11,645 research outputs found
Location proof systems for smart internet of things:Requirements, taxonomy, and comparative analysis
MobChain:Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus
Smart devices have accentuated the importance of geolocation information. Geolocation identification using smart devices has paved the path for incentive-based location-based services (LBS). However, a user’s full control over a smart device can allow tampering of the location proof. Witness-oriented location proof systems (LPS) have emerged to resist the generation of false proofs and mitigate collusion attacks. However, witness-oriented LPS are still susceptible to three-way collusion attacks (involving the user, location authority, and the witness). To overcome the threat of three-way collusion in existing schemes, we introduce a decentralized consensus protocol called MobChain in this paper. In this scheme the selection of a witness and location authority is achieved through a distributed consensus of nodes in an underlying P2P network that establishes a private blockchain. The persistent provenance data over the blockchain provides strong security guarantees; as a result, the forging and manipulation of location becomes impractical. MobChain provides secure location provenance architecture, relying on decentralized decision making for the selection of participants of the protocol thereby addressing the three-way collusion problem. Our prototype implementation and comparison with the state-of-the-art solutions show that MobChain is computationally efficient and highly available while improving the security of LPS
Recommended from our members
Trust Management for P2P application in Delay Tolerant Mobile Ad-hoc Networks. An Investigation into the development of a Trust Management Framework for Peer to Peer File Sharing Applications in Delay Tolerant Disconnected Mobile Ad-hoc Networks.
Security is essential to communication between entities in the internet. Delay tolerant and disconnected Mobile Ad Hoc Networks (MANET) are a class of networks characterized by high end-to-end path latency and frequent end-to-end disconnections and are often termed as challenged networks. In these networks nodes are sparsely populated and without the existence of a central server, acquiring global information is difficult and impractical if not impossible and therefore traditional security schemes proposed for MANETs cannot be applied. This thesis reports trust management schemes for peer to peer (P2P) application in delay tolerant disconnected MANETs. Properties of a profile based file sharing application are analyzed and a framework for structured P2P overlay over delay tolerant disconnected MANETs is proposed. The framework is implemented and tested on J2ME based smart phones using Bluetooth communication protocol. A light weight Content Driven Data Propagation Protocol (CDDPP) for content based data delivery in MANETs is presented. The CDDPP implements a user profile based content driven P2P file sharing application in disconnected MANETs. The CDDPP protocol is further enhanced by proposing an adaptive opportunistic multihop content based routing protocol (ORP). ORP protocol considers the store-carry-forward paradigm for multi-hop packet delivery in delay tolerant MANETs and allows multi-casting to selected number of nodes. Performance of ORP is compared with a similar autonomous gossiping (A/G) protocol using simulations. This work also presents a framework for trust management based on dynamicity aware graph re-labelling system (DA-GRS) for trust management in mobile P2P applications. The DA-GRS uses a distributed algorithm to identify trustworthy nodes and generate trustable groups while isolating misleading or untrustworthy nodes. Several simulations in various environment settings show the effectiveness of the proposed framework in creating trust based communities. This work also extends the FIRE distributed trust model for MANET applications by incorporating witness based interactions for acquiring trust ratings. A witness graph building mechanism in FIRE+ is provided with several trust building policies to identify malicious nodes and detect collusive behaviour in nodes. This technique not only allows trust computation based on witness trust ratings but also provides protection against a collusion attack. Finally, M-trust, a light weight trust management scheme based on FIRE+ trust model is presented
Postwar Sierra Leone : are programs of reconstruction addressing the causes of war?
This multilayered study is an appraisal of some of the ongoing post-conflict reconstruction efforts in Sierra Leone in light of the causes of the conflict, which lasted from 1991-2002. It begins by providing a critical examination of the historical antecedents leading up to the war. The problems of colonialism which brought together different nationalities under one political umbrella by force of arm, along with other motley of issues such as corrupt leadership and inter-ethnic violence led to the outbreak of war in 1991. Although different studies have discussed these factors, very few, if any, have tried to make a connection between causation and reconstruction with a view to find a lasting peace. The aim of the study, therefore, is to appraise the ongoing post-conflict reconstruction efforts in Sierra Leone in light of the causes of the conflict. No lasting peace will be achieved unless there are practical steps addressing the very structures that brought about the war. A central focus is to gain some insights on the successes and failures of the ongoing reconstruction programs. The findings of the study conclude that the post-conflict reconstruction efforts in Sierra Leone have been moderately successful at best. If basic needs such as educational and health care reform, as well as employment opportunities for youth are not met, Sierra Leone will continue to carry a cloud where conditions are still ripe for conflict
Systemic Corruption in an Advanced Welfare State: Lessons from the Québec Charbonneau Inquiry
The Quiet Revolution in the 1960s propelled the province of Québec onto the path of greater social justice and better government. But as the evidence exposed at the Charbonneau inquiry makes clear, this did not make systemic corruption disappear from the construction sector. Rather, it adapted to its new institutional environment and was significantly shaped by the incentives structure it provided. The patterns of corruption emerging from the Charbonneau inquiry bear the imprint of the so-called “Québec model” inherited from the Quiet Revolution in at least three ways: (i) in the economic nationalism that made public policies partial towards French-speaking and Québec-based businesses, notably in the engineering sector, with major firms like SNC-Lavalin using their dominant position as “national champions” to engage in cartel-like practices to raise the price of construction projects; (ii) in the Jacobinism that strongly centralized power at the provincial level and left municipalities underdeveloped in terms of bureaucratic capacity, thus making them easy prey for corrupted interests, and (iii) in the sovereignist/federalist cleavage that, since the 1970s, has made Québec businesses dependent on the Liberal Party for political stability and has allowed party operators to extract a rent from businesses in return
Trust-based social mechanism to counter deceptive behaviour
The actions of an autonomous agent are driven by its individual goals and its knowledge and beliefs about its environment. As agents can be assumed to be selfinterested, they strive to achieve their own interests and therefore their behaviour can sometimes be difficult to predict. However, some behaviour trends can be observed and used to predict the future behaviour of agents, based on their past behaviour. This is useful for agents to minimise the uncertainty of interactions and ensure more successful transactions. Furthermore, uncertainty can originate from malicious behaviour, in the form of collusion, for example. Agents need to be able to cope with this to maximise their benefits and reduce poor interactions with collusive agents. This thesis provides a mechanism to support countering deceptive behaviour by enabling agents to model their agent environment, as well as their trust in the agents they interact with, while using the data they already gather during routine agent interactions. As agents interact with one another to achieve the goals they cannot achieve alone, they gather information for modelling the trust and reputation of interaction partners. The main aim of our trust and reputation model is to enable agents to select the most trustworthy partners to ensure successful transactions, while gathering a rich set of interaction and recommendation information. This rich set of information can be used for modelling the agents' social networks. Decentralised systems allow agents to control and manage their own actions, but this suffers from limiting the agents' view to only local interactions. However, the representation of the social networks helps extend an agent's view and thus extract valuable information from its environment. This thesis presents how agents can build such a model of their agent networks and use it to extract information for analysis on the issue of collusion detection.EThOS - Electronic Theses Online ServiceUniversity of Warwick. Dept. of Computer ScienceGBUnited Kingdo
- …