2017
DOI: 10.1002/cpe.4302
|View full text |Cite
|
Sign up to set email alerts
|

Information theoretic‐based detection and removal of slander and/or false‐praise attacks for robust trust management with Dempster‐Shafer combination of linguistic fuzzy terms

Abstract: Critical systems are progressively abandoning the traditional isolated and closed architectures, and adopting more federated solutions, in order to deal with orchestrated decision making within large-scale infrastructures. Such an increasing connectivity and the possibility of dynamically integrate constituents in a seamless manner by means of a decoupling middleware solution are causing the flouring of novel and previously unseen security threats, such as internal attacks conducted by camouflaged and/or compr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 47 publications
0
9
0
Order By: Relevance
“…The same trick used to support bogus event message can still work. 9,10 (3) Various attacks, if malicious vehicles link ability to normal vehicle, cheat the message receiver by altering the trust management of the event message; a vehicle will be misled due to too many malicious vehicles forwarding the event message to maintain bogus messages and against the normal messages. [11][12][13] (4) Pseudonym expiry is also another problem of the current trust management systems.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The same trick used to support bogus event message can still work. 9,10 (3) Various attacks, if malicious vehicles link ability to normal vehicle, cheat the message receiver by altering the trust management of the event message; a vehicle will be misled due to too many malicious vehicles forwarding the event message to maintain bogus messages and against the normal messages. [11][12][13] (4) Pseudonym expiry is also another problem of the current trust management systems.…”
Section: Discussionmentioning
confidence: 99%
“…(2) In a multi‐hop event scenario, if adversaries forward contradicting opinions earlier to trustworthy vehicles, then the honest vehicle may be misled. The same trick used to support bogus event message can still work . (3) Various attacks, if malicious vehicles link ability to normal vehicle, cheat the message receiver by altering the trust management of the event message; a vehicle will be misled due to too many malicious vehicles forwarding the event message to maintain bogus messages and against the normal messages .…”
Section: Introductionmentioning
confidence: 99%
“…[9] In addition to existing scattered definitions of trust, models for expressing trust involved in networked systems also lack coherence and consistency. Examples of the main formal techniques for modeling trust include fuzzy logic [10,11,12,13,14,15,16,17,18], subjective logic [19,20,21,22,23,24,25,26,27,28,29], Dempster-Shafer theory [30,31,32,33,34,35], ratings [36,37,38,39,40], weighting [41,42,43,44,45], neural network [46,47], Bayesian networks [48,49,50,51], game theory [52,53], swarm intelligence [54,55,56,57...…”
Section: Introductionmentioning
confidence: 99%
“…However, intelligent inside attackers in WSNs may be able to discover security vulnerabilities in trust mechanisms by investigating their operations, and thus, they can avoid the detection of trust mechanisms. Bad-mouthing attacks and false-praise attacks are well-known as intelligent insider attacks [9,15,16]. In these attacks, attackers provide an evaluating sensor with false information to hamper accurate trust evaluation.…”
Section: Introductionmentioning
confidence: 99%