Defense of trust management vulnerabilities in distributed networks

被引:166
作者
Sun, Yan [1 ]
Han, Zhu
Liu, K. J. Ray [2 ]
机构
[1] Univ Rhode Isl, Dept Comp Engn, Kingston, RI 02881 USA
[2] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
D O I
10.1109/MCOM.2008.4473092
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Establishing trust among distributed network entities has been recognized as a powerful tool to secure distributed networks such as MANETs and sensor networks. Similar to most security schemes, trust establishment methods themselves can be vulnerable to attacks. In this article we investigate the benefits of introducing trust into distributed networks, the vulnerabilities in trust establishment methods, and the defense mechanisms. Five attacks against trust establishment methods are identified, and defense techniques are developed. Effectiveness of the attacks and the defense is demonstrated in the scenarios of securing routing protocols and detecting malicious nodes in MANETs.
引用
收藏
页码:112 / 119
页数:8
相关论文
共 10 条
[1]  
BUCHEGGER S, 2003, IC200331 EPFL
[2]  
DELLAROCAS C, 2000, P 21 INT C INF SYS B
[3]  
GANERIWAL S, 2004, P ACM SEC AD HOC SEN
[4]   A survey of trust and reputation systems for online service provision [J].
Josang, Audun ;
Ismail, Roslan ;
Boyd, Colin .
DECISION SUPPORT SYSTEMS, 2007, 43 (02) :618-644
[5]  
LANGHEINRICH M, 2003, P 5 INT C UB COMP SE
[6]  
Michiardi P, 2002, INT FED INFO PROC, V100, P107
[7]  
PERRIG A, 2005, SECURE NEXT GENERATI
[8]  
SUN Y, 2006, P IEEE INFOCOM 06 BA
[9]  
Sun YL, 2006, IEEE J SEL AREA COMM, V24, P305, DOI [10.1109/JSAC.2005.861389, 10.1109/JSAC.2005.0861389]
[10]  
WANG Y, 2007, P 1 INT WKSP TRUST R