TY - GEN
T1 - Evaluation of network trust using provenance based on distributed local intelligence
AU - Dogan, Gulustan
AU - Brown, Theodore
AU - Govindan, Kannan
AU - Mohammad Maifi, Hasan Khan
AU - Abdelzaher, Tarek
AU - Mohapatra, Prasant
AU - Cho, Jin Hee
PY - 2011
Y1 - 2011
N2 - Provenance can play a significant role in a military information system for supporting the calculation of information trust. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. We introduce a node-level trust-enhancing mechanism for information networks using provenance. A unique characteristic of the proposed trust architecture presented here is the use of provenance through the path of the information from source to destination in determining the information trust. In this proposed architecture each node in the system has a trust and provenance vector. Each information item transmitted over the network has a trust value associated with it. Nodes reexamine and update the trust value associated with the information, creating a distributed system that is more flexible and more responsive. As our system allows reconfigurations, initiatives taken by the intermediate nodes such as replacement of untrusted nodes will enhance the network trust in mission critical situations faster than a centralized approach.
AB - Provenance can play a significant role in a military information system for supporting the calculation of information trust. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. We introduce a node-level trust-enhancing mechanism for information networks using provenance. A unique characteristic of the proposed trust architecture presented here is the use of provenance through the path of the information from source to destination in determining the information trust. In this proposed architecture each node in the system has a trust and provenance vector. Each information item transmitted over the network has a trust value associated with it. Nodes reexamine and update the trust value associated with the information, creating a distributed system that is more flexible and more responsive. As our system allows reconfigurations, initiatives taken by the intermediate nodes such as replacement of untrusted nodes will enhance the network trust in mission critical situations faster than a centralized approach.
KW - Distributed Intelligence
KW - Information Networks
KW - Provenance
KW - Trust
UR - http://www.scopus.com/inward/record.url?scp=84856948688&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84856948688&partnerID=8YFLogxK
U2 - 10.1109/MILCOM.2011.6127517
DO - 10.1109/MILCOM.2011.6127517
M3 - Conference contribution
AN - SCOPUS:84856948688
SN - 9781467300810
T3 - Proceedings - IEEE Military Communications Conference MILCOM
SP - 1493
EP - 1498
BT - 2010 Military Communications Conference, MILCOM 2010
T2 - 2011 IEEE Military Communications Conference, MILCOM 2011
Y2 - 7 November 2011 through 10 November 2011
ER -