Trust Management in Mobile Wireless Networks: Security and Survivability
In this dissertation we study the security and survivability of wireless mobile network systems in two distinct threat models: the Byzantine threat model and the sel¯sh node threat model. Wireless mobile networks are collections of self-organizing mobile nodes with dynamic topologies and have no ¯xe...
Other Authors: | |
---|---|
Format: | Others |
Language: | English English |
Published: |
Florida State University
|
Subjects: | |
Online Access: | http://purl.flvc.org/fsu/fd/FSU_migr_etd-3690 |
id |
ndltd-fsu.edu-oai-fsu.digital.flvc.org-fsu_181950 |
---|---|
record_format |
oai_dc |
collection |
NDLTD |
language |
English English |
format |
Others
|
sources |
NDLTD |
topic |
Computer science |
spellingShingle |
Computer science Trust Management in Mobile Wireless Networks: Security and Survivability |
description |
In this dissertation we study the security and survivability of wireless mobile network systems in two distinct threat models: the Byzantine threat model and the sel¯sh node threat model. Wireless mobile networks are collections of self-organizing mobile nodes with dynamic topologies and have no ¯xed infrastructure. Because of their dynamic ad hoc nature, these networks are particularly vulnerable to security threats. The security of such systems is, to a large extent, based on trust associations. There are several ways in which trust can be supported in a network system. The way we adopt is to establish a secure public key management infrastructure (PKI). This enables basic cryptographic functionalities, such as integrity, privacy, etc. However, due to the dynamic character of a wireless mobile network and its ad hoc topology changes, the trust associations cannot depend on any pre-established trust relations and must support a °exible, uncertain and incomplete trust model. One of our main goals in this dissertation is to analyze the distributed nature of trust in wireless mobile networks and to consider approaches that manage trust based only on locally available information. In our analysis for this problem we use the traditional Byzantine attack model. After reviewing the trust models proposed in the literature we propose an extension that supports a distributed trust management infrastructure. In this model the trust is distributed horizontally via multiple disjoint trust °ows. Compared to the traditional hierarchical trust distribution, our approach is appropriate for dynamic wireless systems for which there are no central trust authorities. A second goal is to manage trust based on the good behavior of nodes. Mobile wireless networks rely heavily on node collaboration. However, since the nodes are often battery xi powered, they may behave sel¯shly to preserve power. The threat model for this application is restricted to sel¯sh node attacks. We present a simple and e±cient reputation system, Locally Aware Reputation System (LARS) that mitigates sel¯sh node behavior. We explore methods that stimulate node cooperation in mobile wireless networks, and analyze the reputation systems proposed in the literature. The performance of LARS is evaluated in terms of its packet delivery ratio, its end-to-end delay and its overhead, and compared to the other reputation systems proposed in the literature. Finally, to enhance the security and survivability of wireless mobile networks against sel¯sh threats, we propose a mechanism that will trace sel¯sh node behavior. Chapter 4, 5 and 6 are the main contribution of the dissertation. === A Dissertation submitted to the Department of Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy. === Spring Semester, 2007. === March 29, 2007. === Wireless Network, Mobile Network, Network Security === Includes bibliographical references. === Mike Burmester, Professor Directing Dissertation; Washington Mio, Outside Committee Member; Lois W. Hawkes, Committee Member; Alec Yasinsac, Committee Member; Zhenhai Duan, Committee Member; Breno de Medeiros, Committee Member. |
author2 |
Hu, Jiangyi (authoraut) |
author_facet |
Hu, Jiangyi (authoraut) |
title |
Trust Management in Mobile Wireless Networks: Security and Survivability |
title_short |
Trust Management in Mobile Wireless Networks: Security and Survivability |
title_full |
Trust Management in Mobile Wireless Networks: Security and Survivability |
title_fullStr |
Trust Management in Mobile Wireless Networks: Security and Survivability |
title_full_unstemmed |
Trust Management in Mobile Wireless Networks: Security and Survivability |
title_sort |
trust management in mobile wireless networks: security and survivability |
publisher |
Florida State University |
url |
http://purl.flvc.org/fsu/fd/FSU_migr_etd-3690 |
_version_ |
1719318927594487808 |
spelling |
ndltd-fsu.edu-oai-fsu.digital.flvc.org-fsu_1819502020-06-10T03:08:55Z Trust Management in Mobile Wireless Networks: Security and Survivability Hu, Jiangyi (authoraut) Burmester, Mike (professor directing dissertation) Mio, Washington (outside committee member) Hawkes, Lois W. (committee member) Yasinsac, Alec (committee member) Duan, Zhenhai (committee member) De Medeiros, Breno (committee member) Department of Computer Science (degree granting department) Florida State University (degree granting institution) Text text Florida State University Florida State University English eng 1 online resource computer application/pdf In this dissertation we study the security and survivability of wireless mobile network systems in two distinct threat models: the Byzantine threat model and the sel¯sh node threat model. Wireless mobile networks are collections of self-organizing mobile nodes with dynamic topologies and have no ¯xed infrastructure. Because of their dynamic ad hoc nature, these networks are particularly vulnerable to security threats. The security of such systems is, to a large extent, based on trust associations. There are several ways in which trust can be supported in a network system. The way we adopt is to establish a secure public key management infrastructure (PKI). This enables basic cryptographic functionalities, such as integrity, privacy, etc. However, due to the dynamic character of a wireless mobile network and its ad hoc topology changes, the trust associations cannot depend on any pre-established trust relations and must support a °exible, uncertain and incomplete trust model. One of our main goals in this dissertation is to analyze the distributed nature of trust in wireless mobile networks and to consider approaches that manage trust based only on locally available information. In our analysis for this problem we use the traditional Byzantine attack model. After reviewing the trust models proposed in the literature we propose an extension that supports a distributed trust management infrastructure. In this model the trust is distributed horizontally via multiple disjoint trust °ows. Compared to the traditional hierarchical trust distribution, our approach is appropriate for dynamic wireless systems for which there are no central trust authorities. A second goal is to manage trust based on the good behavior of nodes. Mobile wireless networks rely heavily on node collaboration. However, since the nodes are often battery xi powered, they may behave sel¯shly to preserve power. The threat model for this application is restricted to sel¯sh node attacks. We present a simple and e±cient reputation system, Locally Aware Reputation System (LARS) that mitigates sel¯sh node behavior. We explore methods that stimulate node cooperation in mobile wireless networks, and analyze the reputation systems proposed in the literature. The performance of LARS is evaluated in terms of its packet delivery ratio, its end-to-end delay and its overhead, and compared to the other reputation systems proposed in the literature. Finally, to enhance the security and survivability of wireless mobile networks against sel¯sh threats, we propose a mechanism that will trace sel¯sh node behavior. Chapter 4, 5 and 6 are the main contribution of the dissertation. A Dissertation submitted to the Department of Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Spring Semester, 2007. March 29, 2007. Wireless Network, Mobile Network, Network Security Includes bibliographical references. Mike Burmester, Professor Directing Dissertation; Washington Mio, Outside Committee Member; Lois W. Hawkes, Committee Member; Alec Yasinsac, Committee Member; Zhenhai Duan, Committee Member; Breno de Medeiros, Committee Member. Computer science FSU_migr_etd-3690 http://purl.flvc.org/fsu/fd/FSU_migr_etd-3690 This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). The copyright in theses and dissertations completed at Florida State University is held by the students who author them. http://diginole.lib.fsu.edu/islandora/object/fsu%3A181950/datastream/TN/view/Trust%20Management%20in%20Mobile%20Wireless%20Networks.jpg |