Filters








11,375 Hits in 6.6 sec

Mobility in Collaborative Alert Systems: Building Trust through Reputation [chapter]

Manuel Gil Pérez, Félix Gómez Mármol, Gregorio Martínez Pérez, Antonio F. Gómez Skarmeta
2011 Lecture Notes in Computer Science  
However, for this alert information to be useful in the context of CIDN networks, certain trust and reputation mechanisms determining the credibility of a particular mobile node, and the alerts it provides  ...  This is the main objective of this paper, where an inter-domain trust and reputation model, together with an architecture for inter-domain collaboration, are presented with the main aim of improving the  ...  Collaborative alert systems provide the basis for building a global knowledge of alerts, based on the cooperation of all members of the system, to increase the accuracy in detecting distributed threats  ... 
doi:10.1007/978-3-642-23041-7_24 fatcat:boirhvacvraafgxo6u44racp34

RECLAMO: Virtual and Collaborative Honeynets Based on Trust Management and Autonomous Systems Applied to Intrusion Management

Manuel Gil Perez, Veronica Mateos Lanchas, David Fernandez Cambronero, Gregorio Martinez Perez, Victor A. Villagra
2013 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems  
in order to accept their alerts as true.  ...  This system will infer the most appropriate response for a given attack, taking into account the attack type, context information, and the trust and reputation of the reporting IDSs.  ...  ACKNOWLEDGMENT This work has been partially funded with support from the Spanish MICINN (project RECLAMO, Virtual and Collaborative Honeynets based on Trust Management and Autonomous Systems applied to  ... 
doi:10.1109/cisis.2013.44 dblp:conf/cisis/PerezLCPV13 fatcat:udesapsfzzfd5k4cudooxqr3g4

Anomaly Detection for Internet of Vehicles: A Trust Management Scheme with Affinity Propagation

Shu Yang, Zhihan Liu, Jinglin Li, Shangguang Wang, Fangchun Yang
2016 Mobile Information Systems  
Moreover, the scheme is enhanced with a distributed supervising mechanism and a central reputation arbitrator to assure robustness and fairness in detecting process.  ...  In this paper, we introduce a trust-based anomaly detection scheme for IVs, where some malicious or incapable vehicles are existing on roads.  ...  Their method therefore makes contributions to building centralized trust management system.  ... 
doi:10.1155/2016/5254141 fatcat:l2hlf2qa2ze2fntu4gnellp7xq

A Collaborative Intrusion Detection System for Cognitive Radio Networks with Trust and Reputation Management

2019 International journal of recent technology and engineering  
, and uni-directional in accessible time window, so trust and reputation system is required.  ...  CORE is a reputation based security mechanism which enforces cooperation of nodes in CRN.  ...  CORE is a trust-based collaborative reputation mechanism to enforce cooperation of mobile nodes in the networks.  ... 
doi:10.35940/ijrte.b3356.078219 fatcat:k7wh3v2phjbkrldr36yw6ckxoy

Privacy-Preserving Profile Matching System for Trust-Aware Personalized User Recommendations in Social Networks [chapter]

Vaishnavi Kulkarni, Archana S. Vaidya
2016 Advances in Intelligent Systems and Computing  
In the proposed system, a framework is introduced for handling trust in social networks, which is based on reputation mechanism.  ...  In order to compute the reputation of each member, we adopt several other properties of trust such as, transitivity, personalization, and context, and draw ideas from sociology axioms.  ...  According to Shani and Gunawardana [18] , it is unclear how to measure trust in an offline experiment, since trust is build through an interaction between the user and the system.  ... 
doi:10.1007/978-981-10-1675-2_4 fatcat:egzljzbgubgxbfsf7clrj3dc4u

Trust management systems for wireless sensor networks: Best practices

Javier Lopez, Rodrigo Roman, Isaac Agudo, Carmen Fernandez-Gago
2010 Computer Communications  
In order to assist this process, trust management systems could play a relevant role.  ...  In this paper we list the best practices that we consider are essential for developing a good trust management system for WSN and make an analysis of the state of the art related to these practices.  ...  This is the case, for example, of trust and reputation. In most of the cases they are considered jointly in order to build the trust or reputation systems.  ... 
doi:10.1016/j.comcom.2010.02.006 fatcat:clkxf6s54vgjvoktbpkstm4jga

A Survey of Intrusion Detection Systems in Wireless Sensor Networks

Ismail Butun, Salvatore D. Morgera, Ravi Sankar
2014 IEEE Communications Surveys and Tutorials  
In this article, a survey of the state-of-the-art in Intrusion Detection Systems (IDSs) that are proposed for WSNs is presented. Firstly, detailed information about IDSs is provided.  ...  Secondly, a brief survey of IDSs proposed for Mobile Ad-Hoc Networks (MANETs) is presented and applicability of those systems to WSNs are discussed. Thirdly, IDSs proposed for WSNs are presented.  ...  Reputation (trust) based IDSs A reputation based IDS scheme promotes node cooperation through collaborative monitoring of the nodes and a grading system associated with the results of the collaborative  ... 
doi:10.1109/surv.2013.050113.00191 fatcat:kmuvevcrzfattdk3ys3k3pq3wy

A Survey on new Threats and Countermeasures on Emerging Networks [chapter]

