Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN

gráficos, ilustraciones, tablas

Autores:
Molano Saavedra, Manuel Leoned
Tipo de recurso:
Fecha de publicación:
2021
Institución:
Universidad Nacional de Colombia
Repositorio:
Universidad Nacional de Colombia
Idioma:
spa
OAI Identifier:
oai:repositorio.unal.edu.co:unal/80324
Acceso en línea:
https://repositorio.unal.edu.co/handle/unal/80324
https://repositorio.unal.edu.co/
Palabra clave:
620 - Ingeniería y operaciones afines
MANETs
Seguridad informática
Seguridad de la información
Sistemas distribuidos
Computación social-inspirada
MANETs
Computer security
Information security
Distributed systems
Social computing
Rights
openAccess
License
Atribución-NoComercial 4.0 Internacional
id UNACIONAL2_cf5bc872f2ebd024b5b40e818e27d0b2
oai_identifier_str oai:repositorio.unal.edu.co:unal/80324
network_acronym_str UNACIONAL2
network_name_str Universidad Nacional de Colombia
repository_id_str
dc.title.spa.fl_str_mv Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN
dc.title.translated.eng.fl_str_mv Information security module, social-inspired and oriented towards the objective of integrity in MANETs within the context of the TLÖN distributed computing system
title Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN
spellingShingle Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN
620 - Ingeniería y operaciones afines
MANETs
Seguridad informática
Seguridad de la información
Sistemas distribuidos
Computación social-inspirada
MANETs
Computer security
Information security
Distributed systems
Social computing
title_short Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN
title_full Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN
title_fullStr Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN
title_full_unstemmed Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN
title_sort Módulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖN
dc.creator.fl_str_mv Molano Saavedra, Manuel Leoned
dc.contributor.advisor.none.fl_str_mv Ortiz Triviño Ph.D., Jorge EduardoMsc.
dc.contributor.author.none.fl_str_mv Molano Saavedra, Manuel Leoned
dc.contributor.educationalvalidator.none.fl_str_mv Zarate Ceballos Ph.D. Msc., Henry
dc.contributor.researchgroup.spa.fl_str_mv Computación aplicada - Seguridad informática
dc.subject.ddc.spa.fl_str_mv 620 - Ingeniería y operaciones afines
topic 620 - Ingeniería y operaciones afines
MANETs
Seguridad informática
Seguridad de la información
Sistemas distribuidos
Computación social-inspirada
MANETs
Computer security
Information security
Distributed systems
Social computing
dc.subject.proposal.spa.fl_str_mv MANETs
Seguridad informática
Seguridad de la información
Sistemas distribuidos
Computación social-inspirada
dc.subject.proposal.eng.fl_str_mv MANETs
Computer security
Information security
Distributed systems
Social computing
description gráficos, ilustraciones, tablas
publishDate 2021
dc.date.accessioned.none.fl_str_mv 2021-09-28T15:46:39Z
dc.date.available.none.fl_str_mv 2021-09-28T15:46:39Z
dc.date.issued.none.fl_str_mv 2021-08-01
dc.type.spa.fl_str_mv Trabajo de grado - Maestría
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/masterThesis
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/acceptedVersion
dc.type.content.spa.fl_str_mv Text
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/TM
status_str acceptedVersion
dc.identifier.uri.none.fl_str_mv https://repositorio.unal.edu.co/handle/unal/80324
dc.identifier.instname.spa.fl_str_mv Universidad Nacional de Colombia
dc.identifier.reponame.spa.fl_str_mv Repositorio Institucional Universidad Nacional de Colombia
