Skip to main content

Distributed Dynamic Protection of Services on Ad Hoc and Peer to Peer Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4786))

Abstract

A collaborative system for dynamic refinement of security in peer-to-peer and mobile ad hoc networks is described in this paper. This is based on a closed loop system where live distributed trust measures are used to modify access control settings in a changing threat environment. A service oriented trust overlay architecture and model underlies this system. In this model, services have associated trust thresholds – the more sensitive the service, the higher the threshold. The results of simulations of the dynamics of this kind of system are presented and a variety of algorithmic approaches to managing trust are analysed and discussed. It is demonstrated that this dynamic system has the potential to enhance security and access control efficiency and that it displays properties of robustness when faced with malicious entities that attempt to corrupt the system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems, pp. 618–644 (March 2007)

    Google Scholar 

  2. Falcone, R., Castelfranchi, C.: Social trust: a cognitive approach. In: Castelfranchi, C., Tan, Y.-H. (eds.) Trust and Deception in Virtual Societies, pp. 55–90. Kluwer Academic Publishers, Dordrecht (2001)

    Google Scholar 

  3. Dingledine, R., Freedman, M., Molnar, D.: Accountability measures for peer-to-peer systems, Peer-to-Peer: Harnessing the Power of Disruptive Technologies, O’Reilly (2000)

    Google Scholar 

  4. Douceur, J.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Gambetta, D.: Can we trust trust? In: Gambetta, D. (ed.) Trust: making and breaking cooperative relations, pp. 213–237. Basil Blackwell (1988)

    Google Scholar 

  6. Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: Proc. 12th World Wide Web Conf., Budapest (May 2003)

    Google Scholar 

  7. Gupta, M., Judge, P., Ammar, M.: A reputation system for peer-to-peer networks. In: Proc. 13th Int’l Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV) (2003)

    Google Scholar 

  8. Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P., Violante, F.: A reputation-based approach for choosing reliable resources in peer-to-peer networks, In: Proc. 9th ACM conference on Computer and Communications Security (ASIACCS) (November 2002)

    Google Scholar 

  9. Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: bringing order to the web, Technical report, Stanford Digital Library Technologies Project (1998)

    Google Scholar 

  10. Repantis, T., Kalogeraki, V.: Decentralized trust management for ad-hoc peer-to-peer networks. In: Proc. MPAC 2006, Melbourne (November 2006), http://www.smartlab.cis.strath.ac.uk/MPAC/

  11. Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network (November/December 1999)

    Google Scholar 

  12. Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ubiquitous computing. IEEE Computer (Supplement on Security & Privacy), pp. 22-26 (April 2002)

    Google Scholar 

  13. Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: self-organized network-layer security in mobile ad hoc networks, IEEE Journal of Selected Areas in Communications (February 2006)

    Google Scholar 

  14. Buchegger, S., Le Boudec, J.-Y.: A robust reputation system for mobile ad-hoc networks, EPFL IC Technical Report IC/2003/50, EPFL (July 2003)

    Google Scholar 

  15. McGibney, J., Botvich, D., Balasubramaniam, S.: A Combined Biologically and Socially Inspired Approach to Mitigating Ad Hoc Network Threats. In: Proc. 66th IEEE Vehicular Technology Conference (VTC), Baltimore (October 2007)

    Google Scholar 

  16. McGibney, J., Schmidt, N., Patel, A.: A service-centric model for intrusion detection in next-generation networks. Computer Standards & Interfaces, pp. 513–520 (June 2005)

    Google Scholar 

  17. Handorean, R., Roman, G.-C.: Secure service provision in ad hoc networks. In: Orlowska, M.E., Weerawarana, S., Papazoglou, M.M.P., Yang, J. (eds.) ICSOC 2003. LNCS, vol. 2910, Springer, Heidelberg (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Deep Medhi José Marcos Nogueira Tom Pfeifer S. Felix Wu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

McGibney, J., Botvich, D. (2007). Distributed Dynamic Protection of Services on Ad Hoc and Peer to Peer Networks. In: Medhi, D., Nogueira, J.M., Pfeifer, T., Wu, S.F. (eds) IP Operations and Management. IPOM 2007. Lecture Notes in Computer Science, vol 4786. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75853-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75853-2_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75852-5

  • Online ISBN: 978-3-540-75853-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics