Trust-Based Security Protocols
نویسندگان
چکیده
An agent-based model of interpersonal trust is used to develop information sharing security protocols in the spirit of soft security. We demonstrate that availability information can be balanced against security breaches. Our protocols are simple, malleable, and scalable. Index Terms – Security protocols, soft security, agents
منابع مشابه
Towards an Integrated Formal Analysis for Security and Trust
We aim at defining an integrated framework for the specification and (automated) analysis for security and trust in complex and dynamic scenarios. In particular, we show how the same machinery used for the formal verification of security protocols may be used to analyze access control policies based on trust management.
متن کاملImplementation of SAODV and TAODV Adhoc Secure Routing Protocols
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues into account. Subsequent proposals used strong cryptographic methods to secure the routing information. In the process, however, these protocols created new avenues for denial of service (DoS). Consequently, the trade-...
متن کاملDesign and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs
Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs). In postquantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer ...
متن کاملCryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues into account. Subsequent proposals used strong cryptographic methods to secure the routing information. In the process, however, these protocols created new avenues for denial of service (DoS). Consequently, the trade-...
متن کاملQuantitative Modeling of Trust and Trust Management Protocols in Next Generation Social Networks Based Wireless Mobile Ad Hoc Networks
Trust and Trust Management represent the very foundations of Computer and Network Security Protocols enabling all cyber activities. Recent spate of national and global high-impact Cyber Security compromises, threats, vulnerabilities, and exposures leads to fundamental questioning of Trust as the key enabler of all cyber phenomena in the unfolding era of exponentially increasing Distrust. It is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004