A trust-based security enforcement in disruption-tolerant networks
Title | A trust-based security enforcement in disruption-tolerant networks |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Oleshchuk, V. |
Conference Name | 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) |
Publisher | IEEE |
ISBN Number | 978-1-5386-0697-1 |
Keywords | attribute-based access control, authentication, authorisation, central trusted entity, centralised trusted authorities, composability, compositionality, Computational Intelligence, cryptography, delay tolerant networks, Delay-tolerant networks, delays, disruption- and delay-tolerant networks, disruption-tolerant networks, DTN, high packet drop rates, long delays, Medical services, mobile computing, network participants, Peer-to-peer computing, privacy, pubcrawl, Routing protocols, security, security credentials, security enforcement, security of data, subjective logic, telecommunication security, trust model, trust-based security enforcement, Trusted Computing, Uncertainty, web of trust |
Abstract | We propose an approach to enforce security in disruption- and delay-tolerant networks (DTNs) where long delays, high packet drop rates, unavailability of central trusted entity etc. make traditional approaches unfeasible. We use trust model based on subjective logic to continuously evaluate trustworthiness of security credentials issued in distributed manner by network participants to deal with absence of centralised trusted authorities. |
URL | https://ieeexplore.ieee.org/document/8095134/ |
DOI | 10.1109/IDAACS.2017.8095134 |
Citation Key | oleshchuk_trust-based_2017 |
- security enforcement
- mobile computing
- network participants
- Peer-to-peer computing
- privacy
- pubcrawl
- Routing protocols
- security
- security credentials
- Medical services
- security of data
- subjective logic
- telecommunication security
- trust model
- trust-based security enforcement
- Trusted Computing
- uncertainty
- web of trust
- delay tolerant networks
- authentication
- authorisation
- central trusted entity
- centralised trusted authorities
- composability
- Compositionality
- computational intelligence
- Cryptography
- attribute-based access control
- Delay-tolerant networks
- delays
- disruption- and delay-tolerant networks
- disruption-tolerant networks
- DTN
- high packet drop rates
- long delays