Security policies and trust in ubiquitous computing

Author(s):  
Anupam Joshi ◽  
Tim Finin ◽  
Lalana Kagal ◽  
Jim Parker ◽  
Anand Patwardhan

Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.

Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3257
Author(s):  
Arne Bochem ◽  
Benjamin Leiding

Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker’s goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.


2018 ◽  
Vol 7 (2.30) ◽  
pp. 27
Author(s):  
Aishwarya Sagar Anand Ukey ◽  
Meenu Chawla

Cognitive radio (CR) is an emerging technology developed for efficient utilization of the radio spectrum. CRN utilizes CR technology and enables the unlicensed users also referred as secondary users (SUs) to access free portions of the licensed spectrum in an opportunistic manner. To support scalability and stability in distributed CRNs also referred as cognitive radio ad hoc networks (CRAHNs), SUs are often organized into smaller groups known as clusters. Spectrum aware clustering is considered as the key technique to overcome numerous is-sues associated with the dynamic nature of CRAHNs. This article focuses on clustering in CRAHNs and presents a comprehensive review of various spectrum aware clustering algorithms presented in the literature. The article highlights notable clustering metrics and includes the description of cluster formation and maintenance process. The article also renders potential research gaps in existing research works and discusses open challenges and issues that need to be addressed for efficient clustering in CRAHNs. 


2012 ◽  
Vol 178-181 ◽  
pp. 2694-2698
Author(s):  
Jiang Feng Wang ◽  
Shuo Nie ◽  
Xue Dong Yan ◽  
Wang Xiang

Vehicular ad hoc networks (VANETs) form when vehicles are equipped with devices capable of short-range wireless communication. Realistic vehicle trace modeling for VANETs simulations is a challenging task, which requires the reliable characterization of vehicular mobility. In this study, three different vehicle scenarios are proposed to analyze the difference between vehicle traces in multi-scenarios: city road, expressway and highway. Common trace modeling tools and characters of the scenarios are explored. Furthermore, three experimental scenarios are established using VanetMobiSim to produce vehicle traces. The experimental results show that the trend of the average speed versus the number of vehicles is different, and the vehicular density distribution demonstrates the realism of vehicle trace under multi-scenarios.


2019 ◽  
Vol 8 (3) ◽  
pp. 4272-4283

VANETs have developed as one of the largest potential topics in the field of automotive industries with promising and challenging futures in various aspects. VANETs permit intelligent vehicles to generate their own organized network without the need of the stable network. In this paper we introduce VANETs and its comparison with MANETs, standard wireless access in VANETs like WAVE model partly based on OSI model. We present a comprehensive study on routing protocol in VANETs like position-based routing, Geo-Cast based routing, etc. and scheduling in VANETs like deadline-based scheduling, hybrid-based scheduling, etc. This paper presents open research issues in VANETs highlighting challenges like security and privacy issues, network congestion control issues, etc, numerous routing and scheduling issues in VANETs.


Sign in / Sign up

Export Citation Format

Share Document