Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN
gráficos, ilustraciones, tablas
- Autores:
-
Molano Saavedra, Manuel Leoned
- Tipo de recurso:
- Fecha de publicación:
- 2021
- Institución:
- Universidad Nacional de Colombia
- Repositorio:
- Universidad Nacional de Colombia
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.unal.edu.co:unal/80324
- Palabra clave:
- 620 - Ingeniería y operaciones afines
MANETs
Seguridad informática
Seguridad de la información
Sistemas distribuidos
Computación social-inspirada
MANETs
Computer security
Information security
Distributed systems
Social computing
- Rights
- openAccess
- License
- Atribución-NoComercial 4.0 Internacional
id |
UNACIONAL2_cf5bc872f2ebd024b5b40e818e27d0b2 |
---|---|
oai_identifier_str |
oai:repositorio.unal.edu.co:unal/80324 |
network_acronym_str |
UNACIONAL2 |
network_name_str |
Universidad Nacional de Colombia |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN |
dc.title.translated.eng.fl_str_mv |
Information security module, social-inspired and oriented towards the objective of integrity in MANETs within the context of the TLÖN distributed computing system |
title |
Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN |
spellingShingle |
Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN 620 - Ingeniería y operaciones afines MANETs Seguridad informática Seguridad de la información Sistemas distribuidos Computación social-inspirada MANETs Computer security Information security Distributed systems Social computing |
title_short |
Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN |
title_full |
Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN |
title_fullStr |
Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN |
title_full_unstemmed |
Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN |
title_sort |
Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN |
dc.creator.fl_str_mv |
Molano Saavedra, Manuel Leoned |
dc.contributor.advisor.none.fl_str_mv |
Ortiz Triviño Ph.D., Jorge EduardoMsc. |
dc.contributor.author.none.fl_str_mv |
Molano Saavedra, Manuel Leoned |
dc.contributor.educationalvalidator.none.fl_str_mv |
Zarate Ceballos Ph.D. Msc., Henry |
dc.contributor.researchgroup.spa.fl_str_mv |
Computación aplicada - Seguridad informática |
dc.subject.ddc.spa.fl_str_mv |
620 - Ingeniería y operaciones afines |
topic |
620 - Ingeniería y operaciones afines MANETs Seguridad informática Seguridad de la información Sistemas distribuidos Computación social-inspirada MANETs Computer security Information security Distributed systems Social computing |
dc.subject.proposal.spa.fl_str_mv |
MANETs Seguridad informática Seguridad de la información Sistemas distribuidos Computación social-inspirada |
dc.subject.proposal.eng.fl_str_mv |
MANETs Computer security Information security Distributed systems Social computing |
description |
gráficos, ilustraciones, tablas |
publishDate |
2021 |
dc.date.accessioned.none.fl_str_mv |
2021-09-28T15:46:39Z |
dc.date.available.none.fl_str_mv |
2021-09-28T15:46:39Z |
dc.date.issued.none.fl_str_mv |
2021-08-01 |
dc.type.spa.fl_str_mv |
Trabajo de grado - Maestría |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/masterThesis |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/acceptedVersion |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/TM |
status_str |
acceptedVersion |
dc.identifier.uri.none.fl_str_mv |
https://repositorio.unal.edu.co/handle/unal/80324 |
dc.identifier.instname.spa.fl_str_mv |
Universidad Nacional de Colombia |
dc.identifier.reponame.spa.fl_str_mv |
Repositorio Institucional Universidad Nacional de Colombia |
dc.identifier.repourl.spa.fl_str_mv |
https://repositorio.unal.edu.co/ |
url |
https://repositorio.unal.edu.co/handle/unal/80324 https://repositorio.unal.edu.co/ |
identifier_str_mv |
Universidad Nacional de Colombia Repositorio Institucional Universidad Nacional de Colombia |
dc.language.iso.spa.fl_str_mv |
spa |
language |
spa |
dc.relation.references.spa.fl_str_mv |
[1] M. Van Steen and A. S. Tanenmabum. Distributed Systems, vol. 01. 2017. [2] P. Brody and V. Pureswaran, “Device democracy: Saving the future of the Internet of Things IBM,” IBM Glob. Bus. Serv. Exec. Rep., 2015, [Online]. Available: http://m2mworldnews.com/download/white-papers/IBM-Saving-the-future-of-IoT.pdf. [3] Ericsson, “Mobility Report,” White Pap., no. May, pp. 7–8, 2016, doi: 10.3103/S0005105510050031. [4] R. Helmus and J. Grabenhofer, “TURNING THE INTERNET OF THINGS INTO REALITY: A practical approach to your unique IoT journey,” p. 30, 2019, [Online]. Available: https://assets.new.siemens.com/siemens/assets/api/uuid:131ac2f9-5e8b-4968-ba2f-734eefccdb50/version:1556633115/turning-iot-into-reality-whitepaper-by-siemens-iot-services-fina.pdf. [5] E. M. Royer and C.-K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks,” Pers. Commun. IEEE, vol. 6, no. 2, pp. 46–55, 1999, doi: 10.1109/98.760423. [6] S. R. Surya and G. A. Magrica, “A survey on wireless networks attacks,” in 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), Feb. 2017, pp. 240–247, doi: 10.1109/ICCCT2.2017.7972278. [7] K. Shcwab, The Fourth Industrial Revolution, no. 1. CH-1223 Cologny/Geneva: World Economic Forum, 2016. [8] D. O. M. Thomas W. Edgar, Research Methods for Cyber Security. 2017. [9] I. E. T. Force, “RFC 4949 Internet Engineering Task Force,” RFC 4949, 2007. [10] C. C. C. Chigan and R. Bandaru, “Secure node misbehaviors in mobile ad hoc networks,” IEEE 60th Veh. Technol. Conf. 2004. VTC2004-Fall. 2004, vol. 7, pp. 4730–4734, 2004, doi: 10.1109/VETECF.2004.1404990. [11] J. E. Ortiz-Triviñio, H. Zárate-Ceballos, J. F. Sanchez-Cifuentes, and J. P. Ospina-López, “Sistema de Telecomunicaciones Social-Inspirado mediante Comunidades de Agentes,” Cicom, p. 1, 2015. [12] J. P. Ospina-López and J. E. Ortiz-Triviñio, “Characterization of a cluster and its resources in an Ad-Hoc network starting from the truncated geometric distribution,” ITECKNE Innovación e Investig. en Ing., vol. 12, no. 1, pp. 68–75, 2015. [13] H. Zárate Ceballos, “Diseño de un Sub-Sistema de Cómputo Distribuido que permita implementar virtualización inalámbrica para gestionar recursos (Procesamiento, memoria, almacenamiento y dispositivos E/S) distribuidos en una Red Ad