Defense of trust management vulnerabilities in distributed networks

被引:164
|
作者
Sun, Yan [1 ]
Han, Zhu
Liu, K. J. Ray [2 ]
机构
[1] Univ Rhode Isl, Dept Comp Engn, Kingston, RI 02881 USA
[2] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
D O I
10.1109/MCOM.2008.4473092
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Establishing trust among distributed network entities has been recognized as a powerful tool to secure distributed networks such as MANETs and sensor networks. Similar to most security schemes, trust establishment methods themselves can be vulnerable to attacks. In this article we investigate the benefits of introducing trust into distributed networks, the vulnerabilities in trust establishment methods, and the defense mechanisms. Five attacks against trust establishment methods are identified, and defense techniques are developed. Effectiveness of the attacks and the defense is demonstrated in the scenarios of securing routing protocols and detecting malicious nodes in MANETs.
引用
收藏
页码:112 / 119
页数:8
相关论文
共 50 条
  • [31] AI-Enabled Trust in Distributed Networks
    Li, Zhiqi
    Fang, Weidong
    Zhu, Chunsheng
    Gao, Zhiwei
    Zhang, Wuxiong
    [J]. IEEE ACCESS, 2023, 11 : 88116 - 88134
  • [32] Trust establishment in distributed networks: Analysis and modeling
    Sun, Yan Lindsay
    Yang, Yafei
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1266 - 1273
  • [33] Security, trust, and resilience of distributed networks and systems
    Su, Jinshu
    Wang, Xiaofeng
    Shi, Weisong
    Ray, Indrakshi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (10) : 1829 - 1830
  • [34] Design of distributed sensor networks for security and defense
    Karakehayov, Z
    [J]. CYBERSPACE SECURITY AND DEFENSE: RESEARCH ISSUES, 2005, 196 : 177 - 192
  • [35] A Trust Management Method Against Abnormal Behavior of Industrial Control Networks Under Active Defense Architecture
    Wang, Jingpei
    Zhang, Zhenyong
    Wang, Mufeng
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 2549 - 2572
  • [36] Vulnerabilities Analysis and Defense Based on MAS Method in Fast Dynamic Wireless Networks
    Burlachenko, Ivan
    Zhuravska, Iryna
    Davydenko, Yevhen
    Savinov, Volodymyr
    [J]. PROCEEDINGS OF THE 2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS WITHIN THE INTERNATIONAL CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS (IDAACS-SWS), 2018, : 98 - 102
  • [37] A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks
    Stelios, Yannis
    Papayanoulas, Nikos
    Trakadas, Panagiotis
    Maniatis, Sotiris
    Leligou, Helen C.
    Zahariadis, Theodore
    [J]. MOBILE LIGHTWEIGHT WIRELESS SYSTEMS, 2009, 13 : 85 - 92
  • [38] Intrinsic vulnerabilities of the power systems supporting communication networks and expert strategies for defense
    Rauscher, Karl
    Krock, Rick
    Runyon, Jim
    Hayden, Peter
    [J]. INTELEC 2006: 28TH INTERNATIONAL TELECOMMUNICATION ENERGY CONFERENCE, VOLS 1 AND 2, 2006, : 92 - 99
  • [39] Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks
    Ge, Yunfei
    Zhu, Quanyan
    [J]. 2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2022, : 359 - 364
  • [40] Toward a Distributed Trust Management scheme for VANET
    Kchaou, Amira
    Abassi, Ryma
    Guemara, Sihem
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,