Evaluation of network trust using provenance based on distributed local intelligence
Provenance can play a significant role in a military information system for supporting the calculation of information trust. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. We introduce...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1498 |
---|---|
container_issue | |
container_start_page | 1493 |
container_title | |
container_volume | |
creator | Dogan, G. Brown, T. Govindan, K. Maifi, H. K. M. Abdelzaher, T. Mohapatra, P. Jin-Hee Cho |
description | Provenance can play a significant role in a military information system for supporting the calculation of information trust. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. We introduce a node-level trust-enhancing mechanism for information networks using provenance. A unique characteristic of the proposed trust architecture presented here is the use of provenance through the path of the information from source to destination in determining the information trust. In this proposed architecture each node in the system has a trust and provenance vector. Each information item transmitted over the network has a trust value associated with it. Nodes reexamine and update the trust value associated with the information, creating a distributed system that is more flexible and more responsive. As our system allows reconfigurations, initiatives taken by the intermediate nodes such as replacement of untrusted nodes will enhance the network trust in mission critical situations faster than a centralized approach. |
doi_str_mv | 10.1109/MILCOM.2011.6127517 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6127517</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6127517</ieee_id><sourcerecordid>6127517</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-3358039bce1ebcdeef6495a514e82f5230028caf546dbcc44edca0b7bc906bff3</originalsourceid><addsrcrecordid>eNo9UM1qwzAY8_5gXZcn6MUvkM5fEv8dR-i2Qksv3bnYzufiLUtK7HTs7RdYmS5CSAghQhbAlgBMP23Xm3q3XRYMYCmgkBzkFcm0VFAJWTKmgF2TWQGc55IrcUMeLobU-vbfkOqeZDF-sAlCaM31jOxXZ9OOJoW-o72nHabvfvikaRhjomMM3ZGehv6MnekcUmsiNnSKNiGmIdgxTbLtnWlp6BK2bTjilHskd960EbMLz8n7y2pfv-Wb3eu6ft7kASRPeVlyxUptHQJa1yB6UWluOFSoCs-LaX-hnPG8Eo11rqqwcYZZaZ1mwnpfzsnirzcg4uE0hC8z_BwuB5W_EolYIA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Evaluation of network trust using provenance based on distributed local intelligence</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Dogan, G. ; Brown, T. ; Govindan, K. ; Maifi, H. K. M. ; Abdelzaher, T. ; Mohapatra, P. ; Jin-Hee Cho</creator><creatorcontrib>Dogan, G. ; Brown, T. ; Govindan, K. ; Maifi, H. K. M. ; Abdelzaher, T. ; Mohapatra, P. ; Jin-Hee Cho</creatorcontrib><description>Provenance can play a significant role in a military information system for supporting the calculation of information trust. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. We introduce a node-level trust-enhancing mechanism for information networks using provenance. A unique characteristic of the proposed trust architecture presented here is the use of provenance through the path of the information from source to destination in determining the information trust. In this proposed architecture each node in the system has a trust and provenance vector. Each information item transmitted over the network has a trust value associated with it. Nodes reexamine and update the trust value associated with the information, creating a distributed system that is more flexible and more responsive. As our system allows reconfigurations, initiatives taken by the intermediate nodes such as replacement of untrusted nodes will enhance the network trust in mission critical situations faster than a centralized approach.</description><identifier>ISSN: 2155-7578</identifier><identifier>ISBN: 1467300799</identifier><identifier>ISBN: 9781467300797</identifier><identifier>EISSN: 2155-7586</identifier><identifier>EISBN: 9781467300810</identifier><identifier>EISBN: 1467300810</identifier><identifier>EISBN: 9781467300803</identifier><identifier>EISBN: 1467300802</identifier><identifier>DOI: 10.1109/MILCOM.2011.6127517</identifier><language>eng</language><publisher>IEEE</publisher><subject>Accuracy ; Artificial intelligence ; Automata ; Computer architecture ; Distributed Intelligence ; Information Networks ; Provenance ; Signal to noise ratio ; Trust ; Vectors ; Wireless networks</subject><ispartof>2011 - MILCOM 2011 Military Communications Conference, 2011, p.1493-1498</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6127517$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6127517$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Dogan, G.</creatorcontrib><creatorcontrib>Brown, T.</creatorcontrib><creatorcontrib>Govindan, K.</creatorcontrib><creatorcontrib>Maifi, H. K. M.</creatorcontrib><creatorcontrib>Abdelzaher, T.</creatorcontrib><creatorcontrib>Mohapatra, P.</creatorcontrib><creatorcontrib>Jin-Hee Cho</creatorcontrib><title>Evaluation of network trust using provenance based on distributed local intelligence</title><title>2011 - MILCOM 2011 Military Communications Conference</title><addtitle>MILCOM</addtitle><description>Provenance can play a significant role in a military information system for supporting the calculation of information trust. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. We introduce a node-level trust-enhancing mechanism for information networks using provenance. A unique characteristic of the proposed trust architecture presented here is the use of provenance through the path of the information from source to destination in determining the information trust. In this proposed architecture each node in the system has a trust and provenance vector. Each information item transmitted over the network has a trust value associated with it. Nodes reexamine and update the trust value associated with the information, creating a distributed system that is more flexible and more responsive. As our system allows reconfigurations, initiatives taken by the intermediate nodes such as replacement of untrusted nodes will enhance the network trust in mission critical situations faster than a centralized approach.</description><subject>Accuracy</subject><subject>Artificial intelligence</subject><subject>Automata</subject><subject>Computer architecture</subject><subject>Distributed Intelligence</subject><subject>Information Networks</subject><subject>Provenance</subject><subject>Signal to noise ratio</subject><subject>Trust</subject><subject>Vectors</subject><subject>Wireless networks</subject><issn>2155-7578</issn><issn>2155-7586</issn><isbn>1467300799</isbn><isbn>9781467300797</isbn><isbn>9781467300810</isbn><isbn>1467300810</isbn><isbn>9781467300803</isbn><isbn>1467300802</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9UM1qwzAY8_5gXZcn6MUvkM5fEv8dR-i2Qksv3bnYzufiLUtK7HTs7RdYmS5CSAghQhbAlgBMP23Xm3q3XRYMYCmgkBzkFcm0VFAJWTKmgF2TWQGc55IrcUMeLobU-vbfkOqeZDF-sAlCaM31jOxXZ9OOJoW-o72nHabvfvikaRhjomMM3ZGehv6MnekcUmsiNnSKNiGmIdgxTbLtnWlp6BK2bTjilHskd960EbMLz8n7y2pfv-Wb3eu6ft7kASRPeVlyxUptHQJa1yB6UWluOFSoCs-LaX-hnPG8Eo11rqqwcYZZaZ1mwnpfzsnirzcg4uE0hC8z_BwuB5W_EolYIA</recordid><startdate>201111</startdate><enddate>201111</enddate><creator>Dogan, G.</creator><creator>Brown, T.</creator><creator>Govindan, K.</creator><creator>Maifi, H. K. M.</creator><creator>Abdelzaher, T.</creator><creator>Mohapatra, P.</creator><creator>Jin-Hee Cho</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201111</creationdate><title>Evaluation of network trust using provenance based on distributed local intelligence</title><author>Dogan, G. ; Brown, T. ; Govindan, K. ; Maifi, H. K. M. ; Abdelzaher, T. ; Mohapatra, P. ; Jin-Hee Cho</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-3358039bce1ebcdeef6495a514e82f5230028caf546dbcc44edca0b7bc906bff3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Accuracy</topic><topic>Artificial intelligence</topic><topic>Automata</topic><topic>Computer architecture</topic><topic>Distributed Intelligence</topic><topic>Information Networks</topic><topic>Provenance</topic><topic>Signal to noise ratio</topic><topic>Trust</topic><topic>Vectors</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Dogan, G.</creatorcontrib><creatorcontrib>Brown, T.</creatorcontrib><creatorcontrib>Govindan, K.</creatorcontrib><creatorcontrib>Maifi, H. K. M.</creatorcontrib><creatorcontrib>Abdelzaher, T.</creatorcontrib><creatorcontrib>Mohapatra, P.</creatorcontrib><creatorcontrib>Jin-Hee Cho</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Dogan, G.</au><au>Brown, T.</au><au>Govindan, K.</au><au>Maifi, H. K. M.</au><au>Abdelzaher, T.</au><au>Mohapatra, P.</au><au>Jin-Hee Cho</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Evaluation of network trust using provenance based on distributed local intelligence</atitle><btitle>2011 - MILCOM 2011 Military Communications Conference</btitle><stitle>MILCOM</stitle><date>2011-11</date><risdate>2011</risdate><spage>1493</spage><epage>1498</epage><pages>1493-1498</pages><issn>2155-7578</issn><eissn>2155-7586</eissn><isbn>1467300799</isbn><isbn>9781467300797</isbn><eisbn>9781467300810</eisbn><eisbn>1467300810</eisbn><eisbn>9781467300803</eisbn><eisbn>1467300802</eisbn><abstract>Provenance can play a significant role in a military information system for supporting the calculation of information trust. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. We introduce a node-level trust-enhancing mechanism for information networks using provenance. A unique characteristic of the proposed trust architecture presented here is the use of provenance through the path of the information from source to destination in determining the information trust. In this proposed architecture each node in the system has a trust and provenance vector. Each information item transmitted over the network has a trust value associated with it. Nodes reexamine and update the trust value associated with the information, creating a distributed system that is more flexible and more responsive. As our system allows reconfigurations, initiatives taken by the intermediate nodes such as replacement of untrusted nodes will enhance the network trust in mission critical situations faster than a centralized approach.</abstract><pub>IEEE</pub><doi>10.1109/MILCOM.2011.6127517</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2155-7578 |
ispartof | 2011 - MILCOM 2011 Military Communications Conference, 2011, p.1493-1498 |
issn | 2155-7578 2155-7586 |
language | eng |
recordid | cdi_ieee_primary_6127517 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Accuracy Artificial intelligence Automata Computer architecture Distributed Intelligence Information Networks Provenance Signal to noise ratio Trust Vectors Wireless networks |
title | Evaluation of network trust using provenance based on distributed local intelligence |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T18%3A11%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Evaluation%20of%20network%20trust%20using%20provenance%20based%20on%20distributed%20local%20intelligence&rft.btitle=2011%20-%20MILCOM%202011%20Military%20Communications%20Conference&rft.au=Dogan,%20G.&rft.date=2011-11&rft.spage=1493&rft.epage=1498&rft.pages=1493-1498&rft.issn=2155-7578&rft.eissn=2155-7586&rft.isbn=1467300799&rft.isbn_list=9781467300797&rft_id=info:doi/10.1109/MILCOM.2011.6127517&rft_dat=%3Cieee_6IE%3E6127517%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781467300810&rft.eisbn_list=1467300810&rft.eisbn_list=9781467300803&rft.eisbn_list=1467300802&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6127517&rfr_iscdi=true |