Hoc, mediante el modelo de pseudo Esta,” 2018. [14] J. P. O. López, H. Z. Ceballos, and J. E. O. Triviño, “Scalability in ad hoc networks under hierarchical architectures,” 2015 IEEE Colomb. Conf. Commun. Comput. COLCOM 2015 - Conf. Proc., 2015, doi: 10.1109/ColComCon.2015.7152087. [15] J. Alexander and J. E. Ortiz, “Diseñ o Socio-inspirado de la M á quina Virtual Distribuida ( Ö rbis Virt ü alis Maqüinus Ö VM ) para la red Ad-Hoc TL Ö N,” no. 45. [16] J. P. Ospina-López and J. E. Ortiz-Triviño, “Estimation of a Growth Factor to Achieve Scalable ad hoc Networks,” Ing. Univ., vol. 21, no. 1, pp. 49–70, 2017, doi: 10.11144/ Javeriana.iyu21-1.egfa. [17] J. F. Sánchez, J. P. Ospina, J. E. Gonzalez, and J. E. Ortiz, “Sociability as a decision model for artificial agents,” pp. 1–8, 2017. [18] C. A. Gomez and J. E. Ortiz, “A greener method for content sharing in mobile ad hoc networks,” in 2010 IEEE Latin-American Conference on Communications, Sep. 2010, pp. 1–6, doi: 10.1109/LATINCOM.2010.5640998. [19] J. E. P. Amaris, A. C. C. Hurtado, and J. E. O. Trivino, “Bacteria agent colony inside an ad-hoc network,” 2015 10th Comput. Colomb. Conf., pp. 347–350, 2015, doi: 10.1109/ColumbianCC.2015.7333444. [20] F. Téllez and J. Ortiz, “Behavior of Elliptic Curve Cryptosystems for the Wormhole Intrusion in MANET : A Survey and Analysis,” J. Comput. Sci., vol. 11, no. 9, pp. 1–12, 2011. [21] TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos, “TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos,” 2020, 2020. http://tlon.unal.edu.co/. [22] Z. Henry, J. Eduardo, and O. Triviño, “S . O . V . O . R . A .: A Distributed Wireless,” 2020. [23] F. Ahmed, S. Robinson, and A. A. Tako, “Using the structred analysis and design technique (SADT) in simulation conceptual modeling,” in Proceedings of the Winter Simulation Conference 2014, Dec. 2014, no. 1983, pp. 1038–1049, doi: 10.1109/WSC.2014.7019963. [24] D. D. Clark and D. R. Wilson, “A Comparison of Commercial and Military Computer Security Policies,” pp. 184–184, 2015, doi: 10.1109/sp.1987.10001. [25] F. Edition, CISSP: The Official (ISC)2 CISSP CBK Reference. 2019. [26] S. Beissel, Cybersecurity Investments. 2016. [27] M. M. Alani, “MANET security: A survey,” Proc. - 4th IEEE Int. Conf. Control Syst. Comput. Eng. ICCSCE 2014, no. November, pp. 559–564, 2014, doi: 10.1109/ICCSCE.2014.7072781. [28] ISO, “SO/IEC27001,” Int. Organ. Stand., vol. 27001, 2013. [29] ISO, “ISO/IEC 27002 2013,” Internation Organization for Standardization. 2013. [30] NIST, “Framework for Improving Critical Infrastructure Cybersecurity,” 2018, doi: 10.6028/NIST.CSWP.04162018. [31] ISACA, COBIT 5. 2012. [32] I. Response, “Security Leadership Five Keys for Building a Five Keys for Building a Cybersecurity Program.” [33] Common Criteria, “Common Methodology for Information Technology Security Evaluation Evaluation methodology April 2017 Revision 5 Foreword,” Common Criteria, no. April, 2017. [34] T. Hobbes, El Leviatán. 1651. [35] The Open Group, “The TOGAF® Standard, Version 9.2.” . [36] John Zachman, “About the Zachman Framework.” . [37] “Open Security Architecture.” http://www.opensecurityarchitecture.org/cms/. [38] “SABSA Executive Summary - The SABSA Institute.” https://sabsa.org/sabsa-executive-summary/. [39] J. Sherwood, A. Clark, and D. Lynas, Enterprise security architecture a business-driven approach, vol. 21, no. 4. 2005. [40] Serge Haddad Fabrice Kordon Laurent Pautet Laure Petrucci, Distributed Systems: Design and algorithms, vol. 28, no. 11. John Wiley & Sons, Inc., 2011. [41] R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. 2008. [42] D. Harinath, P. Satyanarayana, and M. V. R. Murthy, “A Review on Security Issues and Attacks in Distributed Systems,” J. Adv. Inf. Technol., vol. 8, no. 1, pp. 1–9, 2017, doi: 10.12720/jait.8.1.1-9. [43] S. Gilbert and N. Lynch, “Perspectives on the CAP Theorem,” Computer (Long. Beach. Calif)., vol. 45, no. 2, pp. 30–36, 2012, doi: 10.1109/mc.2011.389. [44] S. M. Specht and R. B. Lee, “Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures,” Int. Work. Secur. Parallel Distrib. Syst., no. 9, pp. 543–550, 2004, doi: 10.1.1.133.4566. [45] V. Krasnoproshin and T. Galibus, “Conceptual distributed system models and organization of security mechanisms,” Proc. 2015 IEEE 8th Int. Conf. Intell. Data Acquis. Adv. Comput. Syst. Technol. Appl. IDAACS 2015, vol. 1, no. September, pp. 432–435, 2015, doi: 10.1109/IDAACS.2015.7340773. [46] M. D. Vijay Prakash, “A Review on Security Issues in Distributed Systems,” in International Journal of Scientific & Engineering Research, Volume 3,., vol. 3, no. 9, International Journal of Scientific & Engineering Research Volume 3, Issue 9, September-2012, 2012. [47] V. Hoa La and A. Cavalli, “Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey,” Int. J. AdHoc Netw. Syst., vol. 4, no. 2, pp. 1–20, Apr. 2014, doi: 10.5121/ijans.2014.4201. [48] M. Mauve, J. Widmer, and H. Hartenstein, “A survey on position-based routing in mobile ad hoc networks,” Network, IEEE, vol. 15, no. 6, pp. 30–39, 2001, doi: 10.1109/65.967595. [49] I. Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile ad hoc networking: Imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, 2003, doi: 10.1016/S1570-8705(03)00013-1. [50] D. Djenouri, L. Khelladi, and a N. Badache, “A survey of security issues in mobile ad hoc and sensor networks,” IEEE Commun. Surv. Tutorials, vol. 7, no. 4, pp. 2–28, 2005, doi: 10.1109/COMST.2005.1593277. [51] I. Akyildiz and X. Wang, “A survey on wireless mesh networks,” Commun. Mag. IEEE, no. September, pp. 23–30, 2005, doi: 10.1109/MCOM.2005.1509968. [52] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: A survey,” Comput. Networks, vol. 47, no. 4, pp. 445–487, 2005, doi: 10.1016/j.comnet.2004.12.001. [53] J. Usmani, R. Kumar, and J. Prakash, “A survey on secure gateway discovery in MANET,” in 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence, Jan. 2017, pp. 362–368, doi: 10.1109/CONFLUENCE.2017.7943176. [54] P. R. . Arun Kumar. R, Abhishek M. K, Tejashwini. A. I, Niranjan J. T, “A Review on Intrusion Detection Systems in MANET,” Int. J. Eng. Sci. Innov. Technol. Vol. 2, Issue 2, March 2013, vol. 2, no. 2, pp. 453–459, 2013, [Online]. Available: http://www.ijesit.com/Volume 2/Issue 2/IJESIT201302_96.pdf. [55] L. Abusalah, A. Khokhar, and M. Guizani, “A survey of secure mobile Ad Hoc routing protocols,” IEEE Commun. Surv. Tutorials, vol. 10, no. 4, pp. 78–93, 2008, doi: 10.1109/SURV.2008.080407. [56] L. Zhou and Z. J. Hass, “Securing Ad Hoc Networks,” IEEE Netw., vol. 13, no. 6, pp. 24–30, 1999, doi: 10.1109/65.806983. [57] E. Alotaibi and B. Mukherjee, “A survey on routing algorithms for wireless Ad-Hoc and mesh networks,” Comput. Networks, vol. 56, no. 2, pp. 940–965, 2012, doi: 10.1016/j.comnet.2011.10.011. [58] I. Bekmezci, O. K. Sahingoz, and Ş. Temel, “Flying Ad-Hoc Networks (FANETs): A survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–1270, 2013, doi: 10.1016/j.adhoc.2012.12.004. [59] S. Aluvala, K. R. Sekhar, and D. Vodnala, “An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks,” Procedia Comput. Sci., vol. 92, pp. 554–561, 2016, doi: 10.1016/j.procs.2016.07.382. [60] Congzhe Zhang, MengChu Zhou1, and Ming Yu, “Ad hoc network routing and security: A review,” Int. J. Commun. Syst., vol. 20, no. 8, pp. 909–925, 2007, doi: 10.1002/dac.840. [61] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” Wirel. Commun. IEEE, vol. 11, no. February, pp. 38–47, 2004, doi: 10.1109/MWC.2004.1269716. [62] A. Dorri and S. R. Kamel, “Security Challenges in Mobile Ad Hoc Networks: A Survey,” Int. J. Comput. Sci. Eng. Surv., vol. 6, no. 1, pp. 15–29, 2015, doi: 10.5121/ijcses.2015.6102. [63] S. Jain, “Security Threats in Manets: A Review,” Int. J. Inf. Theory, vol. 3, no. 2, pp. 37–50, Apr. 2014, doi: 10.5121/ijit.2014.3204. [64] A. K. Abdelaziz, M. Nafaa, and G. Salim, “Survey of routing attacks and countermeasures in mobile ad hoc networks,” Proc. - UKSim 15th Int. Conf. Comput. Model. Simulation, UKSim 2013, pp. 693–698, 2013, doi: 10.1109/UKSim.2013.48. [65] E. Amiri, H. Keshavarz, H. Heidari, E. Mohamadi, and H. Moradzadeh, “Intrusion Detection Systems in MANET: A Review,” Procedia - Soc. Behav. Sci., vol. 129, pp. 453–459, 2014, doi: 10.1016/j.sbspro.2014.03.700. [66] O. Rodas, M. A. To, J. Alvarez, and S. Maag, “Protecting Wireless Mesh Networks through a distributed intrusion prevention framework,” 2015 7th IEEE Latin-American Conf. Commun. LATINCOM 2015, pp. 1–6, 2016, doi: 10.1109/LATINCOM.2015.7430126. [67] J. A. Goncalves, V. S. Faria, G. B. Vieira, C. A. M. Silva, and D. M. Mascarenhas, “WIDIP: Wireless distributed IPS for DDoS attacks,” 2017 1st Cyber Secur. Netw. Conf. CSNet 2017, vol. 2017-Janua, pp. 1–3, 2017, doi: 10.1109/CSNET.2017.8241996. [68] M. Buvaneswari and T. Subha, “IHoneycol: A distributed collaborative approach for mitigation of DDoS attack,” 2013 Int. Conf. Inf. Commun. Embed. Syst. ICICES 2013, pp. 340–345, 2013, doi: 10.1109/ICICES.2013.6508281. [69] R. P. Foundation, “Raspberry Pi,” 2021, 2021. https://www.raspberrypi.org/about/. [70] Open Mesh, “BATMAN - Adv. Protocol concept,” 2021. https://www.open-mesh.org/projects/batman-adv/wiki/Protocol_information. [71] O. Mesh, “Open Mesh - Batman Adv. Routing scenarios,” 2021. https://www.open-mesh.org/doc/open-mesh/Routing_scenarios.html. [72] OpenMesh, “ALFRED,” 2021. https://www.open-mesh.org/projects/alfred/wiki. [73] Linux Foundation, “Linux Netem,” 2021. https://wiki.linuxfoundation.org/networking/netem#how_can_i_use_netem_on_incoming_traffic. [74] Avahi, “Avahi,” 2021. https://www.avahi.org/. [75] Docker, “Docker,” 2021. https://www.docker.com/resources/what-container. [76] Python Foundation, “Python,” 2021. https://www.python.org/about/. [77] M. Kumar, A. J. Kulkarni, and S. C. Satapathy, “Socio evolution & learning optimization algorithm: A socio-inspired optimization methodology,” Futur. Gener. Comput. Syst., vol. 81, pp. 252–272, 2018, doi: 10.1016/j.future.2017.10.052. [78] J. Zhang, W. Wang, F. Xia, Y. R. Lin, and H. Tong, “Data-Driven Computational Social Science: A Survey,” Big Data Res., vol. 21, pp. 1–28, 2020, doi: 10.1016/j.bdr.2020.100145. [79] J. F. L. Ochoa, “Compromiso y simpatía: emotividad en la toma de decisiones cooperativas en redes estocásticas de siguiente generación,” 2017, [Online]. Available: http://bdigital.unal.edu.co/59415/. [80] H. Nunoo-Mensah, K. O. Boateng, and J. D. Gadze, “The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: A survey,” Int. J. Commun. Syst., vol. 31, no. 7, pp. 1–18, 2018, doi: 10.1002/dac.3444. [81] H. Yu, Z. Shen, C. Leung, C. Miao, and V. R. Lesser, “A survey of multi-Agent trust management systems,” IEEE Access, vol. 1, no. January 2014, pp. 35–50, 2013, doi: 10.1109/ACCESS.2013.2259892. [82] A. Ferrario, M. Loi, and E. Viganò, “In AI We Trust Incrementally: a Multi-layer Model of Trust to Analyze Human-Artificial Intelligence Interactions,” Philos. Technol., vol. 33, no. 3, pp. 523–539, 2020, doi: 10.1007/s13347-019-00378-3. [83] J.-H. Cho, A. Swami, and I.-R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE Commun. Surv. Tutorials Tutorials, vol. 13, no. 4, pp. 562–583, 2011, doi: 10.1109/SURV.2011.092110.00088. [84] M. Poulshock, “The Foundations of Political Realism,” pp. 1–33, Oct. 2019, doi: 10.7312/burg93494. [85] W. Long, “Escaping the State of Nature: A Hobbesian Approach to Cooperation in Multi-agent Reinforcement Learning,” J. Chem. Inf. Model., vol. 53, no. 9, pp. 1689–1699, Jun. 2019, doi: 10.1017/CBO9781107415324.004. [86] R. Ross, M. McEvilley, and J. C. Oren, “NIST Special Publication 800-160 Volume 1 - Systems security engineering: considerations for a multidisciplinary approach in the engineering of trustworthy secure systems, volume 1,” NIST Spec. Publ., vol. 1, 2018, [Online]. Available: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v1.pdf. [87] E. Cayirci and C. Rong, Security in Wireless Ad Hoc and Sensor Networks, 1st ed. Chippenham: Wiley Publishing, Inc., 2009. [88] O. A. A. Elahe Fazeldehkordi, I.S. Amiri, A Study of Black Hole Attack Solutions, vol. 4333, no. March. 2016. [89] OpenMesh, “JOKER,” 2021. https://www.open-mesh.org/doc/open-mesh/Joker.html. [90] H. Zárate Ceballos, “Diseño de un Sub-Sistema de Cómputo Distribuido que permita implementar virtualización inalámbrica para gestionar recursos (Procesamiento, memoria, almacenamiento y dispositivos E/S) distribuidos en una Red Ad Hoc, mediante el modelo de pseudo Esta,” 2018. [91] P. Bowen, J. Hash, and M. Wilson, “Information Security Handbook: A Guide for Managers NIST Special Publication 800-100,” NIST Spec. Publ. 800-100, no. October, p. 137, 2006, [Online]. Available: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-100.pdf. [92] G. Boella, L. van der Torre, and H. Verhagen, “Introduction to normative multiagent systems,” Comput. Math. Organ. Theory, vol. 12, no. 2-3 SPEC. ISS., pp. 71–79, 2006, doi: 10.1007/s10588-006-9537-7. [93] E. Aizenberg and J. van den Hoven, “Designing for human rights in AI,” Big Data Soc., vol. 7, no. 2, pp. 1–30, 2020, doi: 10.1177/2053951720949566. [94] S. Tomic, F. Pecora, and A. Saffiotti, “Norms , Institutions , and Robots,” vol. 14, no. 8, pp. 1–12, 2015. [95] “Construcción de un módulo de seguridad Informática en el sistema TLÖN que permita tener características de disponibilidad,” Universidad Nacional de Colombia, 2019. [96] A. C. & D. L. John Sherwood, “White Paper - Enterprise Security Architecture,” SABSA, pp. 1–25. [97] A. Checa, “Diseño de un mecanismo de clustering en redes ad hoc para sistemas distribuidos en el contexto del sistema TLÖN,” Repositorio.Unal.Edu.Co, 2019, [Online]. Available: https://repositorio.unal.edu.co/handle/unal/77382. [98] J. F. Sanchez Cifuentes, “Prototipo de un lenguaje de programación para la implementación de servicios a través de comunidades de agentes social inspirados sobre redes Ad-hoc,” 2018. [99] “Open Mesh BATMAN.” https://www.open-mesh.org/doc/batman-adv/index.html. [100] R. Dilli and P. C. S. Reddy, “Implementation of security features in MANETs using SHA-3 standard algorithm,” in 2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016, 2016, pp. 455–458, doi: 10.1109/CSITSS.2016.7779410. [101] J. Granatyr, V. Botelho, O. R. Lessing, E. E. Scalabrin, J. P. Barthes, and F. Enembreck, “Trust and reputation models for multiagent systems,” ACM Comput. Surv., vol. 48, no. 2, 2015, doi: 10.1145/2816826. [102] N. Dhieb, H. Ghazzai, H. Besbes, Y. Massoud, “Scalable and Secure Architecture for DistributedIoT Systems,” 2020 IEEE Technology & Engineering Management Conference (TEMSCON), 2020, doi: 10.1109/TEMSCON47658.2020.9140108. |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.license.spa.fl_str_mv |
Atribución-NoComercial 4.0 Internacional |
dc.rights.uri.spa.fl_str_mv |
http://creativecommons.org/licenses/by-nc/4.0/ |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
Atribución-NoComercial 4.0 Internacional http://creativecommons.org/licenses/by-nc/4.0/ http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.format.extent.spa.fl_str_mv |
149 páginas |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Universidad Nacional de Colombia |
dc.publisher.program.spa.fl_str_mv |
Bogotá - Ingeniería - Maestría en Ingeniería - Ingeniería de Sistemas y Computación |
dc.publisher.department.spa.fl_str_mv |
Departamento de Ingeniería de Sistemas e Industrial |
dc.publisher.faculty.spa.fl_str_mv |
Facultad de Ingeniería |
dc.publisher.place.spa.fl_str_mv |
Bogotá - Colombia |
dc.publisher.branch.spa.fl_str_mv |
Universidad Nacional de Colombia - Sede Bogotá |
institution |
Universidad Nacional de Colombia |
bitstream.url.fl_str_mv |
https://repositorio.unal.edu.co/bitstream/unal/80324/1/license.txt https://repositorio.unal.edu.co/bitstream/unal/80324/3/license_rdf https://repositorio.unal.edu.co/bitstream/unal/80324/4/1030626820.2021.pdf https://repositorio.unal.edu.co/bitstream/unal/80324/5/1030626820.2021.pdf.jpg |
bitstream.checksum.fl_str_mv |
cccfe52f796b7c63423298c2d3365fc6 24013099e9e6abb1575dc6ce0855efd5 4e50fc6b91834d99ea19169f98b85095 3a8f4b5ae6a877bf4bfb74c2ef954725 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional Universidad Nacional de Colombia |
repository.mail.fl_str_mv |
repositorio_nal@unal.edu.co |
_version_ |
1814089380988452864 |
spelling |
Atribución-NoComercial 4.0 Internacionalhttp://creativecommons.org/licenses/by-nc/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Ortiz Triviño Ph.D., Jorge EduardoMsc.3d5059a2e5cefa0237c9955271d5caf5Molano Saavedra, Manuel Leonedb0b9f0d7fce8f8a7adfb02d2ce1b17ecZarate Ceballos Ph.D. Msc., HenryComputación aplicada - Seguridad informática2021-09-28T15:46:39Z2021-09-28T15:46:39Z2021-08-01https://repositorio.unal.edu.co/handle/unal/80324Universidad Nacional de ColombiaRepositorio Institucional Universidad Nacional de Colombiahttps://repositorio.unal.edu.co/gráficos, ilustraciones, tablasEl sistema TLÖN es un sistema cómputo distribuido del tipo móvil y con características social-inspiradas, que está desplegado sobre MANETs. Estas son un tipo de redes inalámbricas que, a diferencia de las redes tradicionales, se caracterizan por no requerir de infraestructura de direccionamiento y/o enrutamiento definido para operar. Esta habilidad para operar sin infraestructura les permite funcionar de forma descentralizada, pero también les permite ejecutar comportamientos distribuidos. El enfoque TLÖN para modelar estos comportamientos distribuidos desde un punto de vista social-inspirado, ha sido la creación de un “estado TLÖN”, cuyo “territorio TLÖN” es asimilado como una MANET, sobre la cual pueden implementarse agentes computacionales actuando como “ciudadanos de TLÖN” y módulos con funcionalidades específicas de regulación de las interacciones entre estos agentes, actuando como “instituciones de TLÖN”. Debido a que generalmente los sistemas computaciones son vulnerables en términos de seguridad informática, este trabajo busca presentar un enfoque de “institución de TLÖN” que pueda abordar los problemas de seguridad en MANETs, particularmente los problemas de integridad relacionados con un ataque a la integridad de la información dentro del contexto del Sistema de Cómputo Distribuido TLÖN. (Texto tomado de la fuente)The TLÖN system is a mobile-type distributed computing system with social-inspired characteristics, which is deployed on MANETs. These are a type of wireless networks that, unlike traditional networks, are characterized by not requiring a defined addressing and / or routing infrastructure to operate. This ability to operate without infrastructure allows them to function in a decentralized way, but it also allows them to execute distributed behaviors. The