dc.identifier.repourl.spa.fl_str_mv https://repositorio.unal.edu.co/
url https://repositorio.unal.edu.co/handle/unal/80324
https://repositorio.unal.edu.co/
identifier_str_mv Universidad Nacional de Colombia
Repositorio Institucional Universidad Nacional de Colombia
dc.language.iso.spa.fl_str_mv spa
language spa
dc.relation.references.spa.fl_str_mv [1] M. Van Steen and A. S. Tanenmabum. Distributed Systems, vol. 01. 2017. [2] P. Brody and V. Pureswaran, “Device democracy: Saving the future of the Internet of Things IBM,” IBM Glob. Bus. Serv. Exec. Rep., 2015, [Online]. Available: http://m2mworldnews.com/download/white-papers/IBM-Saving-the-future-of-IoT.pdf. [3] Ericsson, “Mobility Report,” White Pap., no. May, pp. 7–8, 2016, doi: 10.3103/S0005105510050031. [4] R. Helmus and J. Grabenhofer, “TURNING THE INTERNET OF THINGS INTO REALITY: A practical approach to your unique IoT journey,” p. 30, 2019, [Online]. Available: https://assets.new.siemens.com/siemens/assets/api/uuid:131ac2f9-5e8b-4968-ba2f-734eefccdb50/version:1556633115/turning-iot-into-reality-whitepaper-by-siemens-iot-services-fina.pdf. [5] E. M. Royer and C.-K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks,” Pers. Commun. IEEE, vol. 6, no. 2, pp. 46–55, 1999, doi: 10.1109/98.760423. [6] S. R. Surya and G. A. Magrica, “A survey on wireless networks attacks,” in 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), Feb. 2017, pp. 240–247, doi: 10.1109/ICCCT2.2017.7972278. [7] K. Shcwab, The Fourth Industrial Revolution, no. 1. CH-1223 Cologny/Geneva: World Economic Forum, 2016. [8] D. O. M. Thomas W. Edgar, Research Methods for Cyber Security. 2017. [9] I. E. T. Force, “RFC 4949 Internet Engineering Task Force,” RFC 4949, 2007. [10] C. C. C. Chigan and R. Bandaru, “Secure node misbehaviors in mobile ad hoc networks,” IEEE 60th Veh. Technol. Conf. 2004. VTC2004-Fall. 2004, vol. 7, pp. 4730–4734, 2004, doi: 10.1109/VETECF.2004.1404990. [11] J. E. Ortiz-Triviñio, H. Zárate-Ceballos, J. F. Sanchez-Cifuentes, and J. P. Ospina-López, “Sistema de Telecomunicaciones Social-Inspirado mediante Comunidades de Agentes,” Cicom, p. 1, 2015. [12] J. P. Ospina-López and J. E. Ortiz-Triviñio, “Characterization of a cluster and its resources in an Ad-Hoc network starting from the truncated geometric distribution,” ITECKNE Innovación e Investig. en Ing., vol. 12, no. 1, pp. 68–75, 2015. [13] H. Zárate Ceballos, “Diseño de un Sub-Sistema de Cómputo Distribuido que permita implementar virtualización inalámbrica para gestionar recursos (Procesamiento, memoria, almacenamiento y dispositivos E/S) distribuidos en una Red Ad Hoc, mediante el modelo de pseudo Esta,” 2018. [14] J. P. O. López, H. Z. Ceballos, and J. E. O. Triviño, “Scalability in ad hoc networks under hierarchical architectures,” 2015 IEEE Colomb. Conf. Commun. Comput. COLCOM 2015 - Conf. Proc., 2015, doi: 10.1109/ColComCon.2015.7152087. [15] J. Alexander and J. E. Ortiz, “Diseñ o Socio-inspirado de la M á quina Virtual Distribuida ( Ö rbis Virt ü alis Maqüinus Ö VM ) para la red Ad-Hoc TL Ö N,” no. 45. [16] J. P. Ospina-López and J. E. Ortiz-Triviño, “Estimation of a Growth Factor to Achieve Scalable ad hoc Networks,” Ing. Univ., vol. 21, no. 1, pp. 49–70, 2017, doi: 10.11144/ Javeriana.iyu21-1.egfa. [17] J. F. Sánchez, J. P. Ospina, J. E. Gonzalez, and J. E. Ortiz, “Sociability as a decision model for artificial agents,” pp. 1–8, 2017. [18] C. A. Gomez and J. E. Ortiz, “A greener method for content sharing in mobile ad hoc networks,” in 2010 IEEE Latin-American Conference on Communications, Sep. 2010, pp. 1–6, doi: 10.1109/LATINCOM.2010.5640998. [19] J. E. P. Amaris, A. C. C. Hurtado, and