About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Research Article

Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy

Download(Requires a free EAI acccount)
287 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-23829-6_39,
        author={Jinqiao Shi and Xiao Wang and Binxing Fang and Qingfeng Tan and Li Guo},
        title={Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I},
        proceedings_a={SECURECOMM},
        year={2015},
        month={11},
        keywords={Service accessibility Resource Trust management Resource distribution Sybil attack},
        doi={10.1007/978-3-319-23829-6_39}
    }
    
  • Jinqiao Shi
    Xiao Wang
    Binxing Fang
    Qingfeng Tan
    Li Guo
    Year: 2015
    Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23829-6_39
Jinqiao Shi,*, Xiao Wang,*, Binxing Fang,*, Qingfeng Tan,*, Li Guo,*
    *Contact email: shijinqiao@iie.ac.in, wangxiao@nelmail.iie.ac.in, fangbinxing@iie.ac.in, tanqingfeng@iie.ac.in, guoli@iie.ac.in

    Abstract

    Along with the rapid development of Internet, accessibility has become one of the most basic and important requirements for Internet service. Service resource, the knowledge that can help users get access to the service finally, is the focus of accessibility confrontation between the adversary and Internet services. Most of current resource distribution strategies adopt the “many access points” design and limit the number of service resources distributed to any user. However, current design is vulnerable to enumeration attack where an adversary can enumerate many service resources under the disguise of many pseudonyms (Sybil identities). To mitigate this challenge, an adaptive resource distribution strategy based on trust management is proposed in this paper. Under this strategy, user’s trust is adjusted according to his behavior. Both client puzzle and the resources assigned to the user are dynamically generated according to his trust value. Simulation result indicates that, this strategy can distinguish honest users from adversary Sybils, thus increasing the difficulty for an attacker to enumerate service resources while ensuring access to service for honest users.

    Keywords
    Service accessibility Resource Trust management Resource distribution Sybil attack
    Published
    2015-11-23
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-319-23829-6_39
    Copyright © 2014–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL