TY - GEN
T1 - Secure trust metadata management for mobile ad-hoc networks
AU - Natarajan, Vivek
AU - Yang, Yi
AU - Zhu, Sencun
PY - 2012
Y1 - 2012
N2 - A trust management framework is useful to ensure proper functioning of a mobile ad-hoc network (MANET). Trust metadata created by individual nodes, based on their observation of the behavior of other nodes in their vicinity, is required to be accessible to a trust authority (TA) (e.g., the network administrator) for prompt decision making (e.g., revoking malicious nodes). In this work, for security and scalability reasons, we propose a secure semantics-aware trust metadata management scheme to partition and store an information network of trust metadata of nodes in a MANET. That is, trust metadata is securely propagated to and stored at certain geographic locations inside the network itself, based on its semantics. The TA can send queries of various types in the network to obtain the trust metadata of its interest. This scheme is robust to several security attacks that attempt to disrupt the availability of trust metadata in the network. Our analysis shows that the proposed scheme provides desirable security and functionality properties with low query overhead.
AB - A trust management framework is useful to ensure proper functioning of a mobile ad-hoc network (MANET). Trust metadata created by individual nodes, based on their observation of the behavior of other nodes in their vicinity, is required to be accessible to a trust authority (TA) (e.g., the network administrator) for prompt decision making (e.g., revoking malicious nodes). In this work, for security and scalability reasons, we propose a secure semantics-aware trust metadata management scheme to partition and store an information network of trust metadata of nodes in a MANET. That is, trust metadata is securely propagated to and stored at certain geographic locations inside the network itself, based on its semantics. The TA can send queries of various types in the network to obtain the trust metadata of its interest. This scheme is robust to several security attacks that attempt to disrupt the availability of trust metadata in the network. Our analysis shows that the proposed scheme provides desirable security and functionality properties with low query overhead.
UR - http://www.scopus.com/inward/record.url?scp=84871575679&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84871575679&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-35130-3_12
DO - 10.1007/978-3-642-35130-3_12
M3 - Conference contribution
AN - SCOPUS:84871575679
SN - 9783642351297
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 164
EP - 180
BT - Information Systems Security - 8th International Conference, ICISS 2012, Proceedings
T2 - 8th International Conference on Information Systems Security, ICISS 2012
Y2 - 15 December 2012 through 19 December 2012
ER -