Evaluation of network trust using provenance based on distributed local intelligence

Gulustan Dogan, Theodore Brown, Kannan Govindan, Hasan Khan Mohammad Maifi, Tarek Abdelzaher, Prasant Mohapatra, Jin Hee Cho

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Provenance can play a significant role in a military information system for supporting the calculation of information trust. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. We introduce a node-level trust-enhancing mechanism for information networks using provenance. A unique characteristic of the proposed trust architecture presented here is the use of provenance through the path of the information from source to destination in determining the information trust. In this proposed architecture each node in the system has a trust and provenance vector. Each information item transmitted over the network has a trust value associated with it. Nodes reexamine and update the trust value associated with the information, creating a distributed system that is more flexible and more responsive. As our system allows reconfigurations, initiatives taken by the intermediate nodes such as replacement of untrusted nodes will enhance the network trust in mission critical situations faster than a centralized approach.

Original languageEnglish (US)
Title of host publication2010 Military Communications Conference, MILCOM 2010
Number of pages6
StatePublished - 2011
Event2011 IEEE Military Communications Conference, MILCOM 2011 - Baltimore, MD, United States
Duration: Nov 7 2011Nov 10 2011

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM


Other2011 IEEE Military Communications Conference, MILCOM 2011
Country/TerritoryUnited States
CityBaltimore, MD


  • Distributed Intelligence
  • Information Networks
  • Provenance
  • Trust

ASJC Scopus subject areas

  • Electrical and Electronic Engineering


Dive into the research topics of 'Evaluation of network trust using provenance based on distributed local intelligence'. Together they form a unique fingerprint.

Cite this