TLÖN approach to model these distributed behaviors from a social-inspired point of view has been the creation of a “TLÖN state”, whose “TLÖN territory” is assimilated as a MANET, on which computational agents acting as “citizens of TLÖN” can be implemented, and modules with specific functionalities for regulating the interactions between these agents, acting as “TLÖN institutions”. Since computer systems are generally vulnerable in terms of computer security, this paper seeks to present a "TLÖN institution" approach that can address security issues in MANETs, particularly integrity issues related to a security integrity attack, within of the context of the TLÖN Distributed Computing System.TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación DistribuidosMaestríaMagíster en Ingeniería - Ingeniería de Sistemas y ComputaciónInvestigación experimentalComputación Aplicada, Seguridad informática149 páginasapplication/pdfspaUniversidad Nacional de ColombiaBogotá - Ingeniería - Maestría en Ingeniería - Ingeniería de Sistemas y ComputaciónDepartamento de Ingeniería de Sistemas e IndustrialFacultad de IngenieríaBogotá - ColombiaUniversidad Nacional de Colombia - Sede Bogotá620 - Ingeniería y operaciones afinesMANETsSeguridad informáticaSeguridad de la informaciónSistemas distribuidosComputación social-inspiradaMANETsComputer securityInformation securityDistributed systemsSocial computingMódulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖNInformation security module, social-inspired and oriented towards the objective of integrity in MANETs within the context of the TLÖN distributed computing systemTrabajo de grado - Maestríainfo:eu-repo/semantics/masterThesisinfo:eu-repo/semantics/acceptedVersionTexthttp://purl.org/redcol/resource_type/TM[1] M. Van Steen and A. S. Tanenmabum. Distributed Systems, vol. 01. 2017. [2] P. Brody and V. Pureswaran, “Device democracy: Saving the future of the Internet of Things IBM,” IBM Glob. Bus. Serv. Exec. Rep., 2015, [Online]. Available: http://m2mworldnews.com/download/white-papers/IBM-Saving-the-future-of-IoT.pdf. [3] Ericsson, “Mobility Report,” White Pap., no. May, pp. 7–8, 2016, doi: 10.3103/S0005105510050031. [4] R. Helmus and J. Grabenhofer, “TURNING THE INTERNET OF THINGS INTO REALITY: A practical approach to your unique IoT journey,” p. 30, 2019, [Online]. Available: https://assets.new.siemens.com/siemens/assets/api/uuid:131ac2f9-5e8b-4968-ba2f-734eefccdb50/version:1556633115/turning-iot-into-reality-whitepaper-by-siemens-iot-services-fina.pdf. [5] E. M. Royer and C.-K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks,” Pers. Commun. IEEE, vol. 6, no. 2, pp. 46–55, 1999, doi: 10.1109/98.760423. [6] S. R. Surya and G. A. Magrica, “A survey on wireless networks attacks,” in 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), Feb. 2017, pp. 240–247, doi: 10.1109/ICCCT2.2017.7972278. [7] K. Shcwab, The Fourth Industrial Revolution, no. 1. CH-1223 Cologny/Geneva: World Economic Forum, 2016. [8] D. O. M. Thomas W. Edgar, Research Methods for Cyber Security. 2017. [9] I. E. T. Force, “RFC 4949 Internet Engineering Task Force,” RFC 4949, 2007. [10] C. C. C. Chigan and R. Bandaru, “Secure node misbehaviors in mobile ad hoc networks,” IEEE 60th Veh. Technol. Conf. 2004. VTC2004-Fall. 2004, vol. 7, pp. 4730–4734, 2004, doi: 10.1109/VETECF.2004.1404990. [11] J. E. Ortiz-Triviñio, H. Zárate-Ceballos, J. F. Sanchez-Cifuentes, and J. P. Ospina-López, “Sistema de Telecomunicaciones Social-Inspirado mediante Comunidades de Agentes,” Cicom, p. 1, 2015. [12] J. P. Ospina-López and J. E. Ortiz-Triviñio, “Characterization of a cluster and its resources in an Ad-Hoc network starting from the truncated geometric distribution,” ITECKNE Innovación e Investig. en Ing., vol. 12, no. 1, pp. 68–75, 2015. [13] H. Zárate Ceballos, “Diseño de un Sub-Sistema de Cómputo Distribuido que permita implementar virtualización inalámbrica para gestionar recursos (Procesamiento, memoria, almacenamiento y dispositivos E/S) distribuidos en una Red Ad Hoc, mediante el modelo de pseudo Esta,” 2018. [14] J. P. O. López, H. Z. Ceballos, and J. E. O. Triviño, “Scalability in ad hoc networks under hierarchical architectures,” 2015 IEEE Colomb. Conf. Commun. Comput. COLCOM 2015 - Conf. Proc., 2015, doi: 10.1109/ColComCon.2015.7152087. [15] J. Alexander and J. E. Ortiz, “Diseñ o Socio-inspirado de la M á quina Virtual Distribuida ( Ö rbis Virt ü alis Maqüinus Ö VM ) para la red Ad-Hoc TL Ö N,” no. 45. [16] J. P. Ospina-López and J. E. Ortiz-Triviño, “Estimation of a Growth Factor to Achieve Scalable ad hoc Networks,” Ing. Univ., vol. 21, no. 1, pp. 49–70, 2017, doi: 10.11144/ Javeriana.iyu21-1.egfa. [17] J. F. Sánchez, J. P. Ospina, J. E. Gonzalez, and J. E. Ortiz, “Sociability as a decision model for artificial agents,” pp. 1–8, 2017. [18] C. A. Gomez and J. E. Ortiz, “A greener method for content sharing in mobile ad hoc networks,” in 2010 IEEE Latin-American Conference on Communications, Sep. 2010, pp. 1–6, doi: 10.1109/LATINCOM.2010.5640998. [19] J. E. P. Amaris, A. C. C. Hurtado, and J. E. O. Trivino, “Bacteria agent colony inside an ad-hoc network,” 2015 10th Comput. Colomb. Conf., pp. 347–350, 2015, doi: 10.1109/ColumbianCC.2015.7333444. [20] F. Téllez and J. Ortiz, “Behavior of Elliptic Curve Cryptosystems for the Wormhole Intrusion in MANET : A Survey and Analysis,” J. Comput. Sci., vol. 11, no. 9, pp. 1–12, 2011. [21] TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos, “TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos,” 2020, 2020. http://tlon.unal.edu.co/. [22] Z. Henry, J. Eduardo, and O. Triviño, “S . O . V . O . R . A .: A Distributed Wireless,” 2020. [23] F. Ahmed, S. Robinson, and A. A. Tako, “Using the structred analysis and design technique (SADT) in simulation conceptual modeling,” in Proceedings of the Winter Simulation Conference 2014, Dec. 2014, no. 1983, pp. 1038–1049, doi: 10.1109/WSC.2014.7019963. [24] D. D. Clark and D. R. Wilson, “A Comparison of Commercial and Military Computer Security Policies,” pp. 184–184, 2015, doi: 10.1109/sp.1987.10001. [25] F. Edition, CISSP: The Official (ISC)2 CISSP CBK Reference. 2019. [26] S. Beissel, Cybersecurity Investments. 