PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

How the Role-Based Trust Management Can Be Applied to Wireless Sensor Networks

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Trust plays an important role in human life environments. That is why the researchers has been focusing on it for a long time. It allows us to delegate tasks and decisions to an appropriate person. In social sciences trust between humans was studied, but it also was analyzed in economic transactions. A lot of computer scientists from different areas, like security, semantic web, electronic commerce, social networks tried to transfer this concept to their domains. Trust is an essential factor in any kind of network, whether social or computer. Wireless sensor networks (WSN) are characterized by severely constrained resources, they have limited power supplies, low transmission bandwidth, small memory sizes and limited energy, therefore security techniques used in traditional wired networks cannot be adopted directly. Some effort has been expended in this fields, but the concept of trust is defined in slightly different ways by different researchers. In this paper we will show how the family of Role-based Trust management languages (RT) can be used in WSN. RT is used for representing security policies and credentials in decentralized, distributed access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities.
Rocznik
Tom
Strony
70--77
Opis fizyczny
Bibliogr. 46 poz., tab.
Twórcy
autor
Bibliografia
  • [1] S. P. Marsh, “Formalising Trust as a Computational Concept”, Ph.D. thesis, Dept. of Computing Science and Mathematics, University of Stirling.
  • [2] M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized trust management”, in Proc. 17th IEEE Symp. Secur. Priv., Oakland, CA, USA, 1996, pp. 164–173.
  • [3] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, “SPINS: Security protocols for sensor networks”, in Proc. 7th Int. Conf. Mob. Comput. Netw. MobiCom 2001, Rome, Italy, 2001, pp. 189–199.
  • [4] “Cambridge Advanced Learner’s Dictionary” [Online]. Available: http://dictionary.cambridge.org/
  • [5] S. Ganeriwal and M. B. Srivastava, ”Reputation-based framework for high integrity sensor networks”, in Proc. 2nd ACM Worksh. Secur. Ad Hoc Sensor Netw., Washington, DC, USA, 2004, pp. 66–77.
  • [6] A. Boukerche, X. Li, and K. EL-Khatib, “Trust-based security for wireless ad hoc and sensor networks”, Comp. Commun., vol. 30, pp. 2413–2427, 2007.
  • [7] Z. Yao, D. Kim, and Y. Doh, “PLUS: Parameterized and localized trust management scheme for sensor networks security”, in Proc. 3rd IEEE Int. Conf. Mob. Ad-Hoc and Sensor Syst. MASS-2006, Vancouver, Canada, 2006, pp. 437–446.
  • [8] M. Gupta, P. Judge, and M. Ammar, “A reputation system for peer-to-peer networks”, in Proc. 13th Int. Worksh. Netw. Operating Sys. Support Digit. Audio Video NOSSDAV 2003, Monterey, CA, USA, 2003, pp. 144–15.
  • [9] L. Xiong and L. Liu, “Peer trust: Supporting reputation-based trust for peer-to-peer electronic communities”, IEEE Trans. Knowl. Data Eng., vol. 16, no. 7, pp. 843–857, 2004.
  • [10] S. Buchegger and J. L. Boudec, “Performance analysis of the CONFIDANT protocol”, in Proc. 3rd ACM Int. Symp. Mob. Ad Hoc Netw. Comput. MobiHoc 2002, Lausanne, Switzerland, 2002.
  • [11] S. Buchegger and J. Y. L. Boudec, “A robust reputation system for peer-to-peer and mobile ad-hoc networks”, in Proc. 2nd Worksh. Econom. Peer-to-Peer Sys. P2PEcon 2004, Cambridge, MA, USA, 2004.
  • [12] P. Michiardi and R. Molva, “CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks”, in Advanced Communications and Multimedia Security, B. Jerman- Blazic and T. Klobucar, Eds. Kluwer 2002, pp. 107–121.
  • [13] Y. Rebahi, V. E. Mujica-V, and D. Sisalem, “A reputation-based trust mechanism for ad-hoc networks”, in Proc. 10th IEEE Symp. Comp. Commun. ISCC 2005, Murcia, Spain, 2005, pp. 37–42.
