On securing open networks through trust and reputation-architecture, challenges and solutions
スポンサーリンク
概要
- 論文の詳細を見る
The traditional approach of providing network security has been to borrow tools from cryptography and authentication. With the Internet growing into highly decentralized and self-organizing networks, the open and anonymous nature of these networks makes them vulnerable to attacks from malicious and self-interested peers. So, we argue that the conventional view of security based on cryptography alone is not sufficient for those open networks. One way to minimize threats in such networks is to build reputation-based trust mechanisms to assess the trustworthiness of peers. But, in this research filed, there is still lack of comprehensive reputation and trust architecture, and exists a great deal of conflicting challenges. In this paper, we identify five important attributes of an elemental trust relation, provide comprehensive understanding of reputation-based trust architecture which includes three basic components, and introduce the corresponding requirements and research challenges in each component. Finally, the novel research that considers trust and reputation systems as complex social networks is provided. The goal of this paper is to provide abundant problems to triggers more discussion on relatively new area of soft security with trust and reputation systems.
- 社団法人電子情報通信学会の論文
- 2006-11-03
著者
-
Wang Yufeng
Information Technology And Security Group Department Of Computer Science And Communication Engineeri
-
Sakurai Kouichi
Kyushu Univ. Fukuoka‐shi Jpn
-
Hori Yoshiaki
Dept. Of Computer Science And Communication Engineering Kyushu University
-
Sakurai Kouichi
Information Technology And Security Group Department Of Computer Science And Communication Engineeri
-
Hori Yoshiaki
Information Technology and Security Group, Department of Computer Science and Communication Engineer
-
Hori Yoshiaki
Information Technology And Security Group Department Of Computer Science And Communication Engineeri
関連論文
- ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- A New Secret Sharing Scheme Based on the Multi-Dealer
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- Reliable Key Distribution Scheme for Lossy Channels
- On Effectiveness of Clock Control in Stream Ciphers(Information Theory and Its Applications)
- Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers(Cryptography and Information Security, Information Theory and Its Applications)
- ESS-FH : Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- An Enhanced Security Protocol for Fast Mobile IPv6
- A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
- Modeling Security Bridge Certificate Authority Architecture
- An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation
- Analysis of Existing Privacy-Preserving Protocols in Domain Name System
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- FOREWORD
- Economic-inspired truthful reputation feedback mechanism in P2P networks
- On securing open networks through trust and reputation-architecture, challenges and solutions
- Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party
- Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
- Private Data Clustering based on Secure Approximation
- Special Section on Cryptography and Information Security
- Transport Layer Mobility Management across Heterogeneous Wireless Access Networks(Network)
- New TCP Congestion Control Schemes for Multimodal Mobile Hosts(Terrestrial Radio Communications)
- Efficient Context-Sensitive Intrusion Detection Based on State Transition Table
- Improved Subset Difference Method with Ternary Tree
- Timing Attacks against a Parallelized RSA Implementation (特集:プライバシを保護するコンピュータセキュリティ技術)