首页 > 最新文献

Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.最新文献

英文 中文
SECOVAL: the IEEE/CREATE-NET workshop on the value of security through collaboration SECOVAL:关于通过协作实现安全价值的IEEE/CREATE-NET研讨会
J. Seigneur, P. Cofta, S. Marsh
Security is usually centrally managed, for example in a form of policies duly executed by individual nodes. This workshop will cover the alternative trend of using collaboration and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (both local and acquired from other nodes) to make security-related decisions. For example, in reputationbased schemes, the reputation of a given node (and hence its security access rights) can be determined based on the recommendations of peer nodes.
安全性通常是集中管理的,例如以由各个节点适当执行的策略的形式。本次研讨会将讨论使用协作和信任来提供安全性的另一种趋势。节点可以使用特定的知识(本地的和从其他节点获得的)来做出与安全相关的决策,而不是集中管理的安全策略。例如,在基于声誉的方案中,可以根据对等节点的建议确定给定节点的声誉(以及它的安全访问权限)。
{"title":"SECOVAL: the IEEE/CREATE-NET workshop on the value of security through collaboration","authors":"J. Seigneur, P. Cofta, S. Marsh","doi":"10.1109/SECCMW.2005.1588294","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588294","url":null,"abstract":"Security is usually centrally managed, for example in a form of policies duly executed by individual nodes. This workshop will cover the alternative trend of using collaboration and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (both local and acquired from other nodes) to make security-related decisions. For example, in reputationbased schemes, the reputation of a given node (and hence its security access rights) can be determined based on the recommendations of peer nodes.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125216069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tailored trustworthiness estimations in peer-to-peer networks 点对点网络中定制的可信度估计
K. Ylitalo, S. Holtmanns
In peer-to-peer (P2P) communities, users make personal trust evaluations of each other based on their experiences and observations. The available information of the peer's past behavior, i.e. reputation, is often incomplete, the credibility of evaluations is a concern and the relevance of the available information varies. In this paper, we propose functions for producing tailored trustworthiness estimations in P2P communities based on the peers past behavior. The presented mechanism provides some flexibility on applying it in different kinds of P2P networks.
在P2P (peer-to-peer)社区中,用户根据自己的经验和观察对彼此进行个人信任评估。关于同伴过去行为的现有信息,即声誉,往往是不完整的,评价的可信度是一个问题,而且现有信息的相关性各不相同。在本文中,我们提出了基于对等体过去行为的P2P社区中定制可信度估计的函数。该机制为在不同类型的P2P网络中应用提供了一定的灵活性。
{"title":"Tailored trustworthiness estimations in peer-to-peer networks","authors":"K. Ylitalo, S. Holtmanns","doi":"10.1504/IJITST.2007.014836","DOIUrl":"https://doi.org/10.1504/IJITST.2007.014836","url":null,"abstract":"In peer-to-peer (P2P) communities, users make personal trust evaluations of each other based on their experiences and observations. The available information of the peer's past behavior, i.e. reputation, is often incomplete, the credibility of evaluations is a concern and the relevance of the available information varies. In this paper, we propose functions for producing tailored trustworthiness estimations in P2P communities based on the peers past behavior. The presented mechanism provides some flexibility on applying it in different kinds of P2P networks.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127986473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards evidence-based trust brokering 以证据为基础的信任中介
D. Huang, de Shane Bracher
In a global computing environment, trust management is important for entities to collaborate. Traditional access control methods cannot meet the needs of autonomous decision making with partial information. The SECURE project introduced a collaboration model using the combination of trust and risk models. This allows an entity to formulate trust according to its own observations and also by accepting recommendations from other entities. Evidence, which originates from other entities, must be gathered in a secure way to ensure that integrity is maintained. This paper introduces a trust broker model which describes how one entity can locate and retrieve evidence on another entity's historic behavior. This evidence-based trust brokering approach provides a basic model for secure evidence gathering and is appropriate for the global computing environment.
