290 research outputs found
Reliable and Efficient Way to Broadcast Messages in a Group by Trust-Based Broadcast (TBB) Scheme
Nowadays information systems are being shifted to distributed architectures, i.e. Grid and Peer-to-peer (P2P) models to obtain the benefits like scalability, autonomy, and fault-tolerance. We consider the P2P model as a fully distributed, scalable system, which is composed of peer processes (peers). Here, a group of multiple peers cooperate with each other. Peers have to efficiently and flexibly deliver messages to every peer of the group in P2P overlay networks. In order to efficiently and reliably broadcast messages in a scalable group, we take advantage of the multipoint relaying (MPR) mechanism. Here, each peer sends messages to only a subset of its acquaintances. However, if a peer which forwards messages to other peers is faulty, the peers cannot receive messages. In this paper, we newly discuss a trustworthiness-based broadcast (TBB) algorithm where only trustworthy peers forward messages. That is, untrustworthy peers are peers which cannot forward the messages due to some faults. Here, the transmission fault implied by faults of untrustworthy peers can be reduced. We evaluate the TBB algorithm in terms of the number of messages transmitted
Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments
AbstractIn a decentralised system like P2P where each individual peers are considerably autonomous, the notion of mutual trust between peers is critical. In addition, when the environment is subject to inherent resource constraints, any efficiency efforts are essentially needed. In light of these two issues, we propose a novel trustworthy-based efficient broadcast scheme in a resource-constrained P2P environment. The trustworthiness is associated with the peerʼs reputation. A peer holds a personalised view of reputation towards other peers in four categories namely SpEed, Correctness, qUality, and Risk-freE (SeCuRE). The value of each category constitutes a fraction of the reliability of individual peer. Another factor that contributes to the reliability of a peer is the peerʼs credibility concerning trustworthiness in providing recommendation about other peers. Our trust management scheme is applied in conjunction with our trust model in order to detect malicious and collaborative-based malicious peers. Knowledge of trustworthiness among peers is used in our proposed broadcast model named trustworthy-based estafet multi-point relays (TEMPR). This model is designed to minimise the communication overhead between peers while considering the trustworthiness of the peers such that only trustworthy peer may relay messages to other peers. With our approach, each peer is able to disseminate messages in the most efficient and reliable manner
Security Mechanisms in Unattended Wireless Sensor Networks
Wireless Sensor Networks (WSNs) consisting of a large number of sensor nodes
are being deployed in potentially hostile environments for applications such as
forest fire detection, battlefield surveillance, habitat monitoring, traffic management,
etc. One common assumption in traditional WSNs is that a trusted
third party, i.e., a sink, is assumed to be always available to collect sensed
data in a real time or near real time fashion. Although many WSNs operate
in such an on-site mode, there are WSN applications that do not fit into the
real time data collection mode. For example, data collection in Unattended
WSNs (UWSNs) relies on the periodical appearance of a mobile sink. As most
existing security solutions developed for traditional WSNs rely on the presence
of a trusted third party, it makes them not applicable to UWSNs directly. This
motivates the research on security mechanisms for UWSNs.
This dissertation contributes to security mechanisms in UWSNs from three
important aspects, as, confidentiality and reliability, trust management, and
capture resistance. The first aspect addresses data confidentiality and data
reliability in UWSNs. We propose a data distribution scheme to provide forward
secrecy, probabilistic backward secrecy and data reliability. Moreover,
we demonstrate that backward secrecy of the historical data can be achieved
through homomorphic encryption and key evolution. Furthermore, we propose
a constrained optimization algorithm to further improve the above two data
distribution schemes.
The second study introduces trust management in UWSNs. We propose a
set of efficient and robust trust management schemes for the case of UWSNs.
The Advanced Scheme utilizes distributed trust data storage to provide trust
data reliability and takes the advantages of both Geographic Hash Table
(GHT) and Greedy Perimeter Stateless Routing (GPSR) to find storage nodes
and to route trust data to them. In this way, it significantly reduces storage
cost caused by distributed trust data storage and provides resilience to node
compromise and node invalidation.
The third study investigates how to detect a captured node and to resist
node capture attack in UWSNs. We propose a node capture resistance and
key refreshing scheme for UWSNs based on the Chinese remainder theorem.
The scheme is able to provide forward secrecy, backward secrecy and collusion
resistance for diminishing the effects of capture attacks
- …