Title :
Defense of trust management vulnerabilities in distributed networks
Author :
Yan Sun ; Zhu Han ; Liu, K.J.R.
Author_Institution :
Univ. of Rhode Island, Kingston, RI, USA
fDate :
2/1/2008 12:00:00 AM
Abstract :
Establishing trust among distributed network entities has been recognized as a powerful tool to secure distributed networks such as MANETs and sensor networks. Similar to most security schemes, trust establishment methods themselves can be vulnerable to attacks. In this article we investigate the benefits of introducing trust into distributed networks, the vulnerabilities in trust establishment methods, and the defense mechanisms. Five attacks against trust establishment methods are identified, and defense techniques are developed. Effectiveness of the attacks and the defense is demonstrated in the scenarios of securing routing protocols and detecting malicious nodes in MANETs.
Keywords :
ad hoc networks; mobile radio; routing protocols; telecommunication security; wireless sensor networks; MANET; defense mechanisms; distributed networks; malicious nodes; routing protocols; security schemes; sensor networks; trust establishment methods; trust management vulnerabilities; Collaboration; Decision making; Face detection; Information security; Mobile ad hoc networks; Network synthesis; Protection; Protocols; Robustness; Sun;
Journal_Title :
Communications Magazine, IEEE
DOI :
10.1109/MCOM.2008.4473092