在全球计算环境中,信任管理对于实体协作非常重要。传统的访问控制方法不能满足部分信息自治决策的需要。SECURE项目引入了一个使用信任和风险模型组合的协作模型。这使得一个实体可以根据自己的观察和接受其他实体的建议来制定信任。来自其他实体的证据必须以安全的方式收集,以确保保持完整性。本文介绍了一个信任代理模型,该模型描述了一个实体如何定位和检索关于另一个实体历史行为的证据。这种基于证据的信任代理方法为安全证据收集提供了一个基本模型,适用于全球计算环境。
{"title":"Towards evidence-based trust brokering","authors":"D. Huang, de Shane Bracher","doi":"10.1109/SECCMW.2005.1588295","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588295","url":null,"abstract":"In a global computing environment, trust management is important for entities to collaborate. Traditional access control methods cannot meet the needs of autonomous decision making with partial information. The SECURE project introduced a collaboration model using the combination of trust and risk models. This allows an entity to formulate trust according to its own observations and also by accepting recommendations from other entities. Evidence, which originates from other entities, must be gathered in a secure way to ensure that integrity is maintained. This paper introduces a trust broker model which describes how one entity can locate and retrieve evidence on another entity's historic behavior. This evidence-based trust brokering approach provides a basic model for secure evidence gathering and is appropriate for the global computing environment.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132333493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Establishing agreements in dynamic virtual organizations 动态虚拟组织中协议的建立
T. Ryutov, C. Neuman, Li Zhou, N. Foukia
We present a framework that introduces key concepts relevant to agreement negotiation in virtual organizations (VO). The framework serves as a foundation for implementing an automated system that facilitates the establishment of VO agreements, considerably reduces the effort for setting up a VO and consequently reduces the VO's time for operation. The framework captures the relationship between the initial participants' behaviors, expectations, obligations and agreements, making sure that in implementing a system, one does not overlook the important aspects of the agreement structure and negotiation. The framework can be used to validate a negotiation, ensure validity of the achieved agreement and form strategies for future negotiations. A novel aspect of the initial trust establishment described in this paper is the consideration of the effects of the participants' behaviors during the negotiation process on mutual trust. We use the concepts to describe our work-in-progress for specification and negotiation of the agreements that govern the behavior of VO entities.
我们提出了一个框架,介绍了与虚拟组织(VO)中协议谈判相关的关键概念。该框架是实施自动化系统的基础,该系统有助于建立监督组织协议,大大减少设立监督组织的工作量,从而减少监督组织的运作时间。该框架捕捉了初始参与者的行为、期望、义务和协议之间的关系,确保在实施系统时不会忽视协议结构和谈判的重要方面。该框架可用于验证谈判,确保达成的协议的有效性,并为未来的谈判制定策略。本文描述的初始信任建立的一个新颖方面是考虑谈判过程中参与者的行为对相互信任的影响。我们使用这些概念来描述管理VO实体行为的协议的规范和协商的正在进行的工作。
{"title":"Establishing agreements in dynamic virtual organizations","authors":"T. Ryutov, C. Neuman, Li Zhou, N. Foukia","doi":"10.1109/SECCMW.2005.1588300","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588300","url":null,"abstract":"We present a framework that introduces key concepts relevant to agreement negotiation in virtual organizations (VO). The framework serves as a foundation for implementing an automated system that facilitates the establishment of VO agreements, considerably reduces the effort for setting up a VO and consequently reduces the VO's time for operation. The framework captures the relationship between the initial participants' behaviors, expectations, obligations and agreements, making sure that in implementing a system, one does not overlook the important aspects of the agreement structure and negotiation. The framework can be used to validate a negotiation, ensure validity of the achieved agreement and form strategies for future negotiations. A novel aspect of the initial trust establishment described in this paper is the consideration of the effects of the participants' behaviors during the negotiation process on mutual trust. We use the concepts to describe our work-in-progress for specification and negotiation of the agreements that govern the behavior of VO entities.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124802799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Social approaches to trust-building in Web technologies 在Web技术中建立信任的社会方法
F. Ulivieri
Trust is one of the most important elements in agents' relations: there is no cooperation (and ultimately no society) without this original core of trustworthiness towards a partner. In this article we focus on trust within technology-based environments, a subject which has been addressed by several disciplines and from several perspectives. Classical approaches to trust-building are presented here briefly: trust nourished by technological security; trust based on a rigid organization of cooperation; trust provided by a trusted third party and so on. We show that online trust or, more generally, trust in a technical environment, can only be nourished by approaches that are able to integrate cognitive and social elements in a strong way. More precisely, we propose a "paradigm shift" based on an extensive use of communality, reputation and over-help. We also suggest that it is important to study the role of familiarity and habit as one of the factors that could facilitate the presence of trust in a community of users.
