{"title":"基于下一代社交网络的无线移动AD HOC网络中信任和信任管理协议的定量建模","authors":"Y. Malhotra","doi":"10.2139/SSRN.2539180","DOIUrl":null,"url":null,"abstract":"Trust and trust management represent the very foundations of Computer and Network Security Protocols enabling all cyber activities. The recent spate of national and global high-impact cyber security compromises threats, vulnerabilities and exposures leads to fundamental questioning of trust as the key enabler of all cyber phenomena in the unfolding era of exponentially increasing distrust. It is, therefore, necessary to understand the current state of trust and trust management modeling and implementation in the most high security environments such as in defense and space. Such understanding can serve as a foundation for modeling, design and implementation of next-generation mobile wireless networks for other high security environments such as in banking and finance. This study attempts to understand how trust and trust management are being modeled for the next-generation wireless communication systems (NIST) such as autonomous self-discovering, self-organizing and self-adaptive mobile ad hoc networks. Within the context of Network-Centric Operations (NCO), the paper examines (i) the capabilities of next-generation wireless mobile ad hoc networks; (ii) how trust and trust management are modeled in such mobile ad hoc networks; and (iii) how trust and trust management are implemented in trust-based task assignment in tactical networks. US Army Research Laboratory (ARL) Computational and Information Sciences Directorate’s Network Science research program on wireless mobile ad hoc networks is the focus of the case study.","PeriodicalId":154248,"journal":{"name":"Interorganizational Networks & Organizational Behavior eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Quantitative Modeling of Trust and Trust Management Protocols in Next-Generation Social Networks-Based Wireless Mobile AD HOC Networks\",\"authors\":\"Y. Malhotra\",\"doi\":\"10.2139/SSRN.2539180\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Trust and trust management represent the very foundations of Computer and Network Security Protocols enabling all cyber activities. The recent spate of national and global high-impact cyber security compromises threats, vulnerabilities and exposures leads to fundamental questioning of trust as the key enabler of all cyber phenomena in the unfolding era of exponentially increasing distrust. It is, therefore, necessary to understand the current state of trust and trust management modeling and implementation in the most high security environments such as in defense and space. Such understanding can serve as a foundation for modeling, design and implementation of next-generation mobile wireless networks for other high security environments such as in banking and finance. This study attempts to understand how trust and trust management are being modeled for the next-generation wireless communication systems (NIST) such as autonomous self-discovering, self-organizing and self-adaptive mobile ad hoc networks. Within the context of Network-Centric Operations (NCO), the paper examines (i) the capabilities of next-generation wireless mobile ad hoc networks; (ii) how trust and trust management are modeled in such mobile ad hoc networks; and (iii) how trust and trust management are implemented in trust-based task assignment in tactical networks. US Army Research Laboratory (ARL) Computational and Information Sciences Directorate’s Network Science research program on wireless mobile ad hoc networks is the focus of the case study.\",\"PeriodicalId\":154248,\"journal\":{\"name\":\"Interorganizational Networks & Organizational Behavior eJournal\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Interorganizational Networks & Organizational Behavior eJournal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/SSRN.2539180\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Interorganizational Networks & Organizational Behavior eJournal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/SSRN.2539180","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Quantitative Modeling of Trust and Trust Management Protocols in Next-Generation Social Networks-Based Wireless Mobile AD HOC Networks
Trust and trust management represent the very foundations of Computer and Network Security Protocols enabling all cyber activities. The recent spate of national and global high-impact cyber security compromises threats, vulnerabilities and exposures leads to fundamental questioning of trust as the key enabler of all cyber phenomena in the unfolding era of exponentially increasing distrust. It is, therefore, necessary to understand the current state of trust and trust management modeling and implementation in the most high security environments such as in defense and space. Such understanding can serve as a foundation for modeling, design and implementation of next-generation mobile wireless networks for other high security environments such as in banking and finance. This study attempts to understand how trust and trust management are being modeled for the next-generation wireless communication systems (NIST) such as autonomous self-discovering, self-organizing and self-adaptive mobile ad hoc networks. Within the context of Network-Centric Operations (NCO), the paper examines (i) the capabilities of next-generation wireless mobile ad hoc networks; (ii) how trust and trust management are modeled in such mobile ad hoc networks; and (iii) how trust and trust management are implemented in trust-based task assignment in tactical networks. US Army Research Laboratory (ARL) Computational and Information Sciences Directorate’s Network Science research program on wireless mobile ad hoc networks is the focus of the case study.