Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications

  • Authors:
  • Martin Serrano;Sven Meer;John Strassner;Stefano Paoli;Aphra Kerr;Cristiano Storni

  • Affiliations:
  • Waterford Institute of Technology, Telecommunications Software and Systems Group, ArcLabs Ireland, Waterford Co., Ireland;Waterford Institute of Technology, Telecommunications Software and Systems Group, ArcLabs Ireland, Waterford Co., Ireland;Waterford Institute of Technology, Telecommunications Software and Systems Group, ArcLabs Ireland, Waterford Co., Ireland;Maynooth, Sociology Department, National University of Ireland, Maynooth, Ireland;Maynooth, Sociology Department, National University of Ireland, Maynooth, Ireland;Department of Computer Science and Information Systems Interaction Design Centre, University of Limerick, Limerick, Ireland

  • Venue:
  • ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models obsolete. In addition, current security mechanisms are not sufficiently robust to protect each management system and/or subsystem from web-based intrusions, malware, and hacking attacks. This paper presents research challenges in autonomic management to provide self-protection mechanisms and tools by using trust and reputation concepts based on policy-based management to decentralize management decisions. This work also uses user-based reputation mechanisms to help enforce trust management in pervasive and communications services. The scope of this research is founded in social models, where the application of trust and reputation applied in communication systems helps detect potential users as well as hackers attempting to corrupt management operations and services. These so-called "cheating services" act as "attacks", altering the performance and the security in communication systems by consumption of computing or network resources unnecessarily.