An agent-based method for trust graph calculation in resource constrained environments

Alcarria Garrido, Ramón Pablo ORCID: https://orcid.org/0000-0002-1183-9579, Bordel Sánchez, Borja ORCID: https://orcid.org/0000-0001-7815-5924, Martín de Andrés, Diego ORCID: https://orcid.org/0000-0001-8810-0695 and Rivera Pinto, Diego ORCID: https://orcid.org/0000-0002-7076-9048 (2020). An agent-based method for trust graph calculation in resource constrained environments. "Integrated Computer-Aided Engineering", v. 27 (n. 1); pp. 37-56. ISSN 10692509. https://doi.org/10.3233/ICA-190604.

Descripción

Título: An agent-based method for trust graph calculation in resource constrained environments
Autor/es:
Tipo de Documento: Artículo
Título de Revista/Publicación: Integrated Computer-Aided Engineering
Fecha: 1 Febrero 2020
ISSN: 10692509
Volumen: 27
Número: 1
Materias:
Palabras Clave Informales: Trust, Security, Resource constrained environments, Graphs, Pruning algorithm
Escuela: E.T.S.I. de Sistemas Informáticos (UPM)
Departamento: Sistemas Informáticos
Licencias Creative Commons: Reconocimiento - Sin obra derivada - No comercial

Texto completo

[thumbnail of 6010662.pdf] PDF (Portable Document Format) - Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (1MB)

Resumen

In future resource constrained systems such as Industry 4.0 and Cyber-Physical Systems, thousands of resource constrained embedded devices communicate in order to reach a common objective. Information, then, is processed and transformed several times since it is acquired at physical level until it is received by user applications. Moreover, usually, each component in an current engineered system has almost no information about the other deployed modules. In that way, any malicious component may severely affect systems through the modification of operation data, as high-level applications can check the validity of received information in a hard way. Therefore, future technological components should only communicate with other trustworthy modules. Typically, solutions to address this problem are based on heavy technologies (such as certificates) which do not fulfil the requirements of embedded devices making up future systems. Thus, in this paper, a light computational solution to calculate the graph representing the trustworthy routes through which an application may obtain information is provided. Systems are represented as directed graphs, and untrustworthy branches are identified based on probability offered by a biparametric stochastic process (which is estimated by means an agent-based solution, consisting of a static and a mobile agent). Untrustworthy paths are also pruned following a hierarchical and scalable process. The proposed solution is based on the execution of some elemental requests whose response is known. Using the NS3 simulator, virtualization technologies and TAP bridges, the proposed algorithm is validated in a simulation scenario representing a real deployment.

Proyectos asociados

Tipo
Código
Acrónimo
Responsable
Título
Gobierno de España
TEC2015-68284-R
SEMOLA
Sin especificar
Sin especificar

Más información

ID de Registro: 85530
Identificador DC: https://oa.upm.es/85530/
Identificador OAI: oai:oa.upm.es:85530
URL Portal Científico: https://portalcientifico.upm.es/es/ipublic/item/6010662
Identificador DOI: 10.3233/ICA-190604
URL Oficial: https://journals.sagepub.com/doi/full/10.3233/ICA-...
Depositado por: iMarina Portal Científico
Depositado el: 22 Ene 2025 17:33
Ultima Modificación: 22 Ene 2025 17:33