资源描述:
《autonomous trust establishment》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、AutonomousTrustEstablishment1TaoJiangJohnS.BarasInstituteforSystemsResearchandDepartmentofElectricalEngineeringUniversityofMaryland,CollegePark,MD20742USAEmail:{tjiang,baras}@isr.umd.eduAbstractTrustestablishmentinnetworksistheessentialfoundationforfollow-onsecuritymecha-nisms,suchask
2、eymanagementandsecuretransmission.Inthispaper,weconcentrateonself-organized,distributedandresource-constraintnetworkswhichposeformidablechallengesontrustestablishmentduetolackofinfrastructureandcentralizedservers.Wemodelourtrustestablishmentstrategyasalocalvotingschemeanddiscussitslon
3、grunbehavior.Morespecif-ically,weinvestigatethedynamicevolutionoftrustwithinthenetwork,i.e.howtrustspreadsamongnodes,viaanalyzingitsconvergencebehavior.Bytheoreticalanalysisbasedongraphtheory,wealsofindtheconditionsunderwhichtrustspreadstoamaximumsetofnodesandparametersthatspeeduporslo
4、wdownthistransition.keywords:Network,TrustEstablishment,Security,GraphTheory1IntroductionAsanimportantconceptinnetworksecurity,trustisinterpretedasasetofrelationsamongagentsparticipatinginnetworkactivities.Trustrelationsarebasedonthepreviousbehaviorofagentswithinaprotocol.Trustestabli
5、shmentindistributedandresource-constraintnetworks,suchasmobileadhocnetworks(MANETs),sensornetworksandubiquitouscomputingsystems,ismuchmoredifficultbutmorecrucialthanintraditionalhierarchicalarchitectures,suchasInternetandbasestation-oraccesspoint-centeredwirelessLANs.Generally,thistypeo
6、fdistributednetworkshasneitherpre-establishedinfrastructure,norcentralizedcontrolserversortrustedthirdparties(TTPs).Thetrustinformationorevidenceusedtoevaluatetrustworthinessisprovidedbypeers,i.e.theagentsthatformthenetwork.Furthermore,resources(power,bandwidth,computationetc.)arenorm
7、allylimitedbecauseofthewirelessandadhocenvironment,sothetrustevaluationprocedureshouldonlyrelyonlocalinformation.Schemesthatdependonlyonlocalinteractionalsohavethedesiredemergentpropertythatenablesfastreactiontonetworkmemberchanges,topologychangesandsecuritychangesthatfrequentlyhappen
8、inmob