Trust Management for Defending On-Off Attacks

被引:56
作者
Chae, Younghun [1 ]
DiPippo, Lisa Cingiser [1 ]
Sun, Yan Lindsay [2 ]
机构
[1] Univ Rhode Isl, Dept Comp Sci, Kingston, RI 02881 USA
[2] Univ Rhode Isl, Elect & Comp Engn, Kingston, RI 02881 USA
基金
美国国家科学基金会;
关键词
Trust; redemption; recover; manage; collaborate; On-off attack; wireless sensor network; ad-hoc; distributed system; AD-HOC NETWORKS; REPUTATION; COOPERATION; SYSTEM; SCHEME;
D O I
10.1109/TPDS.2014.2317719
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A trust management scheme can be used to aid an automated decision-making process for an access control policy. Since unintentional temporary errors are possible, the trust management solution must provide a redemption scheme to allow nodes to recover trust. However, if a malicious node tries to disguise its malicious behaviors as unintentional temporary errors, the malicious node may be given more opportunities to attack the system by disturbing the redemption scheme. Existing trust management schemes that employ redemption schemes fail to discriminate between temporary errors and disguised malicious behaviors in which the attacker cleverly behaves well and badly alternatively. In this paper, we present the vulnerabilities of existing redemption schemes, and describe a new trust management and redemption scheme that can discriminate between temporary errors and disguised malicious behaviors with a flexible design. We show the analytical results of the trust management scheme, and demonstrate the advantages of the proposed scheme with simulation conducted in a Wireless Sensor Network.
引用
收藏
页码:1178 / 1191
页数:14
相关论文
共 36 条
  • [1] Abuhaiba Ibrahim S. I., 2013, International Journal of Computer Network and Information Security, V5, P13, DOI 10.5815/ijcnis.2013.03.02
  • [2] Wireless sensor networks: a survey
    Akyildiz, IF
    Su, W
    Sankarasubramaniam, Y
    Cayirci, E
    [J]. COMPUTER NETWORKS, 2002, 38 (04) : 393 - 422
  • [3] [Anonymous], AD HOC NETW, DOI DOI 10.1016/S1570-8705(03)00008-8
  • [4] Bathla H., 2010, J COMPUT, V2
  • [5] Self-policing mobile ad hoc networks by reputation systems
    Buchegger, S
    Le Boudec, JY
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (07) : 101 - 107
  • [6] Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
    Buchegger, S
    Le Boudec, JY
    [J]. 10TH EUROMICRO WORKSHOP ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, PROCEEDINGS, 2002, : 403 - 410
  • [7] Buchegger S., 2004, P P2PECON WORKSH JUN
  • [8] Buchegger S., 2002, Proceedings of ACM International Symposium on Mobile Ad Hoc Net-working and Computing (MobiHoc), P226
  • [9] Chae Y., 2012, TR12331 U RHOD ISL D
  • [10] Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs
    Chang, Ben-Jye
    Kuo, Szu-Liang
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (04) : 1846 - 1863