Network Security & Cryptography (NSC) Lab

Department of Information Technology
Indian Institute of Information Technology, Allahabad.





TrustSim: A Decentralized Reputation and Trust Model Simulator
[Funded by: ICPS, Department of Science and Technology, Government of India]

Abstract

Various security models use trust and reputation scores to regulate device behaviour in a network after authentication. The trust of a node is computed using its various activities and equivalent value. Even though various proposed trust and reputation models are mathematically proven to show the security effectiveness, they have to be evaluated considering the real-time scenario. However, it is not possible to test models in the real-time network in most cases. Hence, a simulator providing real-time events is required to test the effectiveness of the reputation and trust models. Also, the growth of blockchain technology brought decentralized trust and reputation models, and decentralized authentication is gaining momentum. Considering these, we developed a decentralized reputation and trust model simulator, TrustSim, which has more features than the existing simulators. To evaluate the trust models, the developed TrustSim simulates different pluggable attack nodes and attacks in real-time.


Download
[SHA256: ed54979494392ef8ec424ce29f4b45beb16720fc65b9acc741e6d771f8957345]

To know more about functions and variables Annexure

ReadME

Paper


Privacy Preserving Mobility Monitoring Simulator

Abstract

P2M2Sim: A Privacy Preserving Mobility Monitoring Simulator1 for the crowd mobility monitoring and the privacy computation on different perspecitive is written using Golang. The go routines are used to represent every real individual/user and the fake/dummy users. The simulator has the provision to define number of individuals, privacy threshold (PT), source and destination locations and the intermediate locations. The simulator gives provision to define number of the dummies to be added for every new user mobility initialization and at the intermediate stations. As an initialization, the road map or the network will be created using the source, destination and intermediate locations. The individual as well as fake starts from the source location, reach the first intermediate random location then randomly next location is selected for next move and so on. Every movement of the individuals will be recorded in the respective location table. The fake user go routine will stop moving as well as data entry in to the location table in case the location has more than privacy threshold (PT) individuals. Similarly the real user routine will stop once it reaches the destination. The simulator has the provision to run the movement in rounds and define the maximum hops or locations allowed for an individual in the network. The final outputs will be written into the CSV file for further analysis or generating the report.


Download
[SHA256: cf6eb4278037b00faaea9a4343c118e253646754725e495a84d50e366c861b9d]

ReadME


Blockchain Testbed

Abstract

The testbed is developed with the go-ethereum. The testbed includes a server, 5 Raspberry Pi with different configurations, 2 different model Android Phone, and one Aurdino. The users can deploy the smart contract and validate it using our testbed. Also, they can measure the performance such as CPU, Memory, Energy, Network consumption, etc. This is the only testbed across the globe that gives the complete access to the hardware to the users remotely.

Access Here

More about the Tesbed can be seen from our paper