Jacques Saraydayran, Fatiha Benali, Luc Paffumi
2011 Intrusion Detection Systems  
This collaboration is made through a collaborative architecture.  ...  To counter such attacks, security mechanisms based on node collaboration and reputation are discussed and compared in a second part.  ...  Intrusion Detection Systems The current structure of the chapters reflects the key aspects discussed in the papers but the papers themselves contain more additional interesting information: examples of  ... 
doi:10.5772/14835 fatcat:dbk5ya7rinfulldsn7jxqxjahm

Detecting insider attacks in medical cyber–physical networks based on behavioral profiling

Weizhi Meng, Wenjuan Li, Yu Wang, Man Ho Au
2018 Future generations computer systems  
profiles. • We apply Euclidean distance to derive a node's trust between two profiles. • We performed evaluation by collaborating with a practical healthcare center. a b s t r a c t Cyber-physical systems  ...  A node's reputation can be judged by identifying the difference in Euclidean distance between two behavioral profiles.  ...  Further, based on the suggestions from healthcare managers, we select four mobile and network features to build behavioral profiles, and apply Euclidean distance for evaluating a node's reputation. • By  ... 
doi:10.1016/j.future.2018.06.007 fatcat:r6lcc6sgbvbepccn3ostmupi3u

Recent Advancements in Intrusion Detection Systems for the Internet of Things

Zeeshan Ali Khan, Peter Herrmann
2019 Security and Communication Networks  
On the other side, IDSs have already been successfully used in adjacent network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS) which, in part  ...  In this article, we will give an overview about IDSs suited for IoT networks.  ...  A trust management system provides a computer system with mechanisms reflecting the natural trust and reputation gaining process of humans; see, e.g., Khare and Rifkin [41] .  ... 
doi:10.1155/2019/4301409 fatcat:qupk6elzcvbkrarqf25epmjdci

Enhancing Funders' and Advocates' Effectiveness: The Processes Shaping Collaborative Advocacy for Health System Accountability in South Africa

Barbara Klugman, Waasila Jassat
2016 The Foundation Review  
Acknowledgements We would like to thank the leadership and staff of the organizations whose extraordinary work is discussed in this article for sharing their time and insights, The Atlantic Philanthropies  ...  Self-Selection Through Trust-Building Another striking feature of these collaborations is that they were consolidated over time.  ...  For example, the TAC can mobilize members to march and protest, but can also mobilize its reputation and brand such that both elected representatives and health system staff recognize its ability to gain  ... 
doi:10.9707/1944-5660.1277 fatcat:qjlibudpzzdnfkumb6dhlge7ya

Towards Engineering Trust-Aware Future Internet Systems [chapter]

Francisco Moyano, Carmen Fernandez, Javier Lopez
2013 Lecture Notes in Business Information Processing  
In this paper we propose a UML extension for specifying trust and reputation requirements, and we apply it to an eHealth case study.  ...  and reputation.  ...  The goal is to build a web application through which the physician and the patient can interact in a trusted way.  ... 
doi:10.1007/978-3-642-38490-5_44 fatcat:zauiwiid6rdlnox7ga3pzpofpq

Safety Challenges and Solutions in Mobile Social Networks

Yashar Najaflou, Behrouz Jedari, Feng Xia, Laurence T. Yang, Mohammad S. Obaidat
2015 IEEE Systems Journal  
in MSNs.  ...  Mobile social networks (MSNs) are specific types of social media which consolidate the ability of omnipresent connection for mobile users/devices to share user-centric data objects among interested users  ...  In other words, trust is based on the reputation between individuals and is a capital asset that people may invest great amount of resources in building and that is acquired slowly but can be destroyed  ... 
doi:10.1109/jsyst.2013.2284696 fatcat:so3qnnbk65axhn2upzmemss2he

An Anomaly-Based Intrusion Detection System with Multi-Dimensional Trust Parameters for Mobile Ad Hoc Network

Sharmasth Yeruru, Tiruchirai Rangaswamy
2017 International Journal of Intelligent Engineering and Systems  
major issues in designing Intrusion Detection Systems (IDS).  ...  AID-ST system incorporates multi-dimensional trust parameters and subjective logic theory to effectively detect and confirm the attack behavior.  ...  MANET comprises of mobile nodes that operate independently in the open medium without any infrastructure [1, 2] . The nodes in MANET communicate with each other through single or multi-hop.  ... 
doi:10.22266/ijies2017.0831.09 fatcat:etbzk5kghjdqhftnuotobim2vi

Long-term reputation system for vehicular networking based on vehicle's daily commute routine

Soyoung Park, Baber Aslam, Cliff C. Zou
2011 2011 IEEE Consumer Communications and Networking Conference (CCNC)  
Wu el al. has recently proposed a group-based reputation system [9] for mobile P2P systems where peers with similar mobility are clustered into a group.  ...  [4, 5] introduced a reputation system in peer-to-peer (P2P) networks in order to establish a trust relationship, and to encourage the cooperation, among peer nodes. Ref.  ... 
doi:10.1109/ccnc.2011.5766507 dblp:conf/ccnc/ParkAZ11 fatcat:4nnbqd272zasxdfumh77rv7ynq
« Previous Showing results 1 — 15 out of 11,375 results