DocumentCode
737239
Title
Trust metric integration in resource constrained networks via data fusion
Author
Babbitt, Thomas A. ; Szymanski, Boleslaw K.
Author_Institution
Department of Computer Science, Rensselaer Polytechnic Institute, Troy, New York 12180
fYear
2015
fDate
6-9 July 2015
Firstpage
582
Lastpage
589
Abstract
There are numerous environments and situations where network infrastructure is sparse, latent, or partially out of service. There is a growing body of research on protocols, security, information assurance and trust for use in such Resource Constrained Networks. A few examples of a Resource Constrained Network include Delay Tolerant, Wireless Sensor, and many mobile ad-hoc and ad-hoc mesh networks. Data fusion of direct observations and recommendations from other nodes into an aggregate trust value on a given node allows for more efficient routing and enables information assurance security services that support data availability, confidentiality, integrity, authentication, and non-repudiation. Selecting proper data metrics and fusion scheme allows nodes in a network to quickly converge on an accurate trust value for a given node. This minimizes security risks and provides better quality of service to properly functioning nodes as well as quickly isolates malicious ones. This paper discusses our current work on distributed trust management schemes for use in Resource Constrained Networks. Specifically, it introduces fusion methods to integrate diverse clues into a composite trust value.
Keywords
Ad hoc networks; Aggregates; Mathematical model; Measurement; Protocols; Routing; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Fusion (Fusion), 2015 18th International Conference on
Conference_Location
Washington, DC, USA
Type
conf
Filename
7266613
Link To Document