  • [14] Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu, “Information theoretic framework of trust modeling and evaluation for ad hoc networks”, IEEE J. Selec. Areas in Commun., vol. 24, no. 2, pp. 305–317, 2006.
  • [15] G. Theodorakopoulos and J. S. Baras, “On trust models and trust evaluation metrics for ad hoc networks”, IEEE J. Selec. Areas in Commun., vol. 24, no. 2, pp. 318–328, 2006.
  • [16] Z. Yan, P. Zhang, and T. Virtanen, “Trust evaluation based security solutions in ad hoc networks”, in Proc. 7th Nordic Worksh. Secur. IT Syst., Gjovik, Norway, 2003.
  • [17] H. Chen, H. Wu, X. Zhou, and C. Gao, “Reputation-based trust in wireless sensor netwoks”, in Proc. Int. Conf. Multim. Ubiq. Engin. MUE 2007, Seoul, Korea, 2007.
  • [18] K. Daniluk and E. Niewiadomska-Szynkiewicz, “A survey of energy efficient security architectures and protocols for wireless sensor networks”, J. Telecom. Inform. Technol., no. 3, pp. 64–72, 2012.
  • [19] K. Lasota, E. Niewiadomska-Szynkiewicz, and A. Kozakiewicz, “Adaptacja rozwiązań honeypot dla sieci czujników”, in Proc. Konferencja Sieci Komputerowe SK-12, Szczyrk, Poland, 2012, Studia Informatica, vol. 33, no. 3A, pp. 139–148 (in Polish).
  • [20] K. Lasota, E. Niewiadomska-Szynkiewicz, and A. Kozakiewicz, “Mobilny honeypot dla sieci sensorycznych”, Przegląd Telekomunikacyjny, no. 8–9, pp. 699–704, 2012 (in Polish).
  • [21] M. Momani, S. Challa, and K. Aboura, “Modelling trust in wireless sensor networks from the sensor reliability prospective”, in Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecomm., T. Sobh et al., Eds. Heidelberg: Springer, 2007, pp. 179–189, pp. 317–321.
  • [22] R. A. Shaikh, H. Jameel, S. Lee, S. Rajput, and Y. J. Song, “Trust management problem in distributed wireless sensor networks”, in Proc. 12th IEEE Conf. Embedd. Real-Time Comput. Syst. Appl. RTCSA 2006, Sydney, Australia, 2006, pp. 411–414.
  • [23] E. Aivaloglou and S. Gritzalis, “Hybrid trust and reputation management for sensor networks”, Wirel. Netw., vol. 16, no. 5, pp. 1493–1510, 2010.
  • [24] Z. Yao, D. Kim, I. Lee, K. Kim, and J. Jang, “A security frame- work with trust management for sensor networks”, in Proc. Worksh. of the 1st Int. Conf. Secur. Priv. Emerg. Areas in Commun. Netw. SecureComm 2005, Athens, Greece, 2005, pp. 190–198.
  • [25] Y. Zhiying, K. Daeyoung, L. Insun, K. Kiyoung, and J. Jongsoo, “A security framework with trust management for sensor networks”, in Proc. 1st Int. Conf. Secur. Priv. Emerg. Areas in Commun. Netw. SecureComm 2005, Athens, Greece, 2005.
  • [26] T. A. Zia, “Reputation-based Trust Managmenet in Wireless Sensor Networks”, in Proc. Int. Conf. Intell. Sensors, Sensor Netw. Inform. Proces. ISSNIP 2008, Sydney, Australia, pp. 163–166.
  • [27] M. Momani and S. Challa, “Trust management in wireless sensor networks”, in Proc. 5th ACM Conf. Embedded Netw. Sensor Syst., Sydney, Australia, 2007.
  • [28] H. Chen, H. Wu, X Zhou, and C. Gao, “Agent-based trust model in wireless sensor networks”, in Proc. 8th ACIS Int. Conf. Softw. Engin. Artif. Intell., Netw. Parallel/Distrib. Comput., Qingdao, China, 2007.
