Trustworthy wireless networks: Issues and applications

Kannan Govindan, Prasant Mohapatra, Tarek F. Abdelzaher

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Wireless networks are susceptible to various attacks due to their open nature of operations. Existing security mechanisms and systems are rarely robust under attacks, misoperation and internal faults. Most of the solutions are targeted to specific attacks and also works after detecting considerable damage and provides little protection if one or more components are compromised. These approaches are not sufficient for holistic and systemic security. In this paper we analyse a more systematic security approach by exploiting the fundamental relationships among the network components. We explore a concept called trust worthy network where nodes establishes relationships among themselves based on the mutual observations and interactions. These relationships will help to derive the level of security and trust to be possessed on the nodes and the message received from the nodes. We analyse in detail the various issues in constructing the trustworthy networks, impact of various network dynamics on the trust relationships and the applications of trust worthiness in assessing the information quality, to evict the misbehaving nodes and to provide other related security services.

Original languageEnglish (US)
Title of host publicationProceedings - 2010 International Symposium on Electronic System Design, ISED 2010
Pages253-258
Number of pages6
DOIs
StatePublished - 2010
Event2010 International Symposium on Electronic System Design, ISED 2010 - Bhubaneswar, India
Duration: Dec 20 2010Dec 22 2010

Publication series

NameProceedings - 2010 International Symposium on Electronic System Design, ISED 2010

Other

Other2010 International Symposium on Electronic System Design, ISED 2010
Country/TerritoryIndia
CityBhubaneswar
Period12/20/1012/22/10

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Trustworthy wireless networks: Issues and applications'. Together they form a unique fingerprint.

Cite this