Trust management for multimedia P2P applications in autonomic networking

In the last years, trust management has become a fundamental basis for facilitating the cooperation between different users in peer-to-peer (P2P) multimedia applications within autonomic networks. In these networks and applications, trust management should fulfill certain requirements (i.e. decentralisation, dynamism, simplicity, interoperability, etc.) for being functional. In this paper, we propose an evolutionary model of trust management that captures dynamic entities' behaviour over time. Likewise, we explain protection mechanisms against several attacks, which are based on the cooperative behaviour of the entities, trust relationship properties, and trust rules. Finally, we successfully validate our model from several scenarios and compare it with other proposals in this field.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Indrajit Ray,et al.  TrustBAC: integrating trust relationships into the RBAC model for access control in open systems , 2006, SACMAT '06.

[3]  Audun J sang,et al.  An Algebra for Assessing Trust in Certi cation Chains , 1998 .

[4]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[5]  Robert H. Deng,et al.  Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.

[6]  Yong Chen,et al.  Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..

[7]  Matti Siekkinen,et al.  Beyond the Future Internet--Requirements of Autonomic Networking Architectures to Address Long Term Future Networking Challenges , 2007, 11th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS'07).

[8]  Audun Jøsang,et al.  An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.

[9]  Martin Serrano,et al.  Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications , 2009, ATC.

[10]  J. Baras,et al.  Managing Trust in Self-organized Mobile Ad Hoc Networks ∗ ( Extended Abstract ) , 2004 .

[11]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[12]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[13]  Sheikh Iqbal Ahamed,et al.  Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments , 2010, J. Syst. Softw..

[14]  Andrés Marín López,et al.  Developing a model for trust management in pervasive devices , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[15]  Timothy W. Finin,et al.  Active collaborations for trustworthy data management in ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[16]  Vijay Varadharajan,et al.  Interaction Trust Evaluation in Decentralized Environments , 2004, EC-Web.

[17]  Markulf Kohlweiss,et al.  A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup , 2008, WISTP.

[19]  Javier López,et al.  Pervasive authentication and authorization infrastructures for mobile users , 2010, Comput. Secur..

[20]  Ruidong Li,et al.  Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.

[21]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[22]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[23]  Ueli Maurer,et al.  Modelling a Public-Key Infrastructure , 1996, ESORICS.

[24]  Audun Jøsang,et al.  A Subjective Metric of Authentication , 1998, ESORICS.

[25]  Andrés Marín López,et al.  A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[26]  Celeste Campo,et al.  PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .

[27]  Ivan Stojmenovic Simulations in wireless sensor and ad hoc networks: matching and advancing models, metrics, and solutions , 2008, IEEE Communications Magazine.

[28]  Kuifei Yu,et al.  An Autonomic Multimedia and Information Service Gateway for Mobile Devices , 2009 .

[29]  L. Toledo-Pereyra Trust , 2006, Mediation Behaviour.

[30]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[31]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[32]  Vana Kalogeraki,et al.  Decentralized trust management for ad-hoc peer-to-peer networks , 2006, MPAC '06.

[33]  Andrés Marín López,et al.  TrustAC: Trust-Based Access Control for Pervasive Devices , 2005, SPC.

[34]  Sheikh Iqbal Ahamed,et al.  An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[35]  J. Nielsen,et al.  Trust or Bust: Communicating Trustworthiness in Web s Alertbox, March 7. , 1999 .

[36]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[37]  Frank Stewart,et al.  June , 1890, The Hospital.

[38]  R. Chen,et al.  Poblano A Distributed Trust Model for Peer-to-Peer Networks , 2001 .

[39]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.