Texto completo
|
PDF (Portable Document Format)
- Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (1MB) |
ORCID: https://orcid.org/0000-0002-1183-9579, Bordel Sánchez, Borja
ORCID: https://orcid.org/0000-0001-7815-5924, Martín de Andrés, Diego
ORCID: https://orcid.org/0000-0001-8810-0695 and Rivera Pinto, Diego
ORCID: https://orcid.org/0000-0002-7076-9048
(2020).
An agent-based method for trust graph calculation in resource constrained environments.
"Integrated Computer-Aided Engineering", v. 27
(n. 1);
pp. 37-56.
ISSN 10692509.
https://doi.org/10.3233/ICA-190604.
| Título: | An agent-based method for trust graph calculation in resource constrained environments |
|---|---|
| Autor/es: |
|
| Tipo de Documento: | Artículo |
| Título de Revista/Publicación: | Integrated Computer-Aided Engineering |
| Fecha: | 1 Febrero 2020 |
| ISSN: | 10692509 |
| Volumen: | 27 |
| Número: | 1 |
| Materias: | |
| Palabras Clave Informales: | Trust, Security, Resource constrained environments, Graphs, Pruning algorithm |
| Escuela: | E.T.S.I. de Sistemas Informáticos (UPM) |
| Departamento: | Sistemas Informáticos |
| Licencias Creative Commons: | Reconocimiento - Sin obra derivada - No comercial |
|
PDF (Portable Document Format)
- Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (1MB) |
In future resource constrained systems such as Industry 4.0 and Cyber-Physical Systems, thousands of resource constrained embedded devices communicate in order to reach a common objective. Information, then, is processed and transformed several times since it is acquired at physical level until it is received by user applications. Moreover, usually, each component in an current engineered system has almost no information about the other deployed modules. In that way, any malicious component may severely affect systems through the modification of operation data, as high-level applications can check the validity of received information in a hard way. Therefore, future technological components should only communicate with other trustworthy modules. Typically, solutions to address this problem are based on heavy technologies (such as certificates) which do not fulfil the requirements of embedded devices making up future systems. Thus, in this paper, a light computational solution to calculate the graph representing the trustworthy routes through which an application may obtain information is provided. Systems are represented as directed graphs, and untrustworthy branches are identified based on probability offered by a biparametric stochastic process (which is estimated by means an agent-based solution, consisting of a static and a mobile agent). Untrustworthy paths are also pruned following a hierarchical and scalable process. The proposed solution is based on the execution of some elemental requests whose response is known. Using the NS3 simulator, virtualization technologies and TAP bridges, the proposed algorithm is validated in a simulation scenario representing a real deployment.
| ID de Registro: | 85530 |
|---|---|
| Identificador DC: | https://oa.upm.es/85530/ |
| Identificador OAI: | oai:oa.upm.es:85530 |
| URL Portal Científico: | https://portalcientifico.upm.es/es/ipublic/item/6010662 |
| Identificador DOI: | 10.3233/ICA-190604 |
| URL Oficial: | https://journals.sagepub.com/doi/full/10.3233/ICA-... |
| Depositado por: | iMarina Portal Científico |
| Depositado el: | 22 Ene 2025 17:33 |
| Ultima Modificación: | 22 Ene 2025 17:33 |
Publicar en el Archivo Digital desde el Portal Científico