Page 23 - Trust in ICT 2017
P. 23

Trust in ICT                                                1





















                                             Figure 2 – Different views on trust


            5       Use cases and explanation of trust provisioning
            This section illustrates various use cases for trust provisioning based on the technical report of ITU-T CG-Trust
            and materials from other SDOs (e.g., oneM2M) as well as related literature. In addition, this section also
            analyses these uses cases in terms of purpose, method, actors and considerations for measuring trust.


            5.1     Trust Use Cases in Networking Aspects
            5.1.1   Trust-based routing protocols

            5.1.1.1    Description
            Secure routing is especially important in wireless networks. However there are many attacks toward wireless
            network routing protocols due to their open, distributed and dynamic nature.

            In ad-hoc and sensor networks, it is very important to secure each node. An adversary may overtake some
            critical nodes and inject malicious behaviours, which leads to revelation of secure information and collapse
            of entire network. There are two common types of misbehaving nodes: selfish nodes and malicious nodes. If
            a node does not cooperate in packet forwarding due to some resource constraints, such as low memory or
            battery life, it is said to be selfish node. A selfish node may not have any intention to destruct the system; an
            adversary may reprogram a compromised node to behave selfishly. On the other hand, a malicious node has
            an objective to destruct the system badly, even at the cost of its own resources.
            The  security  attacks  in  ad-hoc  and  sensor  networks  may  be  compared  and  classified  from  multiple
            perspectives. One way of classifying attacks is based on capabilities and resources an adversary has in his
            possession. In this type of classification, attacks may be classified as outsider (external) attack and Insider
            attack. In outsider attack, attacker lacks authentication and key information and such type of attack can easily
            be dealt with classical security mechanism such as cryptography, encryption and authentication. In insider
            attack, an adversary already has all key and cryptographic information, therefore such type of attack cannot
            be dealt with traditional security measures.

            Another classification is based on adversary’s intention to destruct the system. The attacks may be classified as
            Trust Management related attack and network related attack. The intention of Trust Management related
            attack is to degrade the performance of trust management system which leads to the inaccurate decisions. For
            example, in trust aware routing mechanisms, if misbehaving nodes are not properly detected and isolated by
            trust management system, then these nodes may become part of selected routing path and perform malicious
            activity. In network related attack, the intention of an adversary is to destruct overall performance of network
            by intentionally dropping data packets, energy drain and reporting incorrect sensed data. Such attacks can be
            detected and prevented by trust management system. For example, a black-hole attack intentionally drops all
            the received packets, which in results degrade the overall network performance in terms of Packet Delivery
            Ratio (PDR). Yet another way to characterize attacks is based on perspective of the efficacy of countermeasure,
            such as, traditional security solutions and trust based security solutions, to prevent attacks.




                                                                                                           15
   18   19   20   21   22   23   24   25   26   27   28