  • [29] D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli, “Proposed NIST standard for role-based access con- trol”, ACM Trans. Inf. Syst. Secur., vol. 3, pp. 224–274, 2001.
  • [30] R. S. Sandhu, E. J. Coyne, H. L. Feinstein, nad C. E. Youman, “Role-based access control models”, IEEE Computer, vol. 2, pp. 38–47, 1996.
  • [31] M. Blaze, J. Feigenbaum and M. Strauss, “Compliance checking in the policymaker trust management system”, in Proc. 2nd Int. Conf. Finan. Cryptogr., London, UK, 1998, pp. 254–274.
  • [32] M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, “The role of trust management in distributed systems security”, in LNCS Se- cure Internet Programming: Security Issues for Mobile and Distributed Objects, J. Vitek and C. D. Jensen, Eds. Springer, 1999, pp. 185–210.
  • [33] D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest, “Certificate chain discovery in SPKI/SDSI”, J. Comp. Secur., vol. 9, pp. 285–322, 2001.
  • [34] P. Chapin, C. Skalka, and X. S. Wang, “Authorization in trust management: features and foundations”, ACM Comp. Surv., vol. 3, pp. 1–48, 2008.
  • [35] N. Li and J. Mitchell, “RT: A Role-Based Trust-Management Framework”, in Proc. 3rd DARPA Inform. Survivabil. Conf. Expos., Washington, DC, USA, IEEE Computer Society Press, 2003, pp. 201–212.
  • [36] N. Li, J. Mitchell, and W. Winsborough, “Design of a role-based trust-management framework”, in Proc. IEEE Symp. Secur. Priv., Oakland, CA, USA, 2002, pp. 114–130.
  • [37] N. Li, W. Winsborough, and J. Mitchell, “Distributed credential chain discoveryin trust management”, J. Comp. Secur., vol. 1, pp. 35–86, 2003.
  • [38] M. R. Czenko, S. Etalle, D. Li, and W. H. Winsborough, “An intro- duction to the role based trust management framework RT”, Tech. Rep. TR-CTIT-07-34, Centre for Telematics and Information Technology University of Twente, Enschede, 2007.
  • [39] K. Lasota and A. Kozakiewicz, “Model of user access control to virtual machines based on RT – family trust management language with temporal validity constrains – practical application”, J. Telecom. Inform. Technol., no. 3, pp. 13–21, 2012.
  • [40] D. Gorla, M. Hennessy, and V. Sassone, “Inferring dynamic credentials for role-based trust management”, in Proc. 8th ACM SIGPLAN Conf. Princip. Pract. Declarat. Program. PPDP 06, Venice, Italy, 2006, pp. 213–224.
  • [41] A. Felkner and A. Kozakiewicz, “RTT + – time validity constraints in RTT language”, J. Telecom. Inform. Technol., no. 2, pp. 74–82, 2012.
  • [42] W. M. Grudzewski, I. K. Hejduk, A. Sankowska, and M. Wańtuchowicz, Trust Management in Virtual Work Environments: A Human Factors Perspective. CRC Press, 2008.
  • [43] A. Felkner and K. Sacha, “The semantics of role-based trust management languages”, in Advances in Software Engineering Techniques, T. Szmuc, M. Szpyrka, J. Zendulka, Eds., LNCS 7054. Heidelberg: Springer, 2012, pp. 179–189.
  • [44] A. Felkner and A. Kozakiewicz, “Kontrola dostępu w rozproszonych systemach – trzy semantyki języka RTT ”, in Proc. II Konferencja i3: internet – infrastruktury – innowacje, Wrocław, Poland, 2010 (in Polish).
  • [45] A. Felkner and K. Sacha, “Deriving RTT credentials for role-based trust management”, e-Inform. Software Engin. J., vol. 4, no. 1, pp. 9–19, 2010.
  • [46] A. Felkner and A. Kozakiewicz, “Time validity in role-based trust management inference system”, in Proc. Int. Worksh. Sec. Trust Comput., Data Manag., and Appl. IWCS-11, Loutraki, Greece, 2011, Communications in Computer and Information Science, Springer, 2011, vol. 187, pp. 7–15.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BATA-0018-0009
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.