Towards a Hierarchical Temporal Memory Based Self-managed Dynamic Trust Replication Mechanism in Cognitive Mobile Ad-Hoc Networks

— Dynamic trust models and replication approaches that adequately address the security needs of wireless cognitive ad hoc networks (MANET) have proven quite difficult to develop. The inherent decentralized nature of ad hoc networks and their collaborative services give rise to a series of vulnerabilities that can be exploited by malicious entities. This problem is exacerbated by the fact that risk assessment models show high levels of complexity, which suggest significant domain constraints and lack of true human-like reasoning. Recent work in the area of HTM demonstrates the ability to mimic higher level cognitive skills. This paper discusses the potential of using HTM to improve human-like reasoning in the replication of trust information in cognitive MANETs. Key-Words: — MANETs, Trust, Threats, HTM, Hierarchical Temporal Memory, Vulnerabilities,

[1]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[2]  Jesse Hoey,et al.  Hierarchical unsupervised learning of facial expression categories , 2001, Proceedings IEEE Workshop on Detection and Recognition of Events in Video.

[3]  Jingyu Zhou,et al.  Detecting attacks that exploit application-logic errors through application-level auditing , 2004, 20th Annual Computer Security Applications Conference.

[4]  J. Hawkins,et al.  On Intelligence , 2004 .

[5]  M. Ben-Ari,et al.  Virtual trees for the byzantine generals algorithm , 2004, SIGCSE '04.

[6]  Giorgio Ventre,et al.  Flexible Node Design and Implementation for Self Aware Networks , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).

[7]  Gang Yin,et al.  A Dynamic Trust Metric for P2P Systems , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.

[8]  Mukesh Singhal,et al.  A Secure Routing Protocol for Wireless Ad Hoc Networks , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[9]  Patrice Godefroid Random testing for security: blackbox vs. whitebox fuzzing , 2007, RT '07.

[10]  Herbert H. Thompson,et al.  The Software Vulnerability Guide , 2007 .

[11]  Qusay H. Mahmoud,et al.  Cognitive Networks: Towards Self-Aware Networks , 2007 .

[12]  Roger K. Moore PRESENCE: A Human-Inspired Architecture for Speech-Based Human-Machine Interaction , 2007, IEEE Transactions on Computers.

[13]  Peter Henderson,et al.  Selecting a distributed agreement algorithm , 2007, SAC '07.

[14]  S. Padmini,et al.  Security Assessment of Power Systems Using Artificial Neural Networks - A Comparison between Euclidean Distance Based Learning and Supervised Learning Algorithms , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[15]  Ji Yi,et al.  A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment , 2008, 2008 International Conference on Computer Science and Software Engineering.

[16]  Cheng Zhang,et al.  A Network Security Risk Assessment Framework Based on Game Theory , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[17]  Xiaohong Li,et al.  An Attack Scenario Based Approach for Software Security Testing at Design Stage , 2008, 2008 International Symposium on Computer Science and Computational Technology.

[18]  T. Rajendran,et al.  Secure anonymous routing in ad hoc networks , 2008, Bangalore Compute Conf..

[19]  R. J. Rodríguez Byzantine generals' problem driven dynamic trust replication method for cognitive mobile ad hoc networks (MANETs) , 2009 .

[20]  Wouter Joosen,et al.  Protecting global and static variables from buffer overflow attacks without overhead , 2006 .

[21]  Ricardo J. Rodriguez,et al.  Automated risk assessment: a hierarchical temporal memory approach , 2010 .

[22]  C. Gupta,et al.  SECURITY ISSUES IN WIRELESS SENSOR NETWORK , 2011 .