An important concept in network security is trust, interpreted as a relation among entities that participate in various protocols. Trust relations are based on evidence related to the previous interactions of entities within a protocol. In this work, we are focusing on the evaluation process of trust evidence in Ad Hoc Networks. Because of the dynamic nature of Ad Hoc Networks…
Contents
1. Introduction
1.1 Organization
2 Related Work
2.1 Taxonomy
2.1.1 System Model
2.1.2 Centralized vs decentralized trust
2.1.3 Proactive vs reactive computation
2.1.4 Extensional vs intensional (scalar vs group) metrics
2.1.5 Attack resistance (node/edge attacks)
2.1.6 Negative and positive evidence (certi¯cate revocation)
2.1.7 What layer should trust be implemented in?
2.2 Representative Examples
2.2.1 Decentralized Trust Management
2.2.2 PGP trust metric
2.2.3 Probabilistic
2.2.4 Path Independence
2.2.5 Flow based
2.2.6 Subjective Logic
2.2.7 Local Interaction
3 Our Approach
3.1 System Model
3.2 Semirings
3.2.1 Definitions
3.2.2 Semi rings for path problems
3.2.3 Semi rings for systems of linear equations
3.2.4 Semi rings in previous work on trust
3.3 Trust Semi ring
3.3.1 Intuitive Requirements
3.3.2 Path semi ring
3.3.3 Distance semi ring
3.3.4 Computation algorithm
4 Evaluation and Experimental Results
4.1 Good and Bad Nodes
4.2 Simulation details
4.3 Results
4.4 Discussion
5 Conclusion and Future Work
5.1 Conclusion
5.2 Future Work
Bibliography
Author: Theodorakopoulos, Georgios Efthymios
Source: University of Maryland
Download URL 2: Visit Now
Download URL 3: Visit Now