The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Advancement in digitization gave rise to a new paradigm of communication, called Internet of Things (IoT), where various heterogeneous physical objects (IoT devices) with embedded intelligence can provide or receive services from each other seamlessly. One concerned issue is to maintain reliability in the system with these heterogeneous devices for effective utilization of services. Trust and Reputation...
This publication presents a novel concept for securing P2P-based M2M applications using the integration of a trust management system. In addition, this publication presents different security problems inside the P2P-based M2M application (P2P4M2M) framework and evaluates P2P protocols based on security. Furthermore, this paper emphasises the importance of trust for ensuring security. This is done...
This paper studies Trust in real-time distributed database systems. High availability and fault-tolerance are important aspects of these real-time systems and are commonly achieved by replication. Different existing replication techniques are compared in this paper in terms of implementation and limitations. Also, a new replication technique; TIRS; is proposed that relies on Trust when reading or...
While 4G is speeding up its steps toward global markets, 5G has initiated its full development to satisfy an increasing demand on mobile data traffic and big data bandwidth. Centralized data processing, collaborative radio, real-time cloud infrastructure, and cloud radio access network (C-RAN), along with their excellent advantages are being sought by more and more operators to meet end-user requirements...
Distributed storage allows to outsource a document to the cloud such that multiple users can easily access the file. The protection of the document stored relies on secret sharing, which generates and distributes shares of the document to the storage servers. However, the users have to trust that a certain amount of storage servers behaves honestly and do not lose (retrievability) or reveal (confidentiality)...
The Internet of Things (IoT) is based on the idea that things surrounding the human living space can be connected to the Internet, allowing smarter living environments and more comfortable life. However, adoption of the IoT might not be approved unless security issues are solved. In this paper, we propose a new Dirichlet based trust management system for the IoT called DTMS-IoT. This system detects...
This article discusses the development of methodology of countering attacks based on the use of Bayes' theorem and normal distribution, where the workload, node residual energy, as well as an analysis of successful and unsuccessful network events used to compute the trust level. Estimation of the workload and the residual energy allows detecting attacks such as "Denial of Service", "Sybil"...
The Internet of Things is becoming a critical subject nowadays and along with an increasing adoption of ubiquitous computing devices security becomes an issue which must be approached in different application contexts. One notion that gains traction along with the IoT (Internet of Things) paradigm is the social context of embedded devices. This paper proposes a participatory verification security...
A large number of recent advancements in the technology of Unmanned Aerial Vehicles (UAVs) have enabled them to be very useful and effective in many applications in today's society. They demonstrate a high degree of stability and agility in the air. In order for UAVs to perform their various tasks and responsibilities effectively, UAV communication becomes an important component. Furthermore, such...
Cooperation among nodes is mandatory for smooth operation of Mobile Ad Hoc Networks (MANETs) in terms of data routing. A participating node may refuse to deplete its resources for the benefit of others because of not getting any direct advantage for its service. Nodes showing such behavior are called selfish or non-cooperative nodes. Non-cooperative nodes can severely affect the performance of MANETs...
Internet of Things (IoT) can connect a large numberof things (or agents) through communication networks for varioustypes of applications. Like in many other applications, it isvery important for all the agents in IoT systems to collaboratewith each other following predefined protocols. In this paper, we proposed a general trust management framework aiming tohelp agents to evaluate their partners'...
Trust plays an important role in the development and profitability of users in mobile commerce systems. In order to estimate the amount of trust, the variety of trust management systems have been proposed and implemented. One of the main challenges facing these systems is the types of attacks that threaten them and their impact on trust evaluation. In this paper, we studied four important attacks...
Traditional computation outsourcing and modern cloud computing are affected by a common risk of distrust between service requestor and service provider. We propose a novel protocol, named Probus, that offers guarantees of correct behavior to both parts without assuming any trust relationship between them in the context of cloud-based key-value databases. Probus allows a service requestor to have evidence...
We are proposing a layered and scalable WAVE (Wireless Access for Vehicular Environments) security structure for VANET (Vehicular Ad hoc Network) network. The scalability and variable message delivery are provided by using both asymmetric and symmetric encryption algorithm. The whole region is divided into different security domains and the security related load of each domain is distributed evenly...
Wireless communication technology and the electronic systems advancements have laid the foundation of the wireless sensor network which achieves the growth of low-cost, low power and multi-functional sensor nodes which can be deployed on a single chip to communicate over a short range. The sensor node consists of sensing elements, actuator and a limited source of energy as battery. The major problem...
Online transactions require a fundamental relationship between users and resource providers (e.g., retailers, banks, social media networks) built on trust; both users and providers must believe the person or organization they are interacting with is who they say they are. Yet with each passing year, major data breaches and other identity-related cybercrimes become a daily way of life, and existing...
Devising a protocol for computing the location of a sensor in a wireless sensor network (WSN) is a challenging task. In this paper, we present a protocol for computing the location of a sensor that is part of a WSN. The proposed protocol is based on the extent of the trust contained in the reply messages sent by the neighboring sensors that are either anchors or already localized nodes against the...
Sensor nodes commonly rely on wireless transmission media such as radio frequency (RF) and typically run on top of CoAP and TFTP protocols which do not provide any security mechanisms. One method of securing sensor node communication over RF is to implement a lightweight encryption scheme. In this paper, a RF Simulator developed in our previous publication which simulates lightweight security protocols...
In a military tactical network, maintaining trust among members in a mission group is critical to successful mission completion. However, maintaining high trust among group members in a resource-restricted tactical environment detrimentally reduces system lifetime, which may lead to mission failure or low mission effectiveness. In this paper, we aim to investigate the relationships between group trust...
The technological advancement in the field of wireless communication and electronic systems have provided the opportunity for the wireless sensor network to achieve the development of low-cost, low power and multi-functional sensor nodes which can be placed on a single chip and can communicate over a short distance. The critical issue faced by wireless sensor networks is the efficient energy utilization...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.