Evaluation of network trust using provenance based on distributed local intelligence

Provenance can play a significant role in a military information system for supporting the calculation of information trust. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. We introduce...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Dogan, G., Brown, T., Govindan, K., Maifi, H. K. M., Abdelzaher, T., Mohapatra, P., Jin-Hee Cho
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1498
container_issue
container_start_page 1493
container_title
container_volume
creator Dogan, G.
Brown, T.
Govindan, K.
Maifi, H. K. M.
Abdelzaher, T.
Mohapatra, P.
Jin-Hee Cho
description Provenance can play a significant role in a military information system for supporting the calculation of information trust. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. We introduce a node-level trust-enhancing mechanism for information networks using provenance. A unique characteristic of the proposed trust architecture presented here is the use of provenance through the path of the information from source to destination in determining the information trust. In this proposed architecture each node in the system has a trust and provenance vector. Each information item transmitted over the network has a trust value associated with it. Nodes reexamine and update the trust value associated with the information, creating a distributed system that is more flexible and more responsive. As our system allows reconfigurations, initiatives taken by the intermediate nodes such as replacement of untrusted nodes will enhance the network trust in mission critical situations faster than a centralized approach.
doi_str_mv 10.1109/MILCOM.2011.6127517
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6127517</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6127517</ieee_id><sourcerecordid>6127517</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-3358039bce1ebcdeef6495a514e82f5230028caf546dbcc44edca0b7bc906bff3</originalsourceid><addsrcrecordid>eNo9UM1qwzAY8_5gXZcn6MUvkM5fEv8dR-i2Qksv3bnYzufiLUtK7HTs7RdYmS5CSAghQhbAlgBMP23Xm3q3XRYMYCmgkBzkFcm0VFAJWTKmgF2TWQGc55IrcUMeLobU-vbfkOqeZDF-sAlCaM31jOxXZ9OOJoW-o72nHabvfvikaRhjomMM3ZGehv6MnekcUmsiNnSKNiGmIdgxTbLtnWlp6BK2bTjilHskd960EbMLz8n7y2pfv-Wb3eu6ft7kASRPeVlyxUptHQJa1yB6UWluOFSoCs-LaX-hnPG8Eo11rqqwcYZZaZ1mwnpfzsnirzcg4uE0hC8z_BwuB5W_EolYIA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Evaluation of network trust using provenance based on distributed local intelligence</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Dogan, G. ; Brown, T. ; Govindan, K. ; Maifi, H. K. M. ; Abdelzaher, T. ; Mohapatra, P. ; Jin-Hee Cho</creator><creatorcontrib>Dogan, G. ; Brown, T. ; Govindan, K. ; Maifi, H. K. M. ; Abdelzaher, T. ; Mohapatra, P. ; Jin-Hee Cho</creatorcontrib><description>Provenance can play a significant role in a military information system for supporting the calculation of information trust. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. We introduce a node-level trust-enhancing mechanism for information networks using provenance. A unique characteristic of the proposed trust architecture presented here is the use of provenance through the path of the information from source to destination in determining the information trust. In this proposed architecture each node in the system has a trust and provenance vector. Each information item transmitted over the network has a trust value associated with it. Nodes reexamine and update the trust value associated with the information, creating a distributed system that is more flexible and more responsive. As our system allows reconfigurations, initiatives taken by the intermediate nodes such as replacement of untrusted nodes will enhance the network trust in mission critical situations faster than a centralized approach.</description><identifier>ISSN: 2155-7578</identifier><identifier>ISBN: 1467300799</identifier><identifier>ISBN: 9781467300797</identifier><identifier>EISSN: 2155-7586</identifier><identifier>EISBN: 9781467300810</identifier><identifier>EISBN: 1467300810</identifier><identifier>EISBN: 9781467300803</identifier><identifier>EISBN: 1467300802</identifier><identifier>DOI: 10.1109/MILCOM.2011.6127517</identifier><language>eng</language><publisher>IEEE</publisher><subject>Accuracy ; Artificial intelligence ; Automata ; Computer architecture ; Distributed Intelligence ; Information Networks ; Provenance ; Signal to noise ratio ; Trust ; Vectors ; Wireless networks</subject><ispartof>2011 - MILCOM 2011 Military Communications Conference, 2011, p.1493-1498</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6127517$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6127517$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Dogan, G.</creatorcontrib><creatorcontrib>Brown, T.</creatorcontrib><creatorcontrib>Govindan, K.</creatorcontrib><creatorcontrib>Maifi, H. K. M.</creatorcontrib><creatorcontrib>Abdelzaher, T.</creatorcontrib><creatorcontrib>Mohapatra, P.</creatorcontrib><creatorcontrib>Jin-Hee Cho</creatorcontrib><title>Evaluation of network trust using provenance based on distributed local intelligence</title><title>2011 - MILCOM 2011 Military Communications Conference</title><addtitle>MILCOM</addtitle><description>Provenance can play a significant role in a military information system for supporting the calculation of information trust. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. We introduce a node-level trust-enhancing mechanism for information networks using provenance. A unique characteristic of the proposed trust architecture presented here is the use of provenance through the path of the information from source to destination in determining the information trust. In this proposed architecture each node in the system has a trust and provenance vector. Each information item transmitted over the network has a trust value associated with it. Nodes reexamine and update the trust value associated with the information, creating a distributed system that is more flexible and more responsive. As our system allows reconfigurations, initiatives taken by the intermediate nodes such as replacement of untrusted nodes will enhance the network trust in mission critical situations faster than a centralized approach.