信任是代理人关系中最重要的元素之一:没有对伙伴的信任这一原始核心,就没有合作(最终也没有社会)。在本文中,我们将重点关注基于技术的环境中的信任,这个主题已经被几个学科从几个角度解决了。本文简要介绍了建立信任的经典方法:技术安全滋养信任;信任建立在僵化的合作组织之上;由受信任的第三方提供的信任,等等。我们表明,在线信任,或者更一般地说,在技术环境中的信任,只能通过能够以强有力的方式整合认知和社会因素的方法来滋养。更准确地说,我们提出了一种基于广泛使用社区、声誉和过度帮助的“范式转变”。我们还建议,研究熟悉度和习惯作为促进用户社区信任存在的因素之一的作用是很重要的。
{"title":"Social approaches to trust-building in Web technologies","authors":"F. Ulivieri","doi":"10.1109/SECCMW.2005.1588296","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588296","url":null,"abstract":"Trust is one of the most important elements in agents' relations: there is no cooperation (and ultimately no society) without this original core of trustworthiness towards a partner. In this article we focus on trust within technology-based environments, a subject which has been addressed by several disciplines and from several perspectives. Classical approaches to trust-building are presented here briefly: trust nourished by technological security; trust based on a rigid organization of cooperation; trust provided by a trusted third party and so on. We show that online trust or, more generally, trust in a technical environment, can only be nourished by approaches that are able to integrate cognitive and social elements in a strong way. More precisely, we propose a \"paradigm shift\" based on an extensive use of communality, reputation and over-help. We also suggest that it is important to study the role of familiarity and habit as one of the factors that could facilitate the presence of trust in a community of users.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121317852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network forensics: towards a classification of traceback mechanisms 网络取证:回溯机制的分类
S. Mitropoulos, Dimitrios Patsos, Christos Douligeris
The traceback problem is one of the hardest in information security and has always been the utmost solution to holding attackers accountable for their actions. This paper presents a brief overview of the traceback problem, while discussing the features of software, network and computer forensics. In the rest of this paper, various traceback mechanisms are examined while categorized according to their features and modes of operation. Finally, we propose a classification schema for all traceback methods in order to assess and combine their benefits so as to provide enough information for digital forensics analyses, thus getting -the right way- one step closer to the actual attacker.
追溯问题是信息安全中最难的问题之一,并且一直是让攻击者对其行为负责的最佳解决方案。本文简要概述了追溯问题,同时讨论了软件、网络和计算机取证的特点。在本文的其余部分中,将根据其功能和操作模式对各种回溯机制进行分类,并对其进行检查。最后,我们提出了所有回溯方法的分类模式,以便评估和组合它们的优点,从而为数字取证分析提供足够的信息,从而以正确的方式更接近实际的攻击者。
{"title":"Network forensics: towards a classification of traceback mechanisms","authors":"S. Mitropoulos, Dimitrios Patsos, Christos Douligeris","doi":"10.1109/SECCMW.2005.1588288","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588288","url":null,"abstract":"The traceback problem is one of the hardest in information security and has always been the utmost solution to holding attackers accountable for their actions. This paper presents a brief overview of the traceback problem, while discussing the features of software, network and computer forensics. In the rest of this paper, various traceback mechanisms are examined while categorized according to their features and modes of operation. Finally, we propose a classification schema for all traceback methods in order to assess and combine their benefits so as to provide enough information for digital forensics analyses, thus getting -the right way- one step closer to the actual attacker.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126131592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Next generation communications and secure seamless handover 下一代通信和安全无缝切换
A. Prasad, A. Zugenmaier, P. Schoo
The next generation communications system will constitute of a heterogeneous access network technologies under a common IP layer. This next generation is often called beyond third generation, B3G. The heterogeneity present in these networks leads to security challenges not present in homogeneous networks. Besides the security issues there is also the issue of providing fast handover such that the user does not perceive any change in service quality or in other words seamless handover. In this paper, we will first define B3G systems and present some of the issues related to it. Next, we will propose approaches to secure and seamless handover in a B3G system.
