Defense of trust management vulnerabilities in distributed networks

被引:164
|
作者
Sun, Yan [1 ]
Han, Zhu
Liu, K. J. Ray [2 ]
机构
[1] Univ Rhode Isl, Dept Comp Engn, Kingston, RI 02881 USA
[2] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
D O I
10.1109/MCOM.2008.4473092
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Establishing trust among distributed network entities has been recognized as a powerful tool to secure distributed networks such as MANETs and sensor networks. Similar to most security schemes, trust establishment methods themselves can be vulnerable to attacks. In this article we investigate the benefits of introducing trust into distributed networks, the vulnerabilities in trust establishment methods, and the defense mechanisms. Five attacks against trust establishment methods are identified, and defense techniques are developed. Effectiveness of the attacks and the defense is demonstrated in the scenarios of securing routing protocols and detecting malicious nodes in MANETs.
引用
收藏
页码:112 / 119
页数:8
相关论文
共 50 条
  • [11] A fuzzy fully distributed trust management system in wireless sensor networks
    Jadidoleslamy, Hossein
    Aref, Mohammad Reza
    Bahramgiri, Hossein
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2016, 70 (01) : 40 - 49
  • [12] Trust management in a distributed environment
    Thuraisingham, B
    [J]. PROCEEDINGS OF THE 29TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, 2005, : 561 - 562
  • [13] Trust management in distributed firewall
    Ji, Chong
    Hu, Jing
    Chen, Chun-Ling
    [J]. Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2003, 23 (03):
  • [14] Trust management in distributed systems
    Li, Huaizhi
    Singhal, Mukesh
    [J]. COMPUTER, 2007, 40 (02) : 45 - +
  • [15] A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks
    Zhang, Mengjie
    Feng, Renhai
    Zhang, Hehe
    Su, Yishan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 145 : 466 - 477
  • [16] Towards the Assessment of Distributed Vulnerabilities in Autonomic Networks and Systems
    Barrere, Martin
    Badonnel, Remi
    Festor, Olivier
    [J]. 2012 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2012, : 335 - 342
  • [17] A Jury-Based Trust Management Mechanism in Distributed Cognitive Radio Networks
    SU Wengui
    LIAO Yang
    [J]. China Communications, 2015, 12 (07) : 119 - 126
  • [18] A Jury-Based Trust Management Mechanism in Distributed Cognitive Radio Networks
    Su Wengui
    Liao Yang
    [J]. CHINA COMMUNICATIONS, 2015, 12 (07) : 119 - 126
  • [19] A distributed reputation and trust management scheme for mobile peer-to-peer networks
    Qureshi, Basit
    Min, Geyong
    Kouvatsos, Demetres
    [J]. COMPUTER COMMUNICATIONS, 2012, 35 (05) : 608 - 618
  • [20] A distributed trust management model for mobile P2P networks
    Xu Wu
    [J]. Peer-to-Peer Networking and Applications, 2012, 5 : 193 - 204