TY - GEN
T1 - Trustworthy wireless networks
T2 - 2010 International Symposium on Electronic System Design, ISED 2010
AU - Govindan, Kannan
AU - Mohapatra, Prasant
AU - Abdelzaher, Tarek F.
PY - 2010
Y1 - 2010
N2 - Wireless networks are susceptible to various attacks due to their open nature of operations. Existing security mechanisms and systems are rarely robust under attacks, misoperation and internal faults. Most of the solutions are targeted to specific attacks and also works after detecting considerable damage and provides little protection if one or more components are compromised. These approaches are not sufficient for holistic and systemic security. In this paper we analyse a more systematic security approach by exploiting the fundamental relationships among the network components. We explore a concept called trust worthy network where nodes establishes relationships among themselves based on the mutual observations and interactions. These relationships will help to derive the level of security and trust to be possessed on the nodes and the message received from the nodes. We analyse in detail the various issues in constructing the trustworthy networks, impact of various network dynamics on the trust relationships and the applications of trust worthiness in assessing the information quality, to evict the misbehaving nodes and to provide other related security services.
AB - Wireless networks are susceptible to various attacks due to their open nature of operations. Existing security mechanisms and systems are rarely robust under attacks, misoperation and internal faults. Most of the solutions are targeted to specific attacks and also works after detecting considerable damage and provides little protection if one or more components are compromised. These approaches are not sufficient for holistic and systemic security. In this paper we analyse a more systematic security approach by exploiting the fundamental relationships among the network components. We explore a concept called trust worthy network where nodes establishes relationships among themselves based on the mutual observations and interactions. These relationships will help to derive the level of security and trust to be possessed on the nodes and the message received from the nodes. We analyse in detail the various issues in constructing the trustworthy networks, impact of various network dynamics on the trust relationships and the applications of trust worthiness in assessing the information quality, to evict the misbehaving nodes and to provide other related security services.
UR - http://www.scopus.com/inward/record.url?scp=79952543237&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79952543237&partnerID=8YFLogxK
U2 - 10.1109/ISED.2010.55
DO - 10.1109/ISED.2010.55
M3 - Conference contribution
AN - SCOPUS:79952543237
SN - 9780769542942
T3 - Proceedings - 2010 International Symposium on Electronic System Design, ISED 2010
SP - 253
EP - 258
BT - Proceedings - 2010 International Symposium on Electronic System Design, ISED 2010
Y2 - 20 December 2010 through 22 December 2010
ER -