• DocumentCode
    737239
  • Title

    Trust metric integration in resource constrained networks via data fusion

  • Author

    Babbitt, Thomas A. ; Szymanski, Boleslaw K.

  • Author_Institution
    Department of Computer Science, Rensselaer Polytechnic Institute, Troy, New York 12180
  • fYear
    2015
  • fDate
    6-9 July 2015
  • Firstpage
    582
  • Lastpage
    589
  • Abstract
    There are numerous environments and situations where network infrastructure is sparse, latent, or partially out of service. There is a growing body of research on protocols, security, information assurance and trust for use in such Resource Constrained Networks. A few examples of a Resource Constrained Network include Delay Tolerant, Wireless Sensor, and many mobile ad-hoc and ad-hoc mesh networks. Data fusion of direct observations and recommendations from other nodes into an aggregate trust value on a given node allows for more efficient routing and enables information assurance security services that support data availability, confidentiality, integrity, authentication, and non-repudiation. Selecting proper data metrics and fusion scheme allows nodes in a network to quickly converge on an accurate trust value for a given node. This minimizes security risks and provides better quality of service to properly functioning nodes as well as quickly isolates malicious ones. This paper discusses our current work on distributed trust management schemes for use in Resource Constrained Networks. Specifically, it introduces fusion methods to integrate diverse clues into a composite trust value.
  • Keywords
    Ad hoc networks; Aggregates; Mathematical model; Measurement; Protocols; Routing; Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Fusion (Fusion), 2015 18th International Conference on
  • Conference_Location
    Washington, DC, USA
  • Type

    conf

  • Filename
    7266613