</description><subject>Accuracy</subject><subject>Artificial intelligence</subject><subject>Automata</subject><subject>Computer architecture</subject><subject>Distributed Intelligence</subject><subject>Information Networks</subject><subject>Provenance</subject><subject>Signal to noise ratio</subject><subject>Trust</subject><subject>Vectors</subject><subject>Wireless networks</subject><issn>2155-7578</issn><issn>2155-7586</issn><isbn>1467300799</isbn><isbn>9781467300797</isbn><isbn>9781467300810</isbn><isbn>1467300810</isbn><isbn>9781467300803</isbn><isbn>1467300802</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9UM1qwzAY8_5gXZcn6MUvkM5fEv8dR-i2Qksv3bnYzufiLUtK7HTs7RdYmS5CSAghQhbAlgBMP23Xm3q3XRYMYCmgkBzkFcm0VFAJWTKmgF2TWQGc55IrcUMeLobU-vbfkOqeZDF-sAlCaM31jOxXZ9OOJoW-o72nHabvfvikaRhjomMM3ZGehv6MnekcUmsiNnSKNiGmIdgxTbLtnWlp6BK2bTjilHskd960EbMLz8n7y2pfv-Wb3eu6ft7kASRPeVlyxUptHQJa1yB6UWluOFSoCs-LaX-hnPG8Eo11rqqwcYZZaZ1mwnpfzsnirzcg4uE0hC8z_BwuB5W_EolYIA</recordid><startdate>201111</startdate><enddate>201111</enddate><creator>Dogan, G.</creator><creator>Brown, T.</creator><creator>Govindan, K.</creator><creator>Maifi, H. K. M.</creator><creator>Abdelzaher, T.</creator><creator>Mohapatra, P.</creator><creator>Jin-Hee Cho</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201111</creationdate><title>Evaluation of network trust using provenance based on distributed local intelligence</title><author>Dogan, G. ; Brown, T. ; Govindan, K. ; Maifi, H. K. M. ; Abdelzaher, T. ; Mohapatra, P. ; Jin-Hee Cho</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-3358039bce1ebcdeef6495a514e82f5230028caf546dbcc44edca0b7bc906bff3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Accuracy</topic><topic>Artificial intelligence</topic><topic>Automata</topic><topic>Computer architecture</topic><topic>Distributed Intelligence</topic><topic>Information Networks</topic><topic>Provenance</topic><topic>Signal to noise ratio</topic><topic>Trust</topic><topic>Vectors</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Dogan, G.</creatorcontrib><creatorcontrib>Brown, T.</creatorcontrib><creatorcontrib>Govindan, K.</creatorcontrib><creatorcontrib>Maifi, H. K. M.</creatorcontrib><creatorcontrib>Abdelzaher, T.</creatorcontrib><creatorcontrib>Mohapatra, P.</creatorcontrib><creatorcontrib>Jin-Hee Cho</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Dogan, G.</au><au>Brown, T.</au><au>Govindan, K.</au><au>Maifi, H. K. M.</au><au>Abdelzaher, T.</au><au>Mohapatra, P.</au><au>Jin-Hee Cho</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Evaluation of network trust using provenance based on distributed local intelligence</atitle><btitle>2011 - MILCOM 2011 Military Communications Conference</btitle><stitle>MILCOM</stitle><date>2011-11</date><risdate>2011</risdate><spage>1493</spage><epage>1498</epage><pages>1493-1498</pages><issn>2155-7578</issn><eissn>2155-7586</eissn><isbn>1467300799</isbn><isbn>9781467300797</isbn><eisbn>9781467300810</eisbn><eisbn>1467300810</eisbn><eisbn>9781467300803</eisbn><eisbn>1467300802</eisbn><abstract>Provenance can play a significant role in a military information system for supporting the calculation of information trust. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. We introduce a node-level trust-enhancing mechanism for information networks using provenance. A unique characteristic of the proposed trust architecture presented here is the use of provenance through the path of the information from source to destination in determining the information trust. In this proposed architecture each node in the system has a trust and provenance vector. Each information item transmitted over the network has a trust value associated with it. Nodes reexamine and update the trust value associated with the information, creating a distributed system that is more flexible and more responsive. As our system allows reconfigurations, initiatives taken by the intermediate nodes such as replacement of untrusted nodes will enhance the network trust in mission critical situations faster than a centralized approach.</abstract><pub>IEEE</pub><doi>10.1109/MILCOM.2011.6127517</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2155-7578
ispartof 2011 - MILCOM 2011 Military Communications Conference, 2011, p.1493-1498
issn 2155-7578
2155-7586
language eng
recordid cdi_ieee_primary_6127517
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Accuracy
Artificial intelligence
Automata
Computer architecture
Distributed Intelligence
Information Networks
Provenance
Signal to noise ratio
Trust
Vectors
Wireless networks
title Evaluation of network trust using provenance based on distributed local intelligence
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T18%3A11%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Evaluation%20of%20network%20trust%20using%20provenance%20based%20on%20distributed%20local%20intelligence&rft.btitle=2011%20-%20MILCOM%202011%20Military%20Communications%20Conference&rft.au=Dogan,%20G.&rft.date=2011-11&rft.spage=1493&rft.epage=1498&rft.pages=1493-1498&rft.issn=2155-7578&rft.eissn=2155-7586&rft.isbn=1467300799&rft.isbn_list=9781467300797&rft_id=info:doi/10.1109/MILCOM.2011.6127517&rft_dat=%3Cieee_6IE%3E6127517%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781467300810&rft.eisbn_list=1467300810&rft.eisbn_list=9781467300803&rft.eisbn_list=1467300802&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6127517&rfr_iscdi=true