The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The peer-to-peer network has been widely used to share large files anonymously. Because of its open nature, nodes can join and leave peer-to-peer networks freely. But there are few limited methods to ensure their trust. Malicious nodes can expose great security threats to peer-to-peer networks such as spreading unauthentic data and viruses. But handling all the malicious nodes in the same way causes...
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design path-selection strategies that minimize the probability that the adversary can successfully control the entrance to and exit from the network. This minimizes the chance that the adversary can observe and correlate patterns...
We discuss the near-term and far-term security, trust and dependability challenges in wireless and mobile telecommunications, in an always-connected environment. We identify some relevant technological and threat trends and propose research priorities in order to solve and respond to the future security-related challenges. Threat trends include increase of complexity and connectivity and challenges...
In this expository paper, we show how some of concepts in game theory might be useful for supplying the underlying theoretical foundations for instilling trust in the framework of network sensing, and describes potential application for cyber warfare.
In this paper we propose a game theoretic framework for routing in mobile ad hoc networks. A trust oriented auction based packet forwarding model is developed for stimulating cooperation among the nodes avoiding the selfish behavior. Our proposed scheme provides incentive for cooperative behavior of the node and the amount of incentive is decided by the trustworthiness of a node. To find the cost...
Building trust has been recognized as a new security approach for wireless distributed networks; however, cooperation among separate layers is given little consideration. The paper provides a cross-layer trust model for ad hoc networks to enhance the system securities. Six modules are constructed to build a trust model. The trust model can collect trust value not only from other entities in the same...
Mobile ad-hoc network which is constructed via mobile nodes without the pre-registration of nodes have created problem in resource sharing. As nodes can join/leave the network randomly therefore nodes may not aware to which nodes is it connected with and this make resources been shared among anonymous nodes which can be trusted/not trusted. This has created unfavorable situation for private transaction...
Wireless Mesh Networks (WMN), this term was coined few years back in network research community. Due to its profound applicability, highly reliable connectivity, easy deployment, flexible interoperability with other networks drew much attention even within this short time. Although, lot of work is going on in this field but still issues like privacy and trust are left unattended. This paper address...
For communication between the cluster head node (CHN) and the distant data fusion center (DFC) with the cooperation of intra-cluster nodes in wireless sensor networks (WSNs), reliable handling of packets by the cooperative node (CN) is difficult to ensure. In this paper, we propose a novel CN selection scheme based on trust for WSNs. This scheme can choose one of high trust nodes to assist in the...
The traditional security solution based on cryptography and authentication is not sufficient for wireless sensor networks, which encounters new challenges from internal attackers, and trust is recognized as a novel approach to defend against such attacks. In this paper, we propose a trust-based LEACH (low energy adaptive clustering hierarchy) protocol to provide secure routing, while preserving the...
We find that traditional authentication ways donpsilat act well in MANETs for the features of dynamic topology and non-existence of central facilities in mobile ad hoc networks. This paper presents a distributed trust proving language, which is based on role trust. The solution of constructing credential authentication infrastructure and the problem how to perform automated trust negotiation are also...
Wireless ad-hoc networks consist of devices communicating with each other without the need for a management infrastructure. As such, the very basic operation of ad-hoc networks is dependent on the cooperation of their nodes to provide connectivity and communication routes. In practice though, such cooperation may not always be achieved. Cases where some nodes behave in a selfish manner or maliciously...
With some critical defects existing in a P2P anonymous network such as stability and security issues, we propose a novel approach called REM-P2PAE to evaluating the reputation based on P2P anonymous environment in the light of our research and analysis. These defects having long been neglected including the short on-line time of reputation model peers, the variations in dynamic situations of peers,...
Because the P2P networkpsilas trust mechanism receives frequently cheat and attack from the malicious nodes, this paper identified four vulnerabilities that are detrimental to trust management, and presented a vague set-based anti-attacked trust model. This model used degree of membership to measure trust degree of uncertainty information, employed the time sensitive coefficient and the penalty coefficient...
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats. One feasible way to minimize threats is to establish the reputation-based global trust model. Previous work about the global trust model is almost based on the assumption that the peer with higher trust value will provide more honest feedbacks, and make the quality of feedback of a peer approximately...
In ad-hoc environments, all nodes have function to set themselves a route and build a network. It is important how trustable each node is in the environment. This study proposes the cluster-based trust model, and uses the model to discuss how you can solve some possible problems occurred in the network. The reputation from a neighboring node is applied to the calculation of the trust value. If the...
Clustering in ad hoc networks consists in dividing the network into clusters (groups) managed by elected nodes called clusterheads. This technique has been used for different goals as routing efficiency, transmission management and information collection. As far as we know, no existing clustering algorithms have taken into account the existence of malicious nodes for clusterheads election and maintenance...
The following topics are dealt with: Internet monitoring; Internet protection; network traffic anomaly detection; network intrusion-detection; cryptographic authentication; steganalysis; risk; and trust.
Trust plays an important role in peer-to-peer (P2P) networks for enabling peers to share resources and services. It is necessary to build an effective security trust model to solve the trust problem during interactions between peers. In this paper, we propose an enhanced trust model based on reputation. We apply SupP2Prep [Chhabra et al., 2004] in our trust model, which is a protocol for reputation...
The anonymity and dynamic characters of p2p (peer to peer) system makes p2p become hotbed with selfish and vicious action. In order to solve the problem of node cheating caused by high dynamic property of P2P, this paper designs a security trust model -- BGTR based on the idea of probability model and fuzzy mathematics. The scheme adopts a new query method that the inquiry peer initiates the calculated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.