2016. [27] M. M. Alani, “MANET security: A survey,” Proc. - 4th IEEE Int. Conf. Control Syst. Comput. Eng. ICCSCE 2014, no. November, pp. 559–564, 2014, doi: 10.1109/ICCSCE.2014.7072781. [28] ISO, “SO/IEC27001,” Int. Organ. Stand., vol. 27001, 2013. [29] ISO, “ISO/IEC 27002 2013,” Internation Organization for Standardization. 2013. [30] NIST, “Framework for Improving Critical Infrastructure Cybersecurity,” 2018, doi: 10.6028/NIST.CSWP.04162018. [31] ISACA, COBIT 5. 2012. [32] I. Response, “Security Leadership Five Keys for Building a Five Keys for Building a Cybersecurity Program.” [33] Common Criteria, “Common Methodology for Information Technology Security Evaluation Evaluation methodology April 2017 Revision 5 Foreword,” Common Criteria, no. April, 2017. [34] T. Hobbes, El Leviatán. 1651. [35] The Open Group, “The TOGAF® Standard, Version 9.2.” . [36] John Zachman, “About the Zachman Framework.” . [37] “Open Security Architecture.” http://www.opensecurityarchitecture.org/cms/. [38] “SABSA Executive Summary - The SABSA Institute.” https://sabsa.org/sabsa-executive-summary/. [39] J. Sherwood, A. Clark, and D. Lynas, Enterprise security architecture a business-driven approach, vol. 21, no. 4. 2005. [40] Serge Haddad Fabrice Kordon Laurent Pautet Laure Petrucci, Distributed Systems: Design and algorithms, vol. 28, no. 11. John Wiley & Sons, Inc., 2011. [41] R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. 2008. [42] D. Harinath, P. Satyanarayana, and M. V. R. Murthy, “A Review on Security Issues and Attacks in Distributed Systems,” J. Adv. Inf. Technol., vol. 8, no. 1, pp. 1–9, 2017, doi: 10.12720/jait.8.1.1-9. [43] S. Gilbert and N. Lynch, “Perspectives on the CAP Theorem,” Computer (Long. Beach. Calif)., vol. 45, no. 2, pp. 30–36, 2012, doi: 10.1109/mc.2011.389. [44] S. M. Specht and R. B. Lee, “Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures,” Int. Work. Secur. Parallel Distrib. Syst., no. 9, pp. 543–550, 2004, doi: 10.1.1.133.4566. [45] V. Krasnoproshin and T. Galibus, “Conceptual distributed system models and organization of security mechanisms,” Proc. 2015 IEEE 8th Int. Conf. Intell. Data Acquis. Adv. Comput. Syst. Technol. Appl. IDAACS 2015, vol. 1, no. September, pp. 432–435, 2015, doi: 10.1109/IDAACS.2015.7340773. [46] M. D. Vijay Prakash, “A Review on Security Issues in Distributed Systems,” in International Journal of Scientific & Engineering Research, Volume 3,., vol. 3, no. 9, International Journal of Scientific & Engineering Research Volume 3, Issue 9, September-2012, 2012. [47] V. Hoa La and A. Cavalli, “Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey,” Int. J. AdHoc Netw. Syst., vol. 4, no. 2, pp. 1–20, Apr. 2014, doi: 10.5121/ijans.2014.4201. [48] M. Mauve, J. Widmer, and H. Hartenstein, “A survey on position-based routing in mobile ad hoc networks,” Network, IEEE, vol. 15, no. 6, pp. 30–39, 2001, doi: 10.1109/65.967595. [49] I. Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile ad hoc networking: Imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, 2003, doi: 10.1016/S1570-8705(03)00013-1. [50] D. Djenouri, L. Khelladi, and a N. Badache, “A survey of security issues in mobile ad hoc and sensor networks,” IEEE Commun. Surv. Tutorials, vol. 7, no. 4, pp. 2–28, 2005, doi: 10.1109/COMST.2005.1593277. [51] I. Akyildiz and X. Wang, “A survey on wireless mesh networks,” Commun. Mag. IEEE, no. September, pp. 23–30, 2005, doi: 10.1109/MCOM.2005.1509968. [52] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: A survey,” Comput. Networks, vol. 47, no. 4, pp. 445–487, 2005, doi: 10.1016/j.comnet.2004.12.001. [53] J. Usmani, R. Kumar, and J. Prakash, “A survey on secure gateway discovery in MANET,” in 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence, Jan. 2017, pp. 362–368, doi: 10.1109/CONFLUENCE.2017.7943176. [54] P. R. . Arun Kumar. R, Abhishek M. K, Tejashwini. A. I, Niranjan J. T, “A Review on Intrusion Detection Systems in MANET,” Int. J. Eng. Sci. Innov. Technol. Vol. 2, Issue 2, March 2013, vol. 2, no. 2, pp. 453–459, 2013, [Online]. Available: http://www.ijesit.com/Volume 2/Issue 2/IJESIT201302_96.pdf. [55] L. Abusalah, A. Khokhar, and M. Guizani, “A survey of secure mobile Ad Hoc routing protocols,” IEEE Commun. Surv. Tutorials, vol. 10, no. 4, pp. 78–93, 2008, doi: 10.1109/SURV.2008.080407. [56] L. Zhou and Z. J. Hass, “Securing Ad Hoc Networks,” IEEE Netw., vol. 13, no. 6, pp. 24–30, 1999, doi: 10.1109/65.806983. [57] E. Alotaibi and B. Mukherjee, “A survey on routing algorithms for wireless Ad-Hoc and mesh networks,” Comput. Networks, vol. 56, no. 2, pp. 940–965, 2012, doi: 10.1016/j.comnet.2011.10.011. [58] I. Bekmezci, O. K. Sahingoz, and Ş. Temel, “Flying Ad-Hoc Networks (FANETs): A survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–1270, 2013, doi: 10.1016/j.adhoc.2012.12.004. [59] S. Aluvala, K. R. Sekhar, and D. Vodnala, “An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks,” Procedia Comput. Sci., vol. 92, pp. 554–561, 2016, doi: 10.1016/j.procs.2016.07.382. [60] Congzhe Zhang, MengChu Zhou1, and Ming Yu, “Ad hoc network routing and security: A review,” Int. J. Commun. Syst., vol. 20, no. 8, pp. 909–925, 2007, doi: 10.1002/dac.840. [61] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” Wirel. Commun. IEEE, vol. 11, no. February, pp. 38–47, 2004, doi: 10.1109/MWC.2004.1269716. [62] A. Dorri and S. R. Kamel, “Security Challenges in Mobile Ad Hoc Networks: A Survey,” Int. J. Comput. Sci. Eng. Surv., vol. 6, no. 1, pp. 15–29, 2015, doi: 10.5121/ijcses.2015.6102. [63] S. Jain, “Security Threats in Manets: A Review,” Int. J. Inf. Theory, vol. 3, no. 2, pp. 37–50, Apr. 2014, doi: 10.5121/ijit.2014.3204. [64] A. K. Abdelaziz, M. Nafaa, and G. Salim, “Survey of routing attacks and countermeasures in mobile ad hoc networks,” Proc. - UKSim 15th Int. Conf. Comput. Model. Simulation, UKSim 2013, pp. 693–698, 2013, doi: 10.1109/UKSim.2013.48. [65] E. Amiri, H. Keshavarz, H. Heidari, E. Mohamadi, and H. Moradzadeh, “Intrusion Detection Systems in MANET: A Review,” Procedia - Soc. Behav. Sci., vol. 129, pp. 453–459, 2014, doi: 10.1016/j.sbspro.2014.03.700. [66] O. Rodas, M. A. To, J. Alvarez, and S. Maag, “Protecting Wireless Mesh Networks through a distributed intrusion prevention framework,” 2015 7th IEEE Latin-American Conf. Commun. LATINCOM 2015, pp. 1–6, 2016, doi: 10.1109/LATINCOM.2015.7430126. [67] J. A. Goncalves, V. S. Faria, G. B. Vieira, C. A. M. Silva, and D. M. Mascarenhas, “WIDIP: Wireless distributed IPS for DDoS attacks,” 2017 1st Cyber Secur. Netw. Conf. CSNet 2017, vol. 2017-Janua, pp. 1–3, 2017, doi: 10.1109/CSNET.2017.8241996. [68] M. Buvaneswari and T. Subha, “IHoneycol: A distributed collaborative approach for mitigation of DDoS attack,” 2013 Int. Conf. Inf. Commun. Embed. Syst. ICICES 2013, pp. 340–345, 2013, doi: 10.1109/ICICES.2013.6508281. [69] R. P. Foundation, “Raspberry Pi,” 2021, 2021. https://www.raspberrypi.org/about/. [70] Open Mesh, “BATMAN - Adv. Protocol concept,” 2021. https://www.open-mesh.org/projects/batman-adv/wiki/Protocol_information. [71] O. Mesh, “Open Mesh - Batman Adv. Routing scenarios,” 2021. https://www.open-mesh.org/doc/open-mesh/Routing_scenarios.html. [72] OpenMesh, “ALFRED,” 2021. https://www.open-mesh.org/projects/alfred/wiki. [73] Linux Foundation, “Linux Netem,” 2021. https://wiki.linuxfoundation.org/networking/netem#how_can_i_use_netem_on_incoming_traffic. [74] Avahi, “Avahi,” 2021. https://www.avahi.org/. [75] Docker, “Docker,” 2021. https://www.docker.com/resources/what-container. [76] Python Foundation, “Python,” 2021. https://www.python.org/about/. [77] M. Kumar, A. J. Kulkarni, and S. C. Satapathy, “Socio evolution & learning optimization algorithm: A socio-inspired optimization methodology,” Futur. Gener. Comput. Syst., vol. 81, pp. 252–272, 2018, doi: 10.1016/j.future.2017.10.052. [78] J. Zhang, W. Wang, F. Xia, Y. R. Lin, and H. Tong, “Data-Driven Computational Social Science: A Survey,” Big Data Res., vol. 21, pp. 1–28, 2020, doi: 10.1016/j.bdr.2020.100145. [79] J. F. L. Ochoa, “Compromiso y simpatía: emotividad en la toma de decisiones cooperativas en redes estocásticas de siguiente generación,” 2017, [Online]. Available: http://bdigital.unal.edu.co/59415/. [80] H. Nunoo-Mensah, K. O. Boateng, and J. D. Gadze, “The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: A survey,” Int. J. Commun. Syst., vol. 31, no. 7, pp. 1–18, 2018, doi: 10.1002/dac.3444. [81] H. Yu, Z. Shen, C. Leung, C. Miao, and V. R. Lesser, “A survey of multi-Agent trust management systems,” IEEE Access, vol. 1, no. January 2014, pp. 35–50, 2013, doi: 10.1109/ACCESS.2013.2259892. [82] A. Ferrario, M. Loi, and E. Viganò, “In AI We Trust Incrementally: a Multi-layer Model of Trust to Analyze Human-Artificial Intelligence Interactions,” Philos. Technol., vol. 33, no. 3, pp. 523–539, 2020, doi: 10.1007/s13347-019-00378-3. [83] J.-H. Cho, A. Swami, and I.-R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE Commun. Surv. Tutorials Tutorials, vol. 13, no. 4, pp. 562–583, 2011, doi: 10.1109/SURV.2011.092110.00088. [84] M. Poulshock, “The Foundations of Political Realism,” pp. 1–33, Oct. 2019, doi: 10.7312/burg93494. [85] W. Long, “Escaping the State of Nature: A Hobbesian Approach to Cooperation in Multi-agent Reinforcement Learning,” J. Chem. Inf. Model., vol. 53, no. 9, pp. 1689–1699, Jun. 2019, doi: 10.1017/CBO9781107415324.004. [86] R. Ross, M. McEvilley, and J. C. Oren, “NIST Special Publication 800-160 Volume 1 - Systems security engineering: considerations for a multidisciplinary approach in the engineering of trustworthy secure systems, volume 1,” NIST Spec. Publ., vol. 1, 2018, [Online]. Available: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v1.pdf. [87] E. Cayirci and C. Rong, Security in Wireless Ad Hoc and Sensor Networks, 1st ed. Chippenham: Wiley Publishing, Inc., 2009. [88] O. A. A. Elahe Fazeldehkordi, I.S. Amiri, A Study of Black Hole Attack Solutions, vol. 4333, no. March. 2016. [89] OpenMesh, “JOKER,” 2021. https://www.open-mesh.org/doc/open-mesh/Joker.html. [90] H. Zárate Ceballos, “Diseño de un Sub-Sistema de Cómputo Distribuido que permita implementar virtualización inalámbrica para gestionar recursos (Procesamiento, memoria, almacenamiento y dispositivos E/S) distribuidos en una Red Ad Hoc, mediante el modelo de pseudo Esta,” 2018. [91] P. Bowen, J. Hash, and M. Wilson, “Information Security Handbook: A Guide for Managers NIST Special Publication 800-100,” NIST Spec. Publ. 800-100, no. October, p. 137, 2006, [Online]. Available: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-100.pdf. [92] G. Boella, L. van der Torre, and H. Verhagen, “Introduction to normative multiagent systems,” Comput. Math. Organ. Theory, vol. 12, no. 2-3 SPEC. ISS., pp. 71–79, 2006, doi: 10.1007/s10588-006-9537-7. [93] E. Aizenberg and J. van den Hoven, “Designing for human rights in AI,” Big Data Soc., vol. 7, no. 2, pp. 1–30, 2020, doi: 10.1177/2053951720949566. [94] S. Tomic, F. Pecora, and A. Saffiotti, “Norms , Institutions , and Robots,” vol. 14, no. 8, pp. 1–12, 2015. [95] “Construcción de un módulo de seguridad Informática en el sistema TLÖN que permita tener características de disponibilidad,” Universidad Nacional de Colombia, 2019. [96] A. C. & D. L. John Sherwood, “White Paper - Enterprise Security Architecture,” SABSA, pp. 1–25. [97] A. Checa, “Diseño de un mecanismo de clustering en redes ad hoc para sistemas distribuidos en el contexto del sistema TLÖN,” Repositorio.Unal.Edu.Co, 2019, [Online]. Available: https://repositorio.unal.edu.co/handle/unal/77382. [98] J. F. Sanchez Cifuentes, “Prototipo de un lenguaje de programación para la implementación de servicios a través de comunidades de agentes social inspirados sobre redes Ad-hoc,” 2018. [99] “Open Mesh BATMAN.” https://www.open-mesh.org/doc/batman-adv/index.html. [100] R. Dilli and P. C. S. Reddy, “Implementation of security features in MANETs using SHA-3 standard algorithm,” in 2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016, 2016, pp. 455–458, doi: 10.1109/CSITSS.2016.7779410. [101] J. Granatyr, V. Botelho, O. R. Lessing, E. E. Scalabrin, J. P. Barthes, and F. Enembreck, “Trust and reputation models for multiagent systems,” ACM Comput. Surv., vol. 48, no. 2, 2015, doi: 10.1145/2816826. [102] N. Dhieb, H. Ghazzai, H. Besbes, Y. Massoud, “Scalable and Secure Architecture for DistributedIoT Systems,” 2020 IEEE Technology & Engineering Management Conference (TEMSCON), 2020, doi: 10.1109/TEMSCON47658.2020.9140108.Proyecto TLÖNTLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación DistribuidosLICENSElicense.txtlicense.txttext/plain; charset=utf-83964https://repositorio.unal.edu.co/bitstream/unal/80324/1/license.txtcccfe52f796b7c63423298c2d3365fc6MD51CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8914https://repositorio.unal.edu.co/bitstream/unal/80324/3/license_rdf24013099e9e6abb1575dc6ce0855efd5MD53ORIGINAL1030626820.2021.pdf1030626820.2021.pdfTesis de Maestría en Ingeniería de Sistemas y Computaciónapplication/pdf5945246https://repositorio.unal.edu.co/bitstream/unal/80324/4/1030626820.2021.pdf4e50fc6b91834d99ea19169f98b85095MD54THUMBNAIL1030626820.2021.pdf.jpg1030626820.2021.pdf.jpgGenerated Thumbnailimage/jpeg4123https://repositorio.unal.edu.co/bitstream/unal/80324/5/1030626820.2021.pdf.jpg3a8f4b5ae6a877bf4bfb74c2ef954725MD55unal/80324oai:repositorio.unal.edu.co:unal/803242024-07-25 23:14:37.563Repositorio Institucional Universidad Nacional de Colombiarepositorio_nal@unal.edu.coUExBTlRJTExBIERFUMOTU0lUTwoKQ29tbyBlZGl0b3IgZGUgZXN0ZSDDrXRlbSwgdXN0ZWQgcHVlZGUgbW92ZXJsbyBhIHJldmlzacOzbiBzaW4gYW50ZXMgcmVzb2x2ZXIgbG9zIHByb2JsZW1hcyBpZGVudGlmaWNhZG9zLCBkZSBsbyBjb250cmFyaW8sIGhhZ2EgY2xpYyBlbiBHdWFyZGFyIHBhcmEgZ3VhcmRhciBlbCDDrXRlbSB5IHNvbHVjaW9uYXIgZXN0b3MgcHJvYmxlbWFzIG1hcyB0YXJkZS4KCk5PVEFTOgoqU0kgTEEgVEVTSVMgQSBQVUJMSUNBUiBBRFFVSVJJw5MgQ09NUFJPTUlTT1MgREUgQ09ORklERU5DSUFMSURBRCBFTiBFTCBERVNBUlJPTExPIE8gUEFSVEVTIERFTCBET0NVTUVOVE8uIFNJR0EgTEEgRElSRUNUUklaIERFIExBIFJFU09MVUNJw5NOIDAyMyBERSAyMDE1LCBQT1IgTEEgQ1VBTCBTRSBFU1RBQkxFQ0UgRUwgUFJPQ0VESU1JRU5UTyBQQVJBIExBIFBVQkxJQ0FDScOTTiBERSBURVNJUyBERSBNQUVTVFLDjUEgWSBET0NUT1JBRE8gREUgTE9TIEVTVFVESUFOVEVTIERFIExBIFVOSVZFUlNJREFEIE5BQ0lPTkFMIERFIENPTE9NQklBIEVOIEVMIFJFUE9TSVRPUklPIElOU1RJVFVDSU9OQUwgVU4sIEVYUEVESURBIFBPUiBMQSBTRUNSRVRBUsONQSBHRU5FUkFMLgoqTEEgVEVTSVMgQSBQVUJMSUNBUiBERUJFIFNFUiBMQSBWRVJTScOTTiBGSU5BTCBBUFJPQkFEQS4KUGFyYSB0cmFiYWpvcyBkZXBvc2l0YWRvcyBwb3Igc3UgcHJvcGlvIGF1dG9yOiBBbCBhdXRvYXJjaGl2YXIgZXN0ZSBncnVwbyBkZSBhcmNoaXZvcyBkaWdpdGFsZXMgeSBzdXMgbWV0YWRhdG9zLCBZbyBnYXJhbnRpem8gYWwgUmVwb3NpdG9yaW8gSW5zdGl0dWNpb25hbCBVTiBlbCBkZXJlY2hvIGEgYWxtYWNlbmFybG9zIHkgbWFudGVuZXJsb3MgZGlzcG9uaWJsZXMgZW4gbMOtbmVhIGRlIG1hbmVyYSBncmF0dWl0YS4gRGVjbGFybyBxdWUgZGljaG8gbWF0ZXJpYWwgZXMgZGUgbWkgcHJvcGllZGFkIGludGVsZWN0dWFsIHkgcXVlIGVsIFJlcG9zaXRvcmlvIEluc3RpdHVjaW9uYWwgVU4gbm8gYXN1bWUgbmluZ3VuYSByZXNwb25zYWJpbGlkYWQgc2kgaGF5IGFsZ3VuYSB2aW9sYWNpw7NuIGEgbG9zIGRlcmVjaG9zIGRlIGF1dG9yIGFsIGRpc3RyaWJ1aXIgZXN0b3MgYXJjaGl2b3MgeSBtZXRhZGF0b3MuIChTZSByZWNvbWllbmRhIGEgdG9kb3MgbG9zIGF1dG9yZXMgYSBpbmRpY2FyIHN1cyBkZXJlY2hvcyBkZSBhdXRvciBlbiBsYSBww6FnaW5hIGRlIHTDrXR1bG8gZGUgc3UgZG9jdW1lbnRvLikgRGUgbGEgbWlzbWEgbWFuZXJhLCBhY2VwdG8gbG9zIHTDqXJtaW5vcyBkZSBsYSBzaWd1aWVudGUgbGljZW5jaWE6IExvcyBhdXRvcmVzIG8gdGl0dWxhcmVzIGRlbCBkZXJlY2hvIGRlIGF1dG9yIGRlbCBwcmVzZW50ZSBkb2N1bWVudG8gY29uZmllcmVuIGEgbGEgVW5pdmVyc2lkYWQgTmFjaW9uYWwgZGUgQ29sb21iaWEgdW5hIGxpY2VuY2lhIG5vIGV4Y2x1c2l2YSwgbGltaXRhZGEgeSBncmF0dWl0YSBzb2JyZSBsYSBvYnJhIHF1ZSBzZSBpbnRlZ3JhIGVuIGVsIFJlcG9zaXRvcmlvIEluc3RpdHVjaW9uYWwsIHF1ZSBzZSBhanVzdGEgYSBsYXMgc2lndWllbnRlcyBjYXJhY3RlcsOtc3RpY2FzOiBhKSBFc3RhcsOhIHZpZ2VudGUgYSBwYXJ0aXIgZGUgbGEgZmVjaGEgZW4gcXVlIHNlIGluY2x1eWUgZW4gZWwgcmVwb3NpdG9yaW8sIHF1ZSBzZXLDoW4gcHJvcnJvZ2FibGVzIGluZGVmaW5pZGFtZW50ZSBwb3IgZWwgdGllbXBvIHF1ZSBkdXJlIGVsIGRlcmVjaG8gcGF0cmltb25pYWwgZGVsIGF1dG9yLiBFbCBhdXRvciBwb2Ryw6EgZGFyIHBvciB0ZXJtaW5hZGEgbGEgbGljZW5jaWEgc29saWNpdMOhbmRvbG8gYSBsYSBVbml2ZXJzaWRhZC4gYikgTG9zIGF1dG9yZXMgYXV0b3JpemFuIGEgbGEgVW5pdmVyc2lkYWQgTmFjaW9uYWwgZGUgQ29sb21iaWEgcGFyYSBwdWJsaWNhciBsYSBvYnJhIGVuIGVsIGZvcm1hdG8gcXVlIGVsIHJlcG9zaXRvcmlvIGxvIHJlcXVpZXJhIChpbXByZXNvLCBkaWdpdGFsLCBlbGVjdHLDs25pY28gbyBjdWFscXVpZXIgb3RybyBjb25vY2lkbyBvIHBvciBjb25vY2VyKSB5IGNvbm9jZW4gcXVlIGRhZG8gcXVlIHNlIHB1YmxpY2EgZW4gSW50ZXJuZXQgcG9yIGVzdGUgaGVjaG8gY2lyY3VsYSBjb24gdW4gYWxjYW5jZSBtdW5kaWFsLiBjKSBMb3MgYXV0b3JlcyBhY2VwdGFuIHF1ZSBsYSBhdXRvcml6YWNpw7NuIHNlIGhhY2UgYSB0w610dWxvIGdyYXR1aXRvLCBwb3IgbG8gdGFudG8sIHJlbnVuY2lhbiBhIHJlY2liaXIgZW1vbHVtZW50byBhbGd1bm8gcG9yIGxhIHB1YmxpY2FjacOzbiwgZGlzdHJpYnVjacOzbiwgY29tdW5pY2FjacOzbiBww7pibGljYSB5IGN1YWxxdWllciBvdHJvIHVzbyBxdWUgc2UgaGFnYSBlbiBsb3MgdMOpcm1pbm9zIGRlIGxhIHByZXNlbnRlIGxpY2VuY2lhIHkgZGUgbGEgbGljZW5jaWEgQ3JlYXRpdmUgQ29tbW9ucyBjb24gcXVlIHNlIHB1YmxpY2EuIGQpIExvcyBhdXRvcmVzIG1hbmlmaWVzdGFuIHF1ZSBzZSB0cmF0YSBkZSB1bmEgb2JyYSBvcmlnaW5hbCBzb2JyZSBsYSBxdWUgdGllbmVuIGxvcyBkZXJlY2hvcyBxdWUgYXV0b3JpemFuIHkgcXVlIHNvbiBlbGxvcyBxdWllbmVzIGFzdW1lbiB0b3RhbCByZXNwb25zYWJpbGlkYWQgcG9yIGVsIGNvbnRlbmlkbyBkZSBzdSBvYnJhIGFudGUgbGEgVW5pdmVyc2lkYWQgTmFjaW9uYWwgeSBhbnRlIHRlcmNlcm9zLiBFbiB0b2RvIGNhc28gbGEgVW5pdmVyc2lkYWQgTmFjaW9uYWwgZGUgQ29sb21iaWEgc2UgY29tcHJvbWV0ZSBhIGluZGljYXIgc2llbXByZSBsYSBhdXRvcsOtYSBpbmNsdXllbmRvIGVsIG5vbWJyZSBkZWwgYXV0b3IgeSBsYSBmZWNoYSBkZSBwdWJsaWNhY2nDs24uIGUpIExvcyBhdXRvcmVzIGF1dG9yaXphbiBhIGxhIFVuaXZlcnNpZGFkIHBhcmEgaW5jbHVpciBsYSBvYnJhIGVuIGxvcyDDrW5kaWNlcyB5IGJ1c2NhZG9yZXMgcXVlIGVzdGltZW4gbmVjZXNhcmlvcyBwYXJhIHByb21vdmVyIHN1IGRpZnVzacOzbi4gZikgTG9zIGF1dG9yZXMgYWNlcHRhbiBxdWUgbGEgVW5pdmVyc2lkYWQgTmFjaW9uYWwgZGUgQ29sb21iaWEgcHVlZGEgY29udmVydGlyIGVsIGRvY3VtZW50byBhIGN1YWxxdWllciBtZWRpbyBvIGZvcm1hdG8gcGFyYSBwcm9ww7NzaXRvcyBkZSBwcmVzZXJ2YWNpw7NuIGRpZ2l0YWwuIFNJIEVMIERPQ1VNRU5UTyBTRSBCQVNBIEVOIFVOIFRSQUJBSk8gUVVFIEhBIFNJRE8gUEFUUk9DSU5BRE8gTyBBUE9ZQURPIFBPUiBVTkEgQUdFTkNJQSBPIFVOQSBPUkdBTklaQUNJw5NOLCBDT04gRVhDRVBDScOTTiBERSBMQSBVTklWRVJTSURBRCBOQUNJT05BTCBERSBDT0xPTUJJQSwgTE9TIEFVVE9SRVMgR0FSQU5USVpBTiBRVUUgU0UgSEEgQ1VNUExJRE8gQ09OIExPUyBERVJFQ0hPUyBZIE9CTElHQUNJT05FUyBSRVFVRVJJRE9TIFBPUiBFTCBSRVNQRUNUSVZPIENPTlRSQVRPIE8gQUNVRVJETy4KUGFyYSB0cmFiYWpvcyBkZXBvc2l0YWRvcyBwb3Igb3RyYXMgcGVyc29uYXMgZGlzdGludGFzIGEgc3UgYXV0b3I6IERlY2xhcm8gcXVlIGVsIGdydXBvIGRlIGFyY2hpdm9zIGRpZ2l0YWxlcyB5IG1ldGFkYXRvcyBhc29jaWFkb3MgcXVlIGVzdG95IGFyY2hpdmFuZG8gZW4gZWwgUmVwb3NpdG9yaW8gSW5zdGl0dWNpb25hbCBVTikgZXMgZGUgZG9taW5pbyBww7pibGljby4gU2kgbm8gZnVlc2UgZWwgY2FzbywgYWNlcHRvIHRvZGEgbGEgcmVzcG9uc2FiaWxpZGFkIHBvciBjdWFscXVpZXIgaW5mcmFjY2nDs24gZGUgZGVyZWNob3MgZGUgYXV0b3IgcXVlIGNvbmxsZXZlIGxhIGRpc3RyaWJ1Y2nDs24gZGUgZXN0b3MgYXJjaGl2b3MgeSBtZXRhZGF0b3MuCkFsIGhhY2VyIGNsaWMgZW4gZWwgc2lndWllbnRlIGJvdMOzbiwgdXN0ZWQgaW5kaWNhIHF1ZSBlc3TDoSBkZSBhY3VlcmRvIGNvbiBlc3RvcyB0w6lybWlub3MuCgpVTklWRVJTSURBRCBOQUNJT05BTCBERSBDT0xPTUJJQSAtIMOabHRpbWEgbW9kaWZpY2FjacOzbiAyNy8yMC8yMDIwCg== |