Trust and Reputation Management in Distributed Systems
|
|
|
- Geoffrey Franklin
- 10 years ago
- Views:
Transcription
1 Trust and Reputation Management in Distributed Systems Máster en Investigación en Informática Facultad de Informática Universidad Complutense de Madrid Félix Gómez Mármol, Alemania Madrid 29 de abril de 2013
2 Agenda Introduction & General Overview Application Scenarios Generic Steps Security Threats Models Comparison TRMSim-WSN Conclusions Page 2
3 INTRODUCTION & GENERAL OVERVIEW Page 3
4 Introduction & General Overview Internet and WWW have changed our lives Despite their several advantages, there are also many security risks Traditional security solutions are very effective but not always applicable Trust and reputation management has been proposed as an accurate alternative Oneself can make his/her own opinion about how trustworthy or reputable another member of the community is Increases the probability of a successful transaction while reducing the opportunities of being defrauded Page 4
5 APPLICATION SCENARIOS Page 5
6 Application Scenarios (I) P2P networks Wireless sensor networks (WSN) Searching a generic service Measuring temperature Sharing a file Measuring humidity Measuring pressure Detecting presence Vehicular Ad-hoc Networks (VANETs) Emergency messages transmission Traffic conditions Weather conditions Advertisements Identity Management Systems Sharing users attributes Identity federation management Page 6
7 Application Scenarios (II) Collaborative Intrusion Detection Networks (CIDN) Trust level on generated alarms Bootstrapping reputation for newcomers Cloud Computing Most trustworthy service selection Trust-based cloud services orchestration Tenants trustworthiness Internet of Things (IoT) Similar to wireless sensor networks Trustworthy information Trustworthy services Application Stores Trustworthy applications Trustworthy developers Page 7
8 GENERIC STEPS Page 8
9 Generic Steps (I) Generic steps Generic interfaces IETF Repute Generic Data Structures OASIS Open Reputation Management Systems (ORMS) Page 9
10 Generic Steps (II) 10 design advices 1) Anonymous recommendations 2) Higher weight to more recent transactions 3) Recommendations subjectivity 4) Redemption of past malicious entities 5) Opportunity to participate for benevolent newcomers 6) Avoid abuse of a high achieved reputation 7) Benevolent nodes should have more opportunities than newcomers 8) Different trust/reputation scores for different services 9) Take into account bandwidth, energy consumption, scalability... 10) Consider the importance or associated risk of a transaction Page 10
11 SECURITY THREATS Page 11
12 Security Threats (I) Individual malicious nodes Malicious nodes always provide a bad service Their reputation decreases and hence are not selected Malicious collectives Malicious nodes always provide a bad service Malicious nodes collude to unfairly provide high ratings about each other Their reputation decreases and hence are not selected Recommendations reliability should be handled Malicious collectives with camouflage Malicious nodes provide a bad service p% of the times Malicious nodes collude to unfairly provide high ratings about each other Their reputation decreases and hence are not selected Recommendations reliability should be handled Store transactions history Malicious spies Malicious nodes always provide a bad service Malicious nodes collude to unfairly provide high ratings about each other Malicious spies provide good services but positive recommendations about malicious nodes too Their reputation decreases and hence are not selected Recommendations reliability should be handled Not always considered as a threat Depends on behavioral pattern Page 12
13 Security Threats (II) Sybil attack Attacker creates a disproportionate number of malicious nodes Malicious nodes always provide a bad service When reputation decreases, node leaves and enters again the network with a different identity Associate some cost to new identities generation Driving down benevolent nodes reputation Malicious nodes always provide a bad service Malicious nodes collude to unfairly provide high ratings about each other They also provide bad recommendations about benevolent nodes Recommendations reliability should be handled Partially malicious collusion Malicious nodes always provide a bad service A node can be malicious for a given service but, benevolent for a different one Malicious nodes collude and rate positively each Malicious pre-trusted nodes Malicious nodes always provide a bad service Pre-trusted nodes provide positive recommendations about malicious nodes and negative ones about benevolent nodes other Dynamic selection of pre-trusted nodes Different reputation values for different services Page 13