下一代通信系统将由通用IP层下的异构接入网技术构成。下一代通常被称为超越第三代,即B3G。这些网络中存在的异构性导致了同质网络中不存在的安全挑战。除了安全问题之外,还有提供快速切换的问题,这样用户就不会感觉到服务质量的任何变化,换句话说,就是无缝切换。在本文中,我们将首先定义B3G系统,并提出与之相关的一些问题。接下来,我们将提出在B3G系统中实现安全无缝切换的方法。
{"title":"Next generation communications and secure seamless handover","authors":"A. Prasad, A. Zugenmaier, P. Schoo","doi":"10.1109/SECCMW.2005.1588321","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588321","url":null,"abstract":"The next generation communications system will constitute of a heterogeneous access network technologies under a common IP layer. This next generation is often called beyond third generation, B3G. The heterogeneity present in these networks leads to security challenges not present in homogeneous networks. Besides the security issues there is also the issue of providing fast handover such that the user does not perceive any change in service quality or in other words seamless handover. In this paper, we will first define B3G systems and present some of the issues related to it. Next, we will propose approaches to secure and seamless handover in a B3G system.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125571085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Full agreement in BAN kerberos 完全同意BAN kerberos
Aybek Mukhamedov
The paper analyzes BAN Kerberos - a timestamp based key distribution protocol with mutual agent authentication. The protocol is formalized in the strand spaces model and it is shown that BAN Kerberos guarantees the strongest form of authentication in Lowe's hierarchy of authentication specifications [Lowe, 1997] - full agreement on all data items.
本文分析了BAN Kerberos——一种基于时间戳的具有相互代理认证的密钥分发协议。该协议在链空间模型中形式化,并表明BAN Kerberos保证了Lowe的身份验证规范层次结构中最强的身份验证形式[Lowe, 1997] -所有数据项的完全一致。
{"title":"Full agreement in BAN kerberos","authors":"Aybek Mukhamedov","doi":"10.1109/SECCMW.2005.1588316","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588316","url":null,"abstract":"The paper analyzes BAN Kerberos - a timestamp based key distribution protocol with mutual agent authentication. The protocol is formalized in the strand spaces model and it is shown that BAN Kerberos guarantees the strongest form of authentication in Lowe's hierarchy of authentication specifications [Lowe, 1997] - full agreement on all data items.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"665 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114140958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A policy-based approach to wireless LAN security management 基于策略的无线局域网安全管理方法
G. Lapiotis, Byungsuk Kim, S. Das, F. Anjum
Wireless Ethernet (or Wi-Fi) security management is a challenging area of increased interest due to the widespread deployment of Wireless LANs (WLANs) and their well-known vulnerabilities to various types of attacks, as well as stringent scalability requirements in the dynamic wireless domain. Until the adoption of the latest security standards is complete, users and network assets on deployed WLANs, such as 802.11a/b/g networks, need to be protected from existing security threats without depending on the latest features. In addition, while new standards can protect the unauthorized use of network resource for outsiders, they do not deal with the misuse or misbehaviors by insiders. In this paper we present a hierarchically distributed policy-based system architecture and prototype implementation for WLAN security management. The architecture includes a central policy engine that validates policies and computes new configuration settings for network elements when access policies are violated, distributed wireless domain policy managers with consistent local policy autonomy that coordinate dedicated local monitors so as to monitor and control multi-vendor WLAN access points (APs). The local monitors include wireless intrusion detection modules and wireless AP interface adaptors. Although in this paper we focus on wireless security aspects, the overall architecture can be applied to end-to-end security management of wireline and wireless networks.
