Javascript must be enabled to continue!
Network Support Layers Trustworthiness Computation for Wireless Networks
View through CrossRef
In wireless communications, trustworthiness computation has emerged as a crucial aspect of safeguarding modern systems against cybersecurity threats, ensuring reliable data transmission and upholding user trust. However, there is no unified definition of trustworthiness computation in the literature, and it is often presented as a specifically tailored adaptation of attack detection mechanisms. In contrast, this work introduces a general method for trustworthiness computation in wireless networks. It leverages key system characteristics, such as the channel, timing, and packet information to identify measurable Quality of Service (QoS) features with sufficient sensitivity across varying operational conditions. Building on these features, a novel three-step approach is applied. It employs changepoint detection to identify potential trustworthiness issues, calculates indicators based on the observed features, and finally combines them into a quantitative representation of trustworthiness. This systematic method effectively distinguishes between regular statistical variations in QoS features and actual trustworthiness issues. The applicability of the presented approach is demonstrated using a typical IEEE 802.11 wireless link, where different QoS features and scenarios are defined. These scenarios include network attacks, system malfunctions, and typical operational conditions. Our trustworthiness computation method correctly alerts the system to all trustworthiness issues that we challenge it with.
Institute of Electrical and Electronics Engineers (IEEE)
Title: Network Support Layers Trustworthiness Computation for Wireless Networks
Description:
In wireless communications, trustworthiness computation has emerged as a crucial aspect of safeguarding modern systems against cybersecurity threats, ensuring reliable data transmission and upholding user trust.
However, there is no unified definition of trustworthiness computation in the literature, and it is often presented as a specifically tailored adaptation of attack detection mechanisms.
In contrast, this work introduces a general method for trustworthiness computation in wireless networks.
It leverages key system characteristics, such as the channel, timing, and packet information to identify measurable Quality of Service (QoS) features with sufficient sensitivity across varying operational conditions.
Building on these features, a novel three-step approach is applied.
It employs changepoint detection to identify potential trustworthiness issues, calculates indicators based on the observed features, and finally combines them into a quantitative representation of trustworthiness.
This systematic method effectively distinguishes between regular statistical variations in QoS features and actual trustworthiness issues.
The applicability of the presented approach is demonstrated using a typical IEEE 802.
11 wireless link, where different QoS features and scenarios are defined.
These scenarios include network attacks, system malfunctions, and typical operational conditions.
Our trustworthiness computation method correctly alerts the system to all trustworthiness issues that we challenge it with.
Related Results
ACM SIGCOMM computer communication review
ACM SIGCOMM computer communication review
At some point in the future, how far out we do not exactly know, wireless access to the Internet will outstrip all other forms of access bringing the freedom of mobility to the way...
Network Support Layers Trustworthiness Computation for Wireless Networks
Network Support Layers Trustworthiness Computation for Wireless Networks
In wireless communications, trustworthiness computation has emerged as a crucial aspect of safeguarding modern systems against cybersecurity threats, ensuring reliable data transmi...
Breast Self-Examination System Using Multifaceted Trustworthiness: Observational Study (Preprint)
Breast Self-Examination System Using Multifaceted Trustworthiness: Observational Study (Preprint)
BACKGROUND
Breast cancer is the leading cause of mortality among women worldwide. However, female patients often feel reluctant and embarrassed about meetin...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Transportation mobility management
Transportation mobility management
Today, the world has observed a remarkable growth in the use of transportation mobile communications for road safety. While a user in a vehicle moves to a new communication cell, a...
Effects of sex and appearance on trust and trustworthiness
Effects of sex and appearance on trust and trustworthiness
The ability to trust other individuals, including strangers, is a prerequisite for human cooperation. Economically it is not rational to trust others, as trust can be easily exploi...
Implicit bias and experience influence overall but not relative trustworthiness judgment of other-race faces
Implicit bias and experience influence overall but not relative trustworthiness judgment of other-race faces
Impressions of trustworthiness are formed quickly from faces. To what extent are these impressions shared among observers of the same or different races? Although high consensus of...
Implicit bias and experience influence overall but not relative trustworthiness judgment of other-race faces
Implicit bias and experience influence overall but not relative trustworthiness judgment of other-race faces
AbstractImpressions of trustworthiness are formed quickly from faces. To what extent are these impressions shared among observers of the same or different races? Although high cons...