14 Security Threats (III) Security threats taxonomy Attack intent Targets Required knowledge Cost Algorithm dependence Detectability Page 14
15 MODELS COMPARISON Page 15
16 Models Comparison (I) Lack of mature bio-inspired and fuzzy approaches Lack of standard APIs and data structures Lack of security threats analysis Lack of generic testing tools Page 16
17 Models Comparison (II) Page 17
18 TRMSIM-WSN Page 18
19 TRMSim-WSN Page 19
20 DYNAMICALLY ADAPTABLE REPUTATION SYSTEMS Page 20
21 Dynamically adaptable Reputation Systems (I) The perfect reputation model does not exist There is not a computation engine suitable for all conditions Performance also depends on the scenario System conditions can vary along the time The reputation model performance depends on the applied scenario and current system conditions Page 21
22 Dynamically adaptable Reputation Systems (II) Dynamic & Smart Reputation Engine Selector (I) Method to dynamically and smartly select the most appropriate reputation computation engine According to the current system conditions and the expected performance measurements The system selects the most suitable reputation engine at each moment Page 22
23 Dynamically adaptable Reputation Systems (III) Dynamic & Smart Reputation Engine Selector (II) Instead of developing one single parametrizable model, several models are developed Each model has the best performance under certain well defined circumstances or conditions The system administrator indicates which performance metrics are more relevant at each moment Model accuracy Scalability Robustness Resilience against attacks The dynamic & smart reputation engine selector chooses at each moment the reputation engine that better satisfies the performance metrics indicated by the system administrator, taking into account at the same time, the current system conditions (CPU usage, storage usage, etc) Page 23
24 Dynamically adaptable Reputation Systems (IV) Dynamic & Smart Reputation Engine Selector (III) The selector makes use of fuzzy sets to categorize current system conditions and performance metrics number_of_users=low user_participation=medium etc Then, it determines the suitability of each computation engine as a value which gives the probability of use such reputation engine Finally, a probabilistic choice is performed to determine the Reputation Computation Engine to use Reputation Computation Engine Page 24
25 Dynamically adaptable Reputation Systems (V) Dynamic & Smart Reputation Engine Selector (IV) Let Let be the current system conditions be the performance measurements Each and are represented as fuzzy sets Let be the performance metrics set by the administrator Let be the -th computation engine and the probability of selecting as the current computation engine Let be the performance metrics of under certain system conditions Then we have *MSE: Mean Squared Error Page 25
26 Dynamically adaptable Reputation Systems (VI) Dynamic & Smart Reputation Engine Selector (V) The process would be as follows With Evaluating continuously would be very costly and resources consuming That is the reason why we use fuzzy sets to represent Page 26
27 Dynamically adaptable Reputation Systems (VII) Smooth transition between different reputation computation engines (I) When switching to the selected best fitting computation engine it might happen that the computed reputation scores differ too much from the ones obtained with the previous computation engine We want to avoid an abrupt change in the computed reputation score Page 27
28 Dynamically adaptable Reputation Systems (VIII) Smooth transition between different reputation computation engines (II) We propose a smooth transition between the old computation engine and the new one For a while, both reputation values are taken into account To do so, we weight the reputation scores given by both computation engines Weights time as decreases during the transition increases, fulfilling that Page 28
29 Dynamically adaptable Reputation Systems (IX) Integration tests within identity management systems Developed four different trust and reputation models Several simulations performed to analyze the behavior within IdM systems Analyzed these four models according to different system conditions and performance measurements Page 29