无线以太网(或Wi-Fi)安全管理是一个具有挑战性的领域,由于无线局域网(wlan)的广泛部署及其对各种类型攻击的众所周知的漏洞,以及动态无线领域中严格的可伸缩性要求,因此越来越引起人们的兴趣。在最新安全标准的采用完成之前,需要保护部署的wlan(如802.11a/b/g网络)上的用户和网络资产免受现有安全威胁,而不依赖于最新功能。此外,虽然新标准可以保护外部人员对网络资源的未经授权使用,但却不能处理内部人员的滥用或不当行为。本文提出了一种基于分层分布式策略的WLAN安全管理系统架构和原型实现。该体系结构包括一个中央策略引擎,该引擎在违反访问策略时验证策略并计算网络元素的新配置设置,分布式无线域策略管理器具有一致的本地策略自主权,可以协调专用的本地监视器,以便监视和控制多供应商WLAN接入点(ap)。本地监视器包括无线入侵检测模块和无线AP接口适配器。虽然本文的重点是无线安全方面,但整体架构可以应用于有线和无线网络的端到端安全管理。
{"title":"A policy-based approach to wireless LAN security management","authors":"G. Lapiotis, Byungsuk Kim, S. Das, F. Anjum","doi":"10.1109/SECCMW.2005.1588312","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588312","url":null,"abstract":"Wireless Ethernet (or Wi-Fi) security management is a challenging area of increased interest due to the widespread deployment of Wireless LANs (WLANs) and their well-known vulnerabilities to various types of attacks, as well as stringent scalability requirements in the dynamic wireless domain. Until the adoption of the latest security standards is complete, users and network assets on deployed WLANs, such as 802.11a/b/g networks, need to be protected from existing security threats without depending on the latest features. In addition, while new standards can protect the unauthorized use of network resource for outsiders, they do not deal with the misuse or misbehaviors by insiders. In this paper we present a hierarchically distributed policy-based system architecture and prototype implementation for WLAN security management. The architecture includes a central policy engine that validates policies and computes new configuration settings for network elements when access policies are violated, distributed wireless domain policy managers with consistent local policy autonomy that coordinate dedicated local monitors so as to monitor and control multi-vendor WLAN access points (APs). The local monitors include wireless intrusion detection modules and wireless AP interface adaptors. Although in this paper we focus on wireless security aspects, the overall architecture can be applied to end-to-end security management of wireline and wireless networks.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114447154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A security framework with trust management for sensor networks 基于信任管理的传感器网络安全框架
Zhiying Yao, Daeyoung Kim, Insun Lee, Kiyoung Kim, Jong-Su Jang
Wireless sensor networks are prone to security attacks, which are either common to conventional networks or unique for themselves due to the resource-constraint, susceptibility to physical capture, and wireless nature. Security solutions using crypto schemes are not enough, and sometimes not efficient. In this paper, we develop a security framework with trust management, i.e. establishment of trustworthy network environment, to secure sensor networks. For trust management, we explore a distributed trust model, enabling recommendation-based trust and trust-based recommendation, to build reasonable trust relationship among network entities, represented by numerical values, i.e. trust values. And our security framework fully relies on the values to execute security-related actions aiming at the tradeoff between security and network performance.
无线传感器网络容易受到安全攻击,由于资源限制、易受物理捕获和无线特性的影响,这些攻击要么是传统网络所共有的,要么是无线传感器网络所特有的。使用加密方案的安全解决方案是不够的,有时效率也不高。本文提出了一种基于信任管理的安全框架,即建立可信的网络环境,以保证传感器网络的安全。在信任管理方面,我们探索分布式信任模型,实现基于推荐的信任和基于信任的推荐,在网络实体之间建立合理的信任关系,用数值表示,即信任值。我们的安全框架完全依赖于这些值来执行与安全相关的操作,目的是在安全性和网络性能之间进行权衡。
{"title":"A security framework with trust management for sensor networks","authors":"Zhiying Yao, Daeyoung Kim, Insun Lee, Kiyoung Kim, Jong-Su Jang","doi":"10.1109/SECCMW.2005.1588313","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588313","url":null,"abstract":"Wireless sensor networks are prone to security attacks, which are either common to conventional networks or unique for themselves due to the resource-constraint, susceptibility to physical capture, and wireless nature. Security solutions using crypto schemes are not enough, and sometimes not efficient. In this paper, we develop a security framework with trust management, i.e. establishment of trustworthy network environment, to secure sensor networks. For trust management, we explore a distributed trust model, enabling recommendation-based trust and trust-based recommendation, to build reasonable trust relationship among network entities, represented by numerical values, i.e. trust values. And our security framework fully relies on the values to execute security-related actions aiming at the tradeoff between security and network performance.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115579630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
期刊
Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1