Page 25 - Trust in ICT 2017
P. 25
Trust in ICT 1
The same idea is applied in trust and reputation based systems; a well reputed node is chosen for
communication in neighbourhood. Trust based approaches has been widely used in popular wireless
communication networks such as WSN, MANET, VANET and wireless multimedia sensor networks. Therefore,
to develop a trust-based mechanism for malicious node detections and prevention, trust and reputation
systems should be taken into account. It is important to investigate on trust and reputation models, what
key requirements and elements are involved in the design of trust and reputation systems, and how these
systems can be effective to provide better security.
5.1.2.2 Actors
Trust Platform: responsible for trust evaluation between nodes in wireless networks and an intelligent engine
to detect whether a node with a specific trust level in a particular context is malicious or not.
Nodes: responsible for providing information in order to prove itself as being trustful.
5.1.2.3 Pre-condition
Trust Agent (a part of the Trust Platform) periodically collects related-trust data (both direct trust and indirect
trust) from nodes in the networks and analyse the misbehaviour.
A node gathers direct trust by its own personal experiences with other neighbouring nodes through direct
interaction. On the other hand, indirect trust is gathered by a node from other node’s experiences with the
subjective node.
5.1.2.4 Triggers
A decision making component of the trust platform is used for detecting and excluding misbehaving nodes
and selecting trustworthy nodes for mutual interaction.
5.1.3 Trust-based access control mechanism
5.1.3.1 Description
Trust provides device with a natural way of judging other device similar to how we have been handling
security and access control in human society. Trust relationship between two devices helps in influencing the
future behaviours of their interactions. When devices trust each other, they prefer to share services and
resources at certain extent. Trust management allows the computation and analysis of trust among devices
to make suitable decision in order to establish efficient and reliable communication among devices.
Designing device identities and securing the interaction of the devices are two of the major challenges of any
network system like wireless network or IoT. Consider for a moment, how a user can attach device available
publicly to his/her personal space of device for a short time? How can he/she trust this device? How will this
device access his/her personal information? Note that level of access control from device i to device j is
directly proportional to the trust device i is holding for device j. Access control and the trust are closely related
as level of access granted by particular device to other device or service depends on the level of trust between
these devices.
These issues can be addressed with trust-based access control mechanism in which the trust level for each
device is calculated by the trust platform; then mapped to an access control policy.
Once a device wants to access a resource, the trust platform will analyse trust-related information of the
device (both direct and indirect trust) and calculate the trust score. The information is both periodically
collected and proactively collected depending on the design of the trust platform as well as network
architecture. Trust score is then mapped to access permissions for providing access to the resources or
devices with the principle of least privilege.
5.1.3.2 Actors
Trust Platform: responsible for trust evaluation between nodes in wireless networks and an intelligent engine
to detect whether a node with a specific trust level in a particular context is malicious or not.
Nodes: responsible for providing information in order to prove itself as being trustful.
17