Academic
Publications
Secure Trust Management in Distributed Computing Systems

Secure Trust Management in Distributed Computing Systems,10.1109/DELTA.2011.29,Arijit Ukil

Secure Trust Management in Distributed Computing Systems   (Citations: 1)
BibTex | RIS | RefWorks Download
Modeling and computing trust in distributed computing systems like ad-hoc networks is very much challenging. Particularly in Wireless Sensor Networks (WSNs), where the network is formed and self-organized by relying on the almost strangers for reliable and normal operation, it is important to compute the trustworthiness of individual nodes in distributed manner. In order to find the trustworthiness of individual nodes, we propose a model that takes into consideration of various malicious behaviors of the nodes. The proposed trust and reputation model attempts to find answers to the inadequacy of the traditional authorization mechanisms to secure distributed systems. Our scheme explores the behavioral pattern of the malicious nodes or the attackers and quantifies those patterns to realize the secure trust management modeling. The proposed scheme presents secure trust and reputation modeling against selfish nodes, against malicious accuser nodes and attempts for conflict resolution. Efficacy of this model is shown through simulation results.
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...As stated above, conventional trust estimation methods determines trust based on the number of good and bad behavior of a node [5][6][7][8]...
    • ...In order to estimate trust value of a node, firstly confidence level is determined as follows [7]:...
    • ...So, node i and other nodes integrate all received confidence level for node j, as follows [7]:...
    • ...If some malicious node falsely accuses other legitimate node as selfish node, then accused node records it as follows[7]:...

    Farruh Ishmanovet al. A secure trust establishment in wireless sensor networks

Sort by: