The derived using the Dempster–Shafer theory . 6thSense

The distinctive features of ad hoc networks (MANETs), including dynamic topology and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. Tang and Wei propose a trust management scheme cite{related_trust} that enhances the security in MANETs.

In the proposed trust management scheme, the trust model has two components: trust from direct observation using Baesyan inference scheme and trust from indirect observation derived using the Dempster–Shafer theory . 6thSense is a context-aware intrusion detection system which enhances the security of smart devices by observing changes in sensor data for different tasks of users and creating a contextual model to distinguish benign and malicious behaviour of sensors. cite{related_sense} 6th Sense utilizes three different Machine Learning based detection mechanisms (i.e., Markov Chain, Naive Bayes,and LMT)to detect malicious behaviour associated with sensors.SmartAuth automatically collects security-relevant information from an IoT app’s description cite{related_auth_centered}, code and annotations and generates an authorization user interface to bridge the gap between the functionalities explained to the user and the operations the app actually performs. Through the interface, security policies can be generated and enforced by enhancing existing platforms.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Demmler, Thomas Schneider and Michael Zohner cite{related_tokens} optimize and implement the secure computation protocol by Goldreich-MicaliWigderson (GMW) on mobile phones.  They extend the protocol by a trusted hardware token (i.e.

, a smart-card), develop and analyse a proof of-concept implementation of generic secure two-party computation on Android smart phones.A system for verifying in near real-time that a cryptographic client’s message sequence is consistent with its known implementation was implemented by Chi and Cochran cite{related_Crypto}. They accomplish this without knowing all of the client-side inputs driving its behaviour. The used tool-chain for verifying a client’s messages explores multiple candidate execution paths in the client concurrently, an innovation useful for aspects of certain cryptographic protocols such as message padding from TLS 1.3 .


I'm Mary!

Would you like to get a custom essay? How about receiving a customized one?

Check it out