30 Dynamically adaptable Reputation Systems (X) Advantages and Limitations Advantages Flexible mechanism to select the most appropriate trust and reputation model to apply at each moment considering both the system conditions and the performance measurements Resources consumption adaptation and optimization by applying the most suitable trust and reputation model at each moment Limitations Reputation computation engines should be developed and analyzed beforehand in order to determine under which conditions they provide the best outcomes for each of the desired performance measurements. Improvement and optimization of the performance of the trust and reputation management model applied at each moment Page 30
31 CONCLUSIONS Page 31
32 Conclusions Current challenges o Many authors focus on the scoring and ranking step, neglecting the other ones o Reputation bootstrapping is also a commonly obviated issue o Security threats and design recommendations are also usually not considered o Weak support from the standardization community OASIS ORMS (Open Reputation Management Systems) IETF Reputation Services (Repute) Page 32
33 BIBLIOGRAPHY Page 33
34 Bibliography (I) OASIS ORMS (Open Reputation Management Systems) Kevin Hoffman, David Zage, Cristina Nita-Rotaru, A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, 42 (1), 2009 Audun Josang, Roslan Ismail, Colin Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, 43 (2), , 2007 M. Carmen Fernandez-Gago, Rodrigo Roman, Javier Lopez, A survey on the applicability of trust management systems for wireless sensor networks, In International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pages 25-30, 2007 Yan Sun, Zhu Han, K.J.R. Liu, Defense of trust management vulnerabilities in distributed networks, IEEE Communications Magazine, 46 (2), , 2008 Yan Sun Yafei Yang, Trust Establishment in Distributed Networks: Analysis and Modeling, In Proceedings of the IEEE International Conference on Communications (IEEE ICC 2007), Glasgow, Scotland, 2007 Shyong K. Lam, John Riedl, Shilling recommender systems for fun and profit, In Proceedings of the 13th international conference on World Wide Web, pages , New York, 2004 Sepandar D. Kamvar, Mario T. Schlosser, Héctor Garcia-Molina, The EigenTrust Algorithm for Reputation Management in P2P Networks, In Proc. of the International World Wide Web Conference (WWW), Budapest, Hungary, 2003 Page 34
35 Bibliography (II) Li Xiong, Ling Liu, PeerTrust: Supporting Reputation-Based Trust in Peer-to-Peer Communities, IEEE Transactions on Knowledge and Data Engineering, 16 (7), , 2004 Runfang Zhou, Kai Hwang, PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing, Transactions on Parallel and Distributed Systems, 18 (4), , 2007 Félix Gómez Mármol, Gregorio Martínez Pérez, Security Threats Scenarios in Trust and Reputation Models for Distributed Systems, Computers & Security, 28 (7), , 2009 Félix Gómez Mármol, Gregorio Martínez Pérez, Towards Pre-Standardization of Trust and Reputation Models for Distributed and Heterogeneous Systems, Computer Standards & Interfaces, 32 (4), , 2010 Félix Gómez Mármol, Gregorio Martínez Pérez, Trust and Reputation Models Comparison, Emerald Internet Research, 21 (2), , 2011 Félix Gómez Mármol, Gregorio Martínez Pérez, TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks, IEEE International Conference on Communications (IEEE ICC 2009), Dresden, Germany, 2009 IETF Reputation Services (Repute) Page 35
On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems
On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems Ginés Dólera Tormo Security Group NEC Laboratories Europe Email: [email protected]
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System Gayatri Swamynathan, Ben Y. Zhao and Kevin C. Almeroth Department of Computer Science, UC Santa Barbara {gayatri, ravenben, almeroth}@cs.ucsb.edu
ONLINE REPUTATION SYSTEMS
ONLINE REPUTATION SYSTEMS YUYE WANG 1 CPSC 557: Sensitive Information in a Wired World Professor: Joan Feigenbaum Date: 12 Nov, 2013 Identity Reput ation Trust 2 TRUST SYSTEM Trust system, guide people
SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS
SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Kokilavani.V Mother Teresa College Of Engineering And Technology,Pudhukottai Abstract Network security involves the authorization of access
Simulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma [email protected] CpE 6510 3/24/2016
On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma [email protected] CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT
Costs and Benefits of Reputation Management Systems
Costs and Benefits of Reputation Management Systems Roberto G. Cascella University of Trento Dipartimento di Ingegneria e Scienza dell Informazione Via Sommarive 14, I-381 Povo (TN), Italy [email protected]
Dynamic Trust Management for the Internet of Things Applications
Dynamic Trust Management for the Internet of Things Applications Fenye Bao and Ing-Ray Chen Department of Computer Science, Virginia Tech Self-IoT 2012 1 Sept. 17, 2012, San Jose, CA, USA Contents Introduction
Author. Ginés Dólera Tormo. Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe) Prof. Dr. Gregorio Martínez Pérez (University of Murcia)
Systems with Faculty of Computer Science ENHANCING USER CENTRIC IDENTITY MANAGEMENT SYSTEMS WITH REPUTATION MODELS IN DISTRIBUTED ENVIRONMENTS Author Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe)
A Survey of Attack and Defense Techniques for Reputation Systems
A Survey of Attack and Defense Techniques for Reputation Systems KEVIN HOFFMAN Purdue University DAVID ZAGE Purdue University CRISTINA NITA-ROTARU Purdue University Reputation systems provide mechanisms
Towards an On board Personal Data Mining Framework For P4 Medicine
Towards an On board Personal Data Mining Framework For P4 Medicine Dr. Mohamed Boukhebouze Deputy Department Manager, CETIC European Data Forum 2015, November 16 17 Luxembourg Centre d Excellence en Technologiesde
Research on Trust Management Strategies in Cloud Computing Environment
Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING
WWRF Cloud Implications to Security, Privacy, and Trust
ITU-T Workshop on Addressing security challenges on a global scale 06.+07.12.2010, Geneva WWRF Cloud Implications to Security, Privacy, and Trust Mario Hoffmann Chair WWRF Working Group 7 Security & Trust
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
R-Chain: A Self-Maintained Reputation Management System in P2P Networks Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasgupta Dept. of Computer Science & Engineering Arizona State University Tempe, AZ
A Survey of Attack and Defense Techniques for Reputation Systems
A Survey of Attack and Defense Techniques for Reputation Systems Kevin Hoffman, David Zage, and Cristina Nita-Rotaru Department of Computer Science and CERIAS, Purdue University 305 N. University St.,
A Reputation Management System in Structured Peer-to-Peer Networks
A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of
Trust as a Service: A Framework for Trust Management in Cloud Environments
Trust as a Service: A Framework for Trust Management in Cloud Environments Talal H. Noor and Quan Z. Sheng School of Computer Science, The University of Adelaide, Adelaide SA 5005, Australia {talal,qsheng}@cs.adelaide.edu.au
Research Article AuthenticPeer: A Reputation Management System for Peer-to-Peer Wireless Sensor Networks
International Journal of Distributed Sensor Networks Volume 215, Article ID 637831, 11 pages http://dx.doi.org/1.1155/215/637831 Research Article : A Reputation Management System for Peer-to-Peer Wireless
A reputation-based trust management in peer-to-peer network systems
A reputation-based trust management in peer-to-peer network systems Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai Department of Computer Science Iowa State University Ames, Iowa 50011 USA {
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,
A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems
A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba University of Waterloo, Waterloo, Canada {lmekouar, iraqi, rboutaba}@bbcr.uwaterloo.ca
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
Reputation Management in P2P Networks: The EigenTrust Algorithm
Reputation Management in P2P Networks: The EigenTrust Algorithm by Adrian Alexa supervised by Anja Theobald 1 Introduction Peer-to-Peer networks is a fast developing branch of Computer Science and many
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
ASecure Hybrid Reputation Management System for Super-Peer Networks
ASecure Hybrid Reputation Management System for Super-Peer Networks Ghassan Karame Department of Computer Science ETH Zürich 892 Zürich, Switzerland karameg@infethzch Ioannis T Christou Athens Information
Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems
Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems Fenye Bao, Ing-Ray Chen, and Jia Guo Department of Computer Science Virginia Tech {baofenye,
An Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, [email protected]
Access Control And Intrusion Detection For Security In Wireless Sensor Network
Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.
