CS 6204
Trust Management for Computer and Communications Networks and Systems
Spring 2017


- Office Hours
- Course Description
- Topics to be Covered
- Textbook
- Class Schedule
- Paper List
- Grading
- Term Project
- Class Policy
- Paper Presentation Policy
- FAQ
- Tests and Solution

Instructor and Office Hours


Dr. Ing-Ray Chen
Office: NVC 312
Email: irchen@cs.vt.edu
TEL: (703) 538-8376
FAX: (703) 538-8348
Office Hours: Tuesday and Thursday 3pm-4pm.

Course Description


6204: Trust Management for Computer and Communications Networks and Systems. This course discusses and explores how trust can be used to enhance or implement dependability of computer and communications networks and systems. The example trust systems include mobile ad hoc networks, delay tolerant networks, wireless sensor networks, service oriented computing, cloud computing, social networks, and IoT systems.



Topics to be Covered (Tentative)


Students will learn concepts, definitions, and protocol designs for trust management of computer and communications networks and systems. Students will analyze recently published work and apply what they learned to design, build, and evaluate trust-based solutions to enhance or implement dependability of computer and communications networks and systems. Students will demonstrate synthesis and technical writing skills by producing "near publishable" term papers extending existing solutions or developing new ones.

Textbook


No textbook


Class Schedule


Date Source Subject
1/19 [Josang-DSS07] Overview of trust management
1/26 [Josang-BECC02] [Josang-IFIPTM04] Overview of trust management
2/2 [Shabut-TMC15] [Timpner-TDSC16] Trust management for mobile ad hoc networks
2/9 Class cancelled due to inclement weather No class
2/9 [Cho-TDSC17] [Zhu-TPDS14] Trust management for delay tolerant networks
2/16 [Bao-TNSM12] [Jiang-TPDS15] Trust management for wireless sensor networks
2/23 [Wang-TSC17a] [Wang-TSC17b] Trust management for service oriented computing
3/2 Quiz 1 Covering the last 8 papers above
3/9 Spring Break No class
3/16 [Noor-TPDS16] [Zhou-TIFS15] Trust management for cloud computing
3/23 [Wahab-TSC17] [Jiang-TC16] Trust management for cloud/social computing
3/30 [Eirinaki-TSMC14] [Chen-TSC16] Trust management for social/IoT networks
4/13 [Nitti-TKDE14] [Nitti-IoTJ15] Trust management for Internet of things systems
4/20 Quiz 2 Covering papers since Quiz 1
4/27 Term paper discussion day
5/4 Term paper due 4pm No extension



Paper List (Tentative and Subject to Changes)


Overview of Trust Management

  • [Josang-DSS07] (presented by Dr. Chen) (presentation slides)
    A. Josang, R. Ismail, and C. Boyd,
    "A Survey of Trust and Reputation Systems for Online Service Provision,"
    Decision Support Systems,
    Vol. 43, No. 2, March 2007, pp. 618-644.

  • Trust Management for Mobile Ad Hoc Networks

  • [Shabut-TMC15] (presented by Huma) (presentation slides)
    A.M. Shabut, K.P. Dahal, S.K. Bista, and I.U. Awan,
    "Recommendation Based Trust Model with an Effective Defence Scheme for MANETs,"
    IEEE Transactions on Mobile Computing,
    vol. 14, no. 10, 2015, pp. 2101-2115.

  • [Timpner-TDSC16] (presented by L. Wang and X. Zhang) (presentation slides)
    J. Timpner, D. Schurmann, and L. Wolf,
    "Trustworthy Parking Communities: Helping Your Neighbor to Find a Space,"
    IEEE Transactions on Dependable and Secure Computing,
    vol. 13, no. 1, 2016, pp. 120-132.
  • Trust Management for Delay/Disruption Tolerant Networks

  • [Cho-TDSC17] (presented by L. Zhang) (presentation slides)
    J.H. Cho and I.R. Chen,
    "PROVEST: Provenance-based Trust Model for Delay Tolerant Networks,"
    IEEE Transactions on Dependable and Secure Computing,
    2017.
  • Trust Management for Wireless Sensor Networks

  • [Bao-TNSM12] (presented by Dr. Chen) (presentation slides)
    F. Bao, I.R. Chen, M. Chang and J.H. Cho,
    "Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing and Intrusion Detection,"
    IEEE Transactions on Network and Service Management,
    vol. 9, no. 2, 2012, pp. 169-183.

  • [Jiang-TPDS15] (presented by Karki) (presentation slides)
    J. Jiang, G. Han, F. Wang, L. Shu, and M. Guizani,
    "An Efficient Distributed Trust Model for Wireless Sensor Networks,"
    IEEE Transactions on Parallel and Distributed Systems,
    Vol. 26, No. 5, 2015, pp. 1228-1237.

  • Trust Management for Service Oriented Computing

  • [Wang-TSC17a] (presented by L. Zhang) (presentation slides)
    Y. Wang, I.R. Chen, J.H. Cho, A. Swami, and K. Chan,
    "Trust-based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks,"
    IEEE Transactions on Services Computing,
    2017.

  • [Wang-TSC17b] (presented by Karki) (presentation slides)
    Y. Wang, I.R. Chen, J.H. Cho, A. Swami, Y.C. Lu, C.T. Lu, and J.J.P. Tsai,
    "CATrust: Context-Aware Trust Management for Service-Oriented Ad Hoc Networks,"
    IEEE Transactions on Services Computing,
    2017.
  • Trust Management for Cloud Computing

    Trust Management for Social Networks

  • [Jiang-TC16] (presented by Huma, L. Wang, and X. Zhang) (presentation slides)
    W. Jiang, J. Wu, F. Li, G. Wang, and H. Zheng,
    "Trust Evaluation in Online Social Networks Using Generalized Network Flow,"
    IEEE Transactions on Computers,
    vol. 65, no. 3, 2016, pp. 952-963.

  • [Eirinaki-TSMC14] (presented by Chen and Guo) (presentation slides)
    M. Eirinaki, M.D. Louta, and I. Varlamis,
    "A Trust-Aware System for Personalized User Recommendations in Social Networks,"
    IEEE Transactions on Systems, Man, and Cybernetics: Systems,
    vol. 44, no. 4, 2014, pp. 409-421.

  • Trust Management for Internet of Things Applications

  • [Chen-TSC16] (presented by Ji) (presentation slides)
    I.R. Chen, J. Guo, and F. Bao,
    "Trust Management for SOA-based IoT and Its Application to Service Composition,"
    IEEE Transactions on Services Computing,
    vol. 9, no. 3, 2016, pp. 482-495.

  • [Nitti-TKDE14] (presented by Shi and P. Wang) (presentation slides)
    M. Nitti, R. Girau, and L. Atzori,
    "Trustworthiness Management in the Social Internet of Things,"
    IEEE Transactions on Knowledge and Data Management,
    vol. 26, no. 5, 2014, pp. 1253-1266.

  • [Nitti-IoTJ15] (presented by Chen, Guo, Sistrunk, and Southward) (presentation slides)
    M. Nitti, L. Atzori, and I.P. Cvijikj,
    "Friendship Selection in the Social Internet of Things: Challenges and Possible Strategies,"
    IEEE Internet of Things Journal,
    vol. 2, no. 3, 2015, pp. 240-247.


  • Grading

  • 30% class participation and paper presentation
  • 40% term paper
  • 15% quiz 1
  • 15% quiz 2


  • Term Project


    Each student must write a term paper. The term paper must be written in the form of a research paper including the following components: (1) a survey of the topic and a listing of drawbacks that currently exist; (2) objective of the paper, i.e., the problem that the paper is addressing, (3) approaches proposed to solve the problem; (4) analytical or simulation studies and results obtained to validate the approaches proposed; (5) conclusions and future search areas. The total number of pages (double-column, IEEE or ACM style) should not exceed 10 pages including figures and tables. Any copying of existing paper sentences or other prople's (or other groups') work is not allowed and is considered a violation of honor code. A term paper should focus on one of the topics listed below. Topics not in this list can also be considered with the consent of the instructor.


    Preferred List of Topics for the Term Project:


  • Trust, risk and security management

  • Trust management and its applications for mobile ad hoc networks

  • Trust management and its applications for delay tolerant networks

  • Trust management and its applications for wireless sensor networks

  • Trust management for service oriented computing

  • Trust management for cloud computing

  • Trust management and its applications for social networks

  • Trust management and its applications for IoT systems


  • Class Policy



    Paper Presentation Policy



    Frequently Asked Questions and Answers

    TBA


    Tests and Solutions

  • Example Questions for an In-class Quiz

  • Solution to Quiz #1
  • Solution to Quiz #2