Validating Medusa a study on the performance and security of a revolutionary approach for survivable trust management

نویسندگان

  • Wiebe K. Wiechers
  • S. Daskapan
چکیده

This thesis presents a new approach for enabling highly survivable secure communications within multi agent systems and combines two independent research projects aimed at validating this revolutionary approach. The traditional approach for providing secure communications, however efficient, presents a central point of failure and thus reduced survivability. The Medusa approach covered here, which is the focus of the two research projects, aims to capture the advantages of the traditional approach whilst dealing with its deficiencies. The two research projects covered here are the following: The first project entitled: Simulating the establishment of trust infrastructures in multi-agent systems, presents and simulates a new approach for creating trusted infrastructures within multi agent systems. A bootstrapping protocol initializes a disordered space by turning it into an organized, redundant hierarchical structure, headed by elected security distribution centers with a pool of successors in case of a failure. A simulation was created of the establishment of this hierarchy to judge both the resulting structure and the process of creation in a varying environment. Networks are tested of different scale, type and topology, with different numbers of malicious agents, intent on disrupting the bootstrapping process. The results show the bootstrapping protocols ability to handle the abovementioned constraints. Based on the results some improvements are suggested to improve the bootstrapping protocol further. In the second project entitled: Ascertaining the security of a distributed survivable trust management protocol, the security of a new approach for enabling survivable secure communications in multi agent systems is validated. The security validation of this approach centers around three security properties: confidentiality, integrity and authentication. Requirements for these security properties are defined for every message generated by this security protocol during its life cycle. A logical analysis of these requirements is followed up by a thorough security validation, based on a model-checking CSP/FDR analysis. Both analyses show that with minor modifications the protocol is able to deliver on its security requirements for the three tested security properties. Finally, the protocol is optimized with possible improvements that increase its efficiency whilst maintaining the security requirements. The conclusions of these two research projects are combined to form an overall conclusion regarding the viability of the Medusa concept as a practical solution for survivable secure communications. The enhanced survivability of the Medusa concept is proven in a simulated environment and trade-offs with regards to security, autonomy and trustworthiness are excluded. Although more research is required before …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Validating the Security of Medusa: A survivability Protocol for Security Systems

In this paper a new approach for enabling survivable secure communications in multi agent systems is validated through CSP/FDR state analysis. The security validation of this approach centers around three security properties: confidentiality, integrity and authentication. Requirements for these security properties are defined for every message generated by this security protocol during its life...

متن کامل

A Sociological Study on Social Trust of Social Security Organization’s Insured Population (Case Study: West Tehran Social Security Branches)

Social trust is one of the foundations for social order in society. Trust in any organization is affected by various factors such as customer satisfaction, service quality, staff skill and taking into account the customer orientation and service receivers’ satisfaction principles. This research seeks to study the sociological study of social trust of the insured population of social security or...

متن کامل

Designing and Validating the Service-Oriented University Model from the Standpoint of Higher Education Experts

Service orientation is a pivotal factor and a strategic direction for the university to keep with changes and perceptions of social needs. Accordingly, the main purpose of this study is to develop a model for the service-oriented university within the framework of service provision to the community. This research was conducted using a qualitative approach based on the grounded theory method. Th...

متن کامل

A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing

Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...

متن کامل

Trust, Reputation and Quality of E-Banking Services (Case Study: Melli Bank Customers)

In today’s very competitive world gaining competitive advantage is bound to arranging products and services of companies and businesses in accordance with customers’ needs. For this purpose, gaining reputation in E-service can be quite helpful. Thus the goal of the present research is studying the effect of E-Banking Service Quality on Bank Reputation. So a coherent collection of structures wer...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008