trust establishment
Recently Published Documents


TOTAL DOCUMENTS

159
(FIVE YEARS 20)

H-INDEX

20
(FIVE YEARS 1)

Author(s):  
Usama Ahmed ◽  
Asma Al‐Saidi ◽  
Ioan Petri ◽  
Omer F. Rana

2021 ◽  
Vol 10 (02) ◽  
pp. 47-55
Author(s):  
Anciline JeniferJ ◽  
Piramu PreethikaS K

Internet of Things enables the user to interact with devices which merges with Social Internet of Things (SIoT). SIoT is a new model that allows various attractive application and promote sharing of information. This can establish objects in an independent way based on the social relationship. The major issue is how to construct the trusted model and to understand how the objects interact with SIoT. In order to overcome these challenges, trust establishment model among these devices has been required before originating communication. This paper describes collaborative methods for calculating trust based on the trust evaluation system. The collaboration among the nodes can be established using encoded and decoded packets whereas the encoded packet transmission illustrates the collaboration. The each node of reliability based on the transaction factors can be assigned and their trust values can be calculated. This paper described comparison between proposed Cooperative Trust (CT) models which can be observed initially it achieves 79% trust value than the existing trust model. This framework provides more security and reliability for SIoT in order to identify the malicious nodes.


Information ◽  
2021 ◽  
Vol 12 (3) ◽  
pp. 110
Author(s):  
Peipei Li ◽  
Bin Lu ◽  
Daofeng Li

The Border Gateway Protocol (BGP) is the standard inter-domain route protocol on the Internet. Autonomous System (AS) traffic is forwarded by the BGP neighbors. In the route selection, if there are malicious or inactive neighbors, it will affect the network’s performance or even cause the network to crash. Therefore, choosing trusted and safe neighbors is an essential part of BGP security research. In response to such a problem, in this paper we propose a BGP Neighbor Trust Establishment Mechanism based on the Bargaining Game (BNTE-BG). By combining service quality attributes such as bandwidth, packet loss rate, jitter, delay, and price with bargaining game theory, it allows the AS to select trusted neighbors which satisfy the Quality of Service independently. When the trusted neighbors are forwarding data, we draw on the gray correlation algorithm to calculate neighbors’ behavioral trust and detect malicious or inactive BGP neighbors.


Author(s):  
Luca Boldrin ◽  
Giovanni Paolo Sellitto ◽  
Jaak Tepandi

AbstractWhile information security nowadays represents a core concern for any organization, Trust Management is usually less elaborated and is only important when two or more organizations cooperate towards a common objective. The overall Once-Only Principle Project (TOOP) architecture relies on the concept of trusted sources of information and on the existence of a secure exchange channel between the Data Providers and the Data Consumers in this interaction framework. Trust and information security are two cross-cutting concerns of paramount importance. These two concerns are overlapping, but not identical and they span all of the interoperability layers, from the legal down to the technical, passing through organizational and semantic layers. While information security aims at the preservation of confidentiality, integrity and availability of information, trust establishment guarantees that the origin and the destination of the data and documents are authentic (authenticity) and trustworthy (trustworthiness), and that data and documents are secured against any modification by untrusted parties (integrity). In this chapter, the TOOP Trust Architecture is presented, starting from a simple abstract model of interaction between two agents down to the detailed end-to-end trust establishment architecture, modeled onto the Toop Reference Architecture presented in the previous chapter.


Sign in / Sign up

Export Citation Format

Share Document