liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Resilient trust for peer-to-peer based critical information infrastructures
Linköping University, Department of Computer and Information Science. Linköping University, The Institute of Technology.
Linköping University, Department of Computer and Information Science. Linköping University, The Institute of Technology.
Linköping University, Department of Computer and Information Science. Linköping University, The Institute of Technology.
2004 (English)In: Proceedings of the 2nd International Conference on Critical Infrastructures (CRIS 2004), Grenoble, France: International Institute for Critical Infrastructure , 2004Conference paper, Published paper (Refereed)
Abstract [en]

Critical information infrastructures (CII) include the information technologies, telecommunication, and the Internet. The protection of CII is a paramount task, as other critical infrastructures (e.g. power grids, banking, and finance) become increasingly dependent on information services. Fault tolerance, scalability, self management, and self healing are some of the main requirements for the information-based critical services. These requirements can be addressed by the emerging peer-to-peer (P2P) technologies. The P2P architectural paradigm distributes the functionality, previously centralized into servers, to all the peers into the network. This approach has the advantage of avoiding bottlenecks and single point of failure making P2P networks robust and resilient to attacks. However, decentralization and distribution of P2P systems raise t he question of trust: how to distinguish the trustworthy peers from malicious ones. In this paper we analyze the resiliency of the existing reputation-based trust management mechanisms and identify the open problems to be addressed in order to provide the degree of resiliency necessary to critical information infrastructures.

Place, publisher, year, edition, pages
Grenoble, France: International Institute for Critical Infrastructure , 2004.
Keyword [en]
security, trust, critical information infrastructure, peer-to-peer
National Category
Computer Science
Identifiers
URN: urn:nbn:se:liu:diva-22754Local ID: 2072OAI: oai:DiVA.org:liu-22754DiVA: diva2:243067
Conference
2nd International Conference on Critical Infrastructures (CRIS 2004), Grenoble, France, October, 2004
Available from: 2009-10-07 Created: 2009-10-07 Last updated: 2012-12-10
In thesis
1. Security and trust mechanisms for groups in distributed services
Open this publication in new window or tab >>Security and trust mechanisms for groups in distributed services
2005 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Group communication is a fundamental paradigm in modem distributed services, with applications in domains such as content distribution, distributed games, and collaborative workspaces. Despite the increasing interest in group-based services and the latest developments in efficient and reliable multi cast, the secure management of groups remains a major challenge for group communication.

In this thesis we propose security and trust mechanisms for supporting secure management of groups within the contexts of controlled and of self-organizing settings.

Controlled groups occur in services, such as multi cast software delivery, where an authority exists that enforces a group membership policy. In this context we propose a secure group key management approach which assures that only authorized users can access protected group resources. In order to scale to large and dynamic groups, the key management scheme must also be efficient. However, security and efficiency are competing requirements. We address this issue by proposing two flexible group key management schemes which can be configured to best meet the security and efficiency requirements of applications and services. One of the schemes can also be dynamically tuned, at system runtime, to adapt to possible requirement changes.

Self-organizing groups occur in services, such as those enabled by peer-to-peer (P2P) and wireless technologies, which adopt a decentralized architecture. In the context of self-organizing groups, with no authority to dictate and control the group members' interactions, group members might behave maliciously and attempt to subvert other members in the group. We address this problem by proposing a reputation-based trust management approach that enables group members to distinguish between well-behaving and malicious members.

We have evaluated our group key management and trust mechanisms analytically and through simulation. The evaluation of the group key management schemes shows cost advantages for rekeying and key storage. The evaluation of the reputation-based trust management shows that our trust metric is resilient to group members maliciously changing their behavior and flexible in that it supports different types of trust dynamics. As a proof of concept, we have incorporated our trust mechanism into a P2P-based intrusion detection system. The test results show an increase in system resiliency to attacks.

Place, publisher, year, edition, pages
Linköping: Linköping University Electronic Press, 2005. 22 p.
Series
Linköping Studies in Science and Technology. Dissertations, ISSN 0345-7524 ; 979
National Category
Computer Science
Identifiers
urn:nbn:se:liu:diva-30648 (URN)16243 (Local ID)91-85457-54-X (ISBN)16243 (Archive number)16243 (OAI)
Public defence
2005-11-09, Visionen, hus B, Campus Valla, Linköpings universitet, Linköping, 10:15 (English)
Available from: 2009-10-09 Created: 2009-10-09 Last updated: 2012-12-10Bibliographically approved

Open Access in DiVA

No full text

Authority records BETA

Duma, ClaudiuShahmehri, NahidTurcan, Eduard

Search in DiVA

By author/editor
Duma, ClaudiuShahmehri, NahidTurcan, Eduard
By organisation
Department of Computer and Information ScienceThe Institute of Technology
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 96 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf