust levels. It is based on the Dempster Shaffer theory. When the suggested algorithm is compared to an adhoc on demand distance vector routing AODV based non trust routing algorithm a 10% increase in quality of service is shown as a result of the comparison. When measured against the previously implemented AODV based non-trust routing network this enhancement resulted in a 20% decrease in the amount of time spent waiting as well as a 15% decrease in the amount of energy used. Fog networks are subject to persistent assaults from enemies both within and outside of the organization. Researchers have developed a broad range of dynamic security models that are based on machine learning in order to identify and stop these attacks. Each of these models has its own set of functional properties that make it unique from the others. The vast majority of these models make use of a dynamic encryption technique of some kind which raises the bar for the complexity of its implementation while other simpler models are vulnerable to
Pagination: xxii, 172p.
URI: http://hdl.handle.net/10603/598563
Appears in Departments:Amity School of Engineering and Technology

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File133.88 kBAdobe PDFView/Open
02_preliminary pages.pdf2.83 MBAdobe PDFView/Open
03_content.pdf982.33 kBAdobe PDFView/Open
04_abstract.pdf971.92 kBAdobe PDFView/Open
05_chapter 1.pdf1.12 MBAdobe PDFView/Open
06_chapter 2.pdf1.1 MBAdobe PDFView/Open
07_chapter 3.pdf2.24 MBAdobe PDFView/Open
08 chapter 4.pdf1.39 MBAdobe PDFView/Open
09 chapter 5.pdf1.05 MBAdobe PDFView/Open
10_annexures.pdf1.73 MBAdobe PDFView/Open
80_recommendation.pdf996.94 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: