{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T18:50:19Z","timestamp":1778266219473,"version":"3.51.4"},"reference-count":24,"publisher":"IGI Global","issue":"3","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7,1]]},"abstract":"<p>Distributed networks are networks in which each node can act as a server or client and hence any node can provide service to any other node. In such a scenario, establishing a trust model between the service providing user and the service utilizing user is a challenging task. At present, only a few approaches are available in the past literature to provide this facility. Moreover, the existing approaches do not provide high trust accuracy. Therefore,a novel efficient trust model has been proposed in this article to support the secure dynamic group communication in distributed networks. The main advantage of the proposed work is that it provides higher trust accuracy. Moreover, the proposed work takes less memory for maintaining the trust values and increases the packet delivery ratio in comparison with other existing works which are in the literature.<\/p>","DOI":"10.4018\/joeuc.2020070101","type":"journal-article","created":{"date-parts":[[2020,5,28]],"date-time":"2020-05-28T14:26:36Z","timestamp":1590675996000},"page":"1-14","source":"Crossref","is-referenced-by-count":38,"title":["A Novel Trust Model for Secure Group Communication in Distributed Computing"],"prefix":"10.4018","volume":"32","author":[{"given":"Naresh","family":"Ramu","sequence":"first","affiliation":[{"name":"SRM Institute of Science and Technology, India"}]},{"given":"Vijayakumar","family":"Pandi","sequence":"additional","affiliation":[{"name":"University College of Engineering, Tindivanam, India"}]},{"given":"Jegatha Deborah","family":"Lazarus","sequence":"additional","affiliation":[{"name":"University College of Engineering, Tindivanam, India"}]},{"given":"Sivakumar","family":"Radhakrishnan","sequence":"additional","affiliation":[{"name":"University College of Engineering, Tindivanam, India"}]}],"member":"2432","reference":[{"key":"JOEUC.2020070101-0","doi-asserted-by":"crossref","unstructured":"Shen, H., Liu, G., Gemmill, J., & Ward, L. (2013). A P2P-based Infrastructure for Adaptive Trustworthy and Efficient Communication in Wide-Area Distributed Systems.IEEE Transactions on Parallel and Distributed Systems, 25(9), 1045\u20139219.","DOI":"10.1109\/TPDS.2013.159"},{"key":"JOEUC.2020070101-1","doi-asserted-by":"crossref","unstructured":"Afek., Y., Alon, N., & Barad, O. (2011). A biological solution to a fundamental distributed computing problem. science, 331(6014), 183-185.","DOI":"10.1126\/science.1193210"},{"issue":"8","key":"JOEUC.2020070101-2","doi-asserted-by":"crossref","first-page":"157","DOI":"10.4236\/wsn.2014.68016","article-title":"Trust evaluation based on node\u2019s characteristics and neighbouring nodes\u2019 recommendations for WSN.","volume":"6","author":"S. S.Babu","year":"2014","journal-title":"Wireless Sensor Network"},{"key":"JOEUC.2020070101-3","doi-asserted-by":"crossref","unstructured":"Belapurkar, A., Chakrabarti, A., Ponnapalli, H., Varadarajan, N., Padmanabhuni, S., & Sundarrajan, S. (2009). Distributed Systems Security: Issues, Processes and Solutions. Wiley.","DOI":"10.1002\/9780470751787"},{"issue":"4","key":"JOEUC.2020070101-4","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1109\/JSAC.2009.090504","article-title":"A secure mobile healthcare system using trust-based multicast scheme.","volume":"27","author":"A.Boukerche","year":"2009","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"JOEUC.2020070101-5","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/TPDS.2008.60","article-title":"Heuristic discovery of role-based trust chains in peer-to-peer networks.","volume":"20","author":"K.Chen","year":"2008","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"JOEUC.2020070101-6","doi-asserted-by":"crossref","unstructured":"Chen, K., Hwang, K., & Chen, G. (2012). A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1164-1175.22623434","DOI":"10.1109\/TITB.2012.2199996"},{"issue":"2","key":"JOEUC.2020070101-7","first-page":"233","article-title":"Factors Affecting Distributed System Security.","volume":"13","author":"M.Dan","year":"1987","journal-title":"IEEE Transactions on Software Engineering"},{"key":"JOEUC.2020070101-8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2009.0809"},{"issue":"12","key":"JOEUC.2020070101-9","doi-asserted-by":"crossref","first-page":"1284","DOI":"10.1016\/j.comcom.2013.04.007","article-title":"Cooperative security in distributed networks.","volume":"36","author":"O.Garcia-Morchon","year":"2013","journal-title":"Computer Communications"},{"key":"JOEUC.2020070101-10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2456026"},{"key":"JOEUC.2020070101-11","doi-asserted-by":"publisher","DOI":"10.1145\/1394127.1394131"},{"key":"JOEUC.2020070101-12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.86"},{"key":"JOEUC.2020070101-13","doi-asserted-by":"crossref","unstructured":"Kagal, L., Finin, T., & Joshi, A. (2001). Trust-based security in pervasive computing environments. IEEE journal of computers, 34(12), 154-157.","DOI":"10.1109\/2.970591"},{"key":"JOEUC.2020070101-14","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.5.03"},{"key":"JOEUC.2020070101-15","doi-asserted-by":"crossref","unstructured":"Shabut, A. M., Dahal, K. P., Bista, S. K., & Awan, I. U. (2014). Recommendation Based Trust Model with an Effective Defence Scheme for MANETs.IEEE Transactions on Mobile Computing, 14(10), 2101\u20132115.","DOI":"10.1109\/TMC.2014.2374154"},{"issue":"9","key":"JOEUC.2020070101-16","first-page":"3","article-title":"Towards Trusted Cloud Computing.","volume":"9","author":"N.Santos","year":"2009","journal-title":"HotCloud"},{"issue":"1","key":"JOEUC.2020070101-17","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/0167-4048(92)90216-E","article-title":"Distributed systems security.","volume":"11","author":"R. L.Sherman","year":"1992","journal-title":"Computers & Security"},{"key":"JOEUC.2020070101-18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4473092"},{"key":"JOEUC.2020070101-19","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1109\/ICCS.2008.4737328","article-title":"A novel recommendation trust revision algorithm for autonomous networks.","author":"Y.Sun","year":"2008","journal-title":"Proceedings of the 2008 11th IEEE Singapore International Conference on Communication Systems"},{"issue":"18","key":"JOEUC.2020070101-20","doi-asserted-by":"crossref","first-page":"5085","DOI":"10.1002\/sec.1680","article-title":"An effective key distribution for secure internet pay\u2010TV using access key hierarchies.","volume":"9","author":"P.Vijayakumar","year":"2016","journal-title":"Security and Communication Networks"},{"issue":"17","key":"JOEUC.2020070101-21","doi-asserted-by":"crossref","first-page":"3952","DOI":"10.1002\/sec.1578","article-title":"An efficient group key agreement protocol for secure P2P communication.","volume":"9","author":"P.Vijayakumar","year":"2016","journal-title":"Security and Communication Networks"},{"key":"JOEUC.2020070101-22","first-page":"288","article-title":"Leveraging network properties for trust evaluation in multi-agent systems.","volume":"Vol. 2","author":"X.Wang","year":"2011","journal-title":"Proceedings of the 2011 IEEE\/WIC\/ACM International Conferences on Web Intelligence and Intelligent Agent Technology"},{"issue":"9","key":"JOEUC.2020070101-23","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1002\/ett.1413","article-title":"Mobile Networks: Trust Management in Wireless Sensor Networks.","volume":"21","author":"T.Zahariadis","year":"2010","journal-title":"European Transactions on Telecommunications"}],"container-title":["Journal of Organizational and End User Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=256141","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T15:51:55Z","timestamp":1722959515000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JOEUC.2020070101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,7,1]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,7]]}},"URL":"https:\/\/doi.org\/10.4018\/joeuc.2020070101","relation":{},"ISSN":["1546-2234","1546-5012"],"issn-type":[{"value":"1546-2234","type":"print"},{"value":"1546-5012","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,1]]}}}