Collaborative Computer Security and Trust Management

2016 ◽  
Vol 2016 ◽  
pp. 1-10 ◽  
Author(s):  
Shih-Hao Chang ◽  
Zhi-Rong Chen

Mobile crowd sensing (MCS) arises as a new sensing paradigm, which leverages citizens for large-scale sensing by various mobile devices to efficiently collect and share local information. Unlike other MCS application challenges that consider user privacy and data trustworthiness, this study focuses on the network trustworthiness problem, namely, Sybil attacks in MCS network. The Sybil attack in computer security is a type of security attack, which illegally forges multiple identities in peer-to-peer networks, namely, Sybil identities. These Sybil identities will falsify multiple identities that negatively influence the effectiveness of sensing data in this MCS network or degrading entire network performance. To cope with this problem, a cloud based trust management scheme (CbTMS) was proposed to detect Sybil attacks in the MCS network. The CbTMS was proffered for performing active and passive checking scheme, in addition to the mobile PCS trustworthiness management, and includes a decision tree algorithm, to verify the covered nodes in the MCS network. Simulation studies show that our CbTMS can efficiently detect the malicious Sybil nodes in the network and cause 6.87 Wh power reduction compared with other malicious Sybil node attack mode.


2011 ◽  
pp. 198-216 ◽  
Author(s):  
Tyrone Grandison

After entering the realm of computing over a decade ago, the term trust management has evolved to encompass many concepts and mechanisms that bring it closer to its intuitive interpretation. This chapter will outline the evolution and present the catalyst(s) for each phase in its metamorphosis. In each stage, trust management tools were constructed to showcase the current understanding in the field. These tools will be discussed and their strengths, domains of application, and scope for improvement presented. The foundation of trust management technology can be found in security notions, for example credentials, in mathematical computation and in formal (and informal) reputation models. Each of these categories and their hybrids will be highlighted. This chapter should leave the reader with (1) a holistic view of the trust management problem, (2) a clear differentiation of trust management from other fields (and terms) in the computer security arena, and (3) knowledge of the appropriate domain of usage for each system.


2004 ◽  
Author(s):  
Sara Kraemer ◽  
Pascale Carayon ◽  
Ruth Duggan

2006 ◽  
Author(s):  
Jefferson B. Hardee ◽  
Christopher B. Mayhorn ◽  
Ryan West
Keyword(s):  

2009 ◽  
Vol 4 (2) ◽  
pp. 2-8 ◽  
Author(s):  
Wiesław Maria Grudzewski ◽  
Irena Krystyna Hejduk ◽  
Anna Sankowska

2001 ◽  
Author(s):  
SECRETARY OF THE AIR FORCE WASHINGTON DC
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document