Browsing by Subject "trust management"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
Item ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine(IEEE, 2011-06-06) Li, Wenjia; Joshi, Anupam; Finin, TimMobile Ad-hoc NETworks (MANETs) are extremely susceptible to various misbehaviors and a variety of trust management schemes have been proposed to detect and mitigate them. Most schemes rely on a set of pre-defined weights to determine how the extent of each misbehavior is used to evaluate the trustworthiness. However, due to the extremely dynamic nature of MANETs, it is not possible to determine a set of weights that are appropriate for all contexts. In this paper, an Automated Trust Management (ATM) system is described for MANETs that uses a support vector machine classifier to detect malicious MANET nodes. The ATM scheme is resilient to attempts by a malicious MANET node to hide its nature by varying its misbehavior patterns over time. The performance of the ATM scheme is evaluated via an extensive simulation study and compared with existing approaches.Item Policy Expression and Enforcement for Handheld Devices(2003-05-30) Jansen, Wayne; Karygiannis, Tom; Korolev, Vlad; Gavrila, Serban; Iorga, MichaelaThe use of mobile handheld devices, such as Personal Digital Assistants (PDAs) and tablet computers, within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but instead have become indispensable tools that offer competitive business advantages for the mobile workforce. While providing productivity benefits, the ability of these devices to store and transmit corporate information through both wired and wireless networks poses potential risks to an organizations security. This paper describes a framework for managing user privileges on handheld devices. The approach is aimed at assisting enterprise security officers in administering and enforcing group and individual security policies for PDAs, and helping constrain users to comply automatically with their organizations security policy. Details of a proof-of-concept implementation of the framework are also provided.Item SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks(IEEE, 2011-11-01) Li, Wenjia; Joshi, Anupam; Finin, TimMobile Ad-hoc Networks (MANETs) are extremely vulnerable to a variety of misbehaviors because of their basic features, including lack of communication infrastructure, short transmission range, and dynamic network topology. To detect and mitigate those misbehaviors, many trust management schemes have been proposed for MANETs. Most rely on pre-defined weights to determine how each apparent misbehavior contributes to an overall measure of trustworthiness. The extremely dynamic nature of MANETs makes it difficult, however, to determine a set of weights that are appropriate for all contexts. We describe an automated trust management scheme for MANETs that uses machine learning to classify nodes as malicious. Our scheme is far more resilient to the context changes common in MANETs, such as those due to malicious nodes altering their misbehavior patterns over time or rapid changes in environmental factors, such as the motion speed and transmission range. We compare our scheme to existing approaches and present evaluation results obtained from simulation studies.Item A Security Architecture Based on Trust Management for Pervasive Computing Systems(2002-10-09) Kagal, Lalana; Undercoffer, Jeffrey; Perich, Filip; Joshi, Anupam; Finin, TimTraditionally, stand-alone computers and small networks rely on user authentication and access control to provide security. These physical methods use system-based controls to verify the identity of a person or process, explicitly enabling or restricting the ability to use, change, or view a computer resource. However, these strategies are inadequate for the increased flexibility that distributed networks such as the Internet and ubiquitous/pervasive computing environments require, as these systems lack central control and in addition, their users are not all predetermined. Users in pervasive environments expect to access locally hosted resources and services anytime and anywhere leading to serious security risks and access control problems. We propose a solution based on distributed trust management which involves developing a security policy, assigning credentials to entities, verifying that the credentials conform to the policy, delegating trust to third parties, revoking rights and reasoning about users' access rights. This paper presents an infrastructure that complements existing security features like Public Key Infrastructure (PKI) and Role Based Access Control with distributed trust management to provide a highly flexible mode of enforcing security in a pervasive computing environments.Item Security Policy Management for Handheld Devices(2003-06-30) Jensen, Wayne; Karygiannis, Tom; Iorga, Michaela; Gavrila, Serban; Korolev, VladimirThe adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new risks to existing enterprise computing resources. Therefore, organizations require new strategies to mitigate the security risks associated with the integration of wireless technologies into existing computing environments. In this paper, we describe a framework for managing user privileges on handheld devices. Our framework aims at assisting enterprise security officers in creating, distributing, and enforcing group and individual security policies for Personal Digital Assistants, and helping users to automatically comply with their organization’s security policy. Details of a proof-of-concept implementation of the framework are also provided