Trust management for defending on-off attacks
Document Type
Article
Date of Original Version
4-1-2015
Abstract
A trust management scheme can be used to aid an automated decision-making process for an access control policy. Since unintentional temporary errors are possible, the trust management solution must provide a redemption scheme to allow nodes to recover trust. However, if a malicious node tries to disguise its malicious behaviors as unintentional temporary errors, the malicious node may be given more opportunities to attack the system by disturbing the redemption scheme. Existing trust management schemes that employ redemption schemes fail to discriminate between temporary errors and disguised malicious behaviors in which the attacker cleverly behaves well and badly alternatively. In this paper, we present the vulnerabilities of existing redemption schemes, and describe a new trust management and redemption scheme that can discriminate between temporary errors and disguised malicious behaviors with a flexible design. We show the analytical results of the trust management scheme, and demonstrate the advantages of the proposed scheme with simulation conducted in a Wireless Sensor Network.
Publication Title, e.g., Journal
IEEE Transactions on Parallel and Distributed Systems
Volume
26
Issue
4
Citation/Publisher Attribution
Chae, Younghun, Lisa DiPippo, and Yan L. Sun. "Trust management for defending on-off attacks." IEEE Transactions on Parallel and Distributed Systems 26, 4 (2015): 1178-1191. doi: 10.1109/TPDS.2014.2317719.