An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System
An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System Takuya Nishikawa and Satoshi Fujita Department of Information Engineering, Hiroshima University Kagamiyama 1-4-1, Higashi-Hiroshima,
About the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
Reputation Management Algorithms & Testing. Andrew G. West November 3, 2008
Reputation Management Algorithms & Testing Andrew G. West November 3, 2008 EigenTrust EigenTrust (Hector Garcia-molina, et. al) A normalized vector-matrix multiply based method to aggregate trust such
Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5
Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study
Characteristic-Based Security Analysis of Personal Networks
Characteristic-Based Security Analysis of Personal Networks Andrew J. Paverd Department of Computer Science University of Oxford [email protected] Fadi El-Moussa BT Research BT Technology, Service
PROFESSIONAL INTERESTS WORK EXPERIENCE GINÉS DÓLERA TORMO CURRICULUM VITAE OCTOBER 2014
Ginés Dólera Tormo Phone: +49 176 90775273 E-mail: [email protected] Date of birth: 21 July, 1985 Nationality: Spanish Address: Dossenheimer Landsrtrasse 100 D-69121 Heidelberg, Germany PROFESSIONAL INTERESTS
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
SECURE ROUTING PATH USING TRUST VALUES FOR WIRELESS SENSOR NETWORKS
SECURE ROUTING PATH USING TRUST VALUES FOR WIRELESS SENSOR NETWORKS Dr.S.Rajaram 1, A. Babu Karuppiah 2, K. Vinoth Kumar 3 Department of ECE, Velammal College of Engineering and Technology ABSTRACT Traditional
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Maximum Likelihood Estimation of Peers Performance in P2P Networks
Maximum Likelihood Estimation of Peers Performance in P2P Networks Zoran Despotovic, Karl Aberer EPFL - Swiss Federal Institute of Technology Lausanne, Switzerland email:{zoran.despotovic, karl.aberer}@epfl.ch
NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT
NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT 1 MOHD NAZRI ISMAIL, 2 ABDULLAH MOHD ZIN 1 Faculty of MIIT, University of Kuala Lumpur (UniKL), Malaysia 2 Faculty of FTSM, University
Network security and privacy
Summer semester 2013 Seminar on Network security and privacy (selected topics) Prof. Dr. Dieter Hogrefe Sviatoslav Edelev Maimun Rizal Hang Zhang 19.04.2013 1 Course Overview Prerequisites (Recommended):
DDS-Enabled Cloud Management Support for Fast Task Offloading
DDS-Enabled Cloud Management Support for Fast Task Offloading IEEE ISCC 2012, Cappadocia Turkey Antonio Corradi 1 Luca Foschini 1 Javier Povedano-Molina 2 Juan M. Lopez-Soler 2 1 Dipartimento di Elettronica,
Comparison of Trust Values using Triangular and Gaussian Fuzzy Membership Functions for Infrastructure as a Service
Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC Comparison of Trust Values using Triangular and Gaussian Fuzzy Membership Functions for Infrastructure as a Service A. Supriya
Robust Routing in Wireless Ad Hoc Networks
Robust Routing in Wireless Ad Hoc Networks Seungjoon Lee, Bohyung Han, Minho Shin {slee, bhhan, mhshin}@cs.umd.edu Computer Science Department University of Maryland College Park, MD 2742 USA Abstract
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
Hedaquin: A reputation-based health data quality indicator
STM 2007 Hedaquin: A reputation-based health data quality indicator Ton van Deursen a,b, Paul Koster a, Milan Petković a a Philips Research Eindhoven, The Netherlands b Université du Luxembourg, Luxembourg
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
A Reputation-Based Trust Management System for P2P Networks
A Reputation-Based Trust Management System for P2P Networks Ali Aydın Selçuk Ersin Uzun Mark Reşat Pariente Department of Computer Engineering Bilkent University Ankara, 68, Turkey E-mail: [email protected],
Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
