PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Non-cryptographic methods for improving real time transmission security and integrity

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper we present a few non cryptographic methods for improving the security, integrity and reliability of real time services. The methods presented in this paper apply to real time transmitting systems, which are based on the Peer-to-Peer (P2P) model. A basic idea of the first technique is to use agents for detecting steganographic content in packet headers, so packets with suspicious entries in the IP header fields will be blocked or the fields will be erased. The two other presented techniques are based on reputation and trust systems, so trust and reputation basic definitions, types and modelling methods are shown. Also a simple design scheme of using these mechanisms in a P2P real-time data transmitting infrastructure is presented. Additionally, we describe an idea of path selecting technique, which can be used to avoid paths that are susceptible to eavesdropping.
Słowa kluczowe
Rocznik
Strony
71--86
Opis fizyczny
Bibliogr. 18 poz., rys.
Twórcy
autor
  • Jagiellonian University, Department of Physics, Astronomy and Applied Computer Science, Cracow, Poland
autor
  • Institute of Telecomunications, Faculty of Electronics and Information Technology, Warsaw University of Technology, Nowowiejska 15/19, 00-665 Warsaw, Poland
  • Institute of Fundamental Technological Research of the Polish Academy of Sciences, Warsaw, Poland
Bibliografia
  • [1] Oryńczak G., Kotulski Z., Agent-based VoIP application with reputation mechanisms, Proceedings of the First European Teletraffic Seminar., February 14-16, Poznań (2011 203.
  • [2] Cayre F., Bas P., Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding, Information Forensics and Security 3(1) (2008).
  • [3] Marvel99 Marvel L.M., Boncelet C. G. Jr., Retter C.T., Spread spectrum image steganography, Image Processing 8(8) (1999).
  • [4] Wang H., Wang S., Cyber warfare: steganography vs. steganalysis, Communications of the ACM - Voting systems 47(10) (2004).
  • [5] Mazurczyk W., Kotulski Z., New security and control protocol for VoIP based on steganography and digital watermarking, Annales UMCS Informatica AI 5 (2006): 417.
  • [6] Gambetta D., Can We Trust Trust?, Trust: Making and Breaking Cooperative Relations, Oxford (1990): 213.
  • [7] A. Josang, Trust and Reputation Systems, Lecture Notes in Computer Science 4677/2007 (2007).
  • [8] Guha R., Kumar R., Raghavan P., Tomkins A., Propagation of trust and distrust, Proceedings of the 13th international conference on World Wide Web, NY, USA (2004).
  • [9] Maximilien E.M., Singh M.P., A framework and ontology for dynamic web services Selection, IEEE Internet Computing 8 (2004).
  • [10] Manchala D.W., Trust Metrics, Models and Protocols for Electronic Commerce Transactions, Proceedings of the 18th International Conference on Distributed Computing Systems (1998).
  • [11] Josang A., Presti S. L., Analysing the Relationship Between Risk and Trust, iTrust 2004. LNCS 2995 Springer, Heidelberg (2004).
  • [12] Krukow K., Nielsen M., From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust, Proceedings of the Workshop of Formal Aspects of Security and Trust, Ontario, Kanada, August (2006).
  • [13] Josang A., A Logic for Uncertain Probabilities, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9 (2001): 279.
  • [14] Cahill V., Shand B., Gray E., et al., Using Trust for Secure Collaboration in Uncertain Environments, Pervasive Computing 2 (2003).
  • [15] Merriam-Webster, Merriam-Webster Online (accessed august (2011)), Available from http://www.m-w.com/
  • [16] Carter J., Bitting E., Ghorbani A. A.,Reputation Formalization for an Information-Sharing Multi-Agent System, Computational Intelligence 18(4) (2002).
  • [17] Despotovic Z., Aberer K., P2P reputation management: Probabilistic estimation vs. social networks, Computer Networks 50(4) (2006).
  • [18] Sabater J., Sierra C., Reputation and social network analysis in multi-agent systems, proceedings of the first international joint conference on Autonomous agents and multiagent systems, USA (2002).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-b3fd9966-bffe-4c80-9c26-673cb5536874
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.