J. E. O. Trivino, “Bacteria agent colony inside an ad-hoc network,” 2015 10th Comput. Colomb. Conf., pp. 347–350, 2015, doi: 10.1109/ColumbianCC.2015.7333444. [20] F. Téllez and J. Ortiz, “Behavior of Elliptic Curve Cryptosystems for the Wormhole Intrusion in MANET : A Survey and Analysis,” J. Comput. Sci., vol. 11, no. 9, pp. 1–12, 2011. [21] TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos, “TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos,” 2020, 2020. http://tlon.unal.edu.co/. [22] Z. Henry, J. Eduardo, and O. Triviño, “S . O . V . O . R . A .: A Distributed Wireless,” 2020. [23] F. Ahmed, S. Robinson, and A. A. Tako, “Using the structred analysis and design technique (SADT) in simulation conceptual modeling,” in Proceedings of the Winter Simulation Conference 2014, Dec. 2014, no. 1983, pp. 1038–1049, doi: 10.1109/WSC.2014.7019963. [24] D. D. Clark and D. R. Wilson, “A Comparison of Commercial and Military Computer Security Policies,” pp. 184–184, 2015, doi: 10.1109/sp.1987.10001. [25] F. Edition, CISSP: The Official (ISC)2 CISSP CBK Reference. 2019. [26] S. Beissel, Cybersecurity Investments. 2016. [27] M. M. Alani, “MANET security: A survey,” Proc. - 4th IEEE Int. Conf. Control Syst. Comput. Eng. ICCSCE 2014, no. November, pp. 559–564, 2014, doi: 10.1109/ICCSCE.2014.7072781. [28] ISO, “SO/IEC27001,” Int. Organ. Stand., vol. 27001, 2013. [29] ISO, “ISO/IEC 27002 2013,” Internation Organization for Standardization. 2013. [30] NIST, “Framework for Improving Critical Infrastructure Cybersecurity,” 2018, doi: 10.6028/NIST.CSWP.04162018. [31] ISACA, COBIT 5. 2012. [32] I. Response, “Security Leadership Five Keys for Building a Five Keys for Building a Cybersecurity Program.” [33] Common Criteria, “Common Methodology for Information Technology Security Evaluation Evaluation methodology April 2017 Revision 5 Foreword,” Common Criteria, no. April, 2017. [34] T. Hobbes, El Leviatán. 1651. [35] The Open Group, “The TOGAF® Standard, Version 9.2.” . [36] John Zachman, “About the Zachman Framework.” . [37] “Open Security Architecture.” http://www.opensecurityarchitecture.org/cms/. [38] “SABSA Executive Summary - The SABSA Institute.” https://sabsa.org/sabsa-executive-summary/. [39] J. Sherwood, A. Clark, and D. Lynas, Enterprise security architecture a business-driven approach, vol. 21, no. 4. 2005. [40] Serge Haddad Fabrice Kordon Laurent Pautet Laure Petrucci, Distributed Systems: Design and algorithms, vol. 28, no. 11. John Wiley & Sons, Inc., 2011. [41] R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. 2008. [42] D. Harinath, P. Satyanarayana, and M. V. R. Murthy, “A Review on Security Issues and Attacks in Distributed Systems,” J. Adv. Inf. Technol., vol. 8, no. 1, pp. 1–9, 2017, doi: 10.12720/jait.8.1.1-9. [43] S. Gilbert and N. Lynch, “Perspectives on the CAP Theorem,” Computer (Long. Beach. Calif)., vol. 45, no. 2, pp. 30–36, 2012, doi: 10.1109/mc.2011.389. [44] S. M. Specht and R. B. Lee, “Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures,” Int. Work. Secur. Parallel Distrib. Syst., no. 9, pp. 543–550, 2004, doi: 10.1.1.133.4566. [45] V. Krasnoproshin and T. Galibus, “Conceptual distributed system models and organization of security mechanisms,” Proc. 2015 IEEE 8th Int. Conf. Intell. Data Acquis. Adv. Comput. Syst. Technol. Appl. IDAACS 2015, vol. 1, no. September, pp. 432–435, 2015, doi: 10.1109/IDAACS.2015.7340773. [46] M. D. Vijay Prakash, “A Review on Security Issues in Distributed Systems,” in International Journal of Scientific & Engineering Research, Volume 3,., vol. 3, no. 9, International Journal of Scientific & Engineering Research Volume 3, Issue 9, September-2012, 2012. [47] V. Hoa La and A. Cavalli, “Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey,” Int. J. AdHoc Netw. Syst., vol. 4, no. 2, pp. 1–20, Apr. 2014, doi: 10.5121/ijans.2014.4201. [48] M. Mauve, J. Widmer, and H. Hartenstein, “A survey on position-based routing in mobile ad hoc networks,” Network, IEEE, vol. 15, no. 6, pp. 30–39, 2001, doi: 10.1109/65.967595. [49] I. Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile ad hoc networking: Imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, 2003, doi: 10.1016/S1570-8705(03)00013-1. [50] D. Djenouri, L. Khelladi, and a N. Badache, “A survey of security issues in mobile ad hoc and sensor networks,” IEEE Commun. Surv. Tutorials, vol. 7, no. 4, pp. 2–28, 2005, doi: 10.1109/COMST.2005.1593277. [51] I. Akyildiz and X. Wang, “A survey on wireless mesh networks,” Commun. Mag. IEEE, no. September, pp. 23–30, 2005, doi: 10.1109/MCOM.2005.1509968. [52] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: A survey,” Comput. Networks, vol. 47, no. 4, pp. 445–487, 2005, doi: 10.1016/j.comnet.2004.12.001. [53] J. Usmani, R. Kumar, and J. Prakash, “A survey on secure gateway discovery in MANET,” in 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence, Jan. 2017, pp. 362–368, doi: 10.1109/CONFLUENCE.2017.7943176. [54] P. R. . Arun Kumar. R, Abhishek M. K, Tejashwini. A. I, Niranjan J. T, “A Review on Intrusion Detection Systems in MANET,” Int. J. Eng. Sci. Innov. Technol. Vol. 2, Issue 2, March 2013, vol. 2, no. 2, pp. 453–459, 2013, [Online]. Available: http://www.ijesit.com/Volume 2/Issue 2/IJESIT201302_96.pdf. [55] L. Abusalah, A. Khokhar, and M. Guizani, “A survey of secure mobile Ad Hoc routing protocols,” IEEE Commun. Surv. Tutorials, vol. 10, no. 4, pp. 78–93, 2008, doi: 10.1109/SURV.2008.080407. [56] L. Zhou and Z. J. Hass, “Securing Ad Hoc Networks,” IEEE Netw., vol. 13, no. 6, pp. 24–30, 1999, doi: 10.1109/65.806983. [57] E. Alotaibi and B. Mukherjee, “A survey on routing algorithms for wireless Ad-Hoc and mesh networks,” Comput. Networks, vol. 56, no. 2, pp. 940–965, 2012, doi: 10.1016/j.comnet.2011.10.011. [58] I. Bekmezci, O. K. Sahingoz, and Ş. Temel, “Flying Ad-Hoc Networks (FANETs): A survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–1270, 2013, doi: 10.1016/j.adhoc.2012.12.004. [59] S. Aluvala, K. R. Sekhar, and D. Vodnala, “An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks,” Procedia Comput. Sci., vol. 92, pp. 554–561, 2016, doi: 10.1016/j.procs.2016.07.382. [60] Congzhe Zhang, MengChu Zhou1, and Ming Yu, “Ad hoc network routing and security: A review,” Int. J. Commun. Syst., vol. 20, no. 8, pp. 909–925, 2007, doi: 10.1002/dac.840. [61] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” Wirel. Commun. IEEE, vol. 11, no. February, pp. 38–47, 2004, doi: 10.1109/MWC.2004.1269716. [62] A. Dorri and S. R. Kamel, “Security Challenges in Mobile Ad Hoc Networks: A Survey,” Int. J. Comput. Sci. Eng. Surv., vol. 6, no. 1, pp. 15–29, 2015, doi: 10.5121/ijcses.2015.6102. [63] S. Jain, “Security Threats in Manets: A Review,” Int. J. Inf. Theory, vol. 3, no. 2, pp. 37–50, Apr. 2014, doi: 10.5121/ijit.2014.3204. [64] A. K. Abdelaziz, M. Nafaa, and G. Salim, “Survey of routing attacks and countermeasures in mobile ad hoc networks,” Proc. - UKSim 15th Int. Conf. Comput. Model. Simulation, UKSim 2013, pp. 693–698, 2013, doi: 10.1109/UKSim.2013.48. [65] E. Amiri, H. Keshavarz, H. Heidari, E. Mohamadi, and H. Moradzadeh, “Intrusion Detection Systems in MANET: A Review,” Procedia - Soc. Behav. Sci., vol. 129, pp. 453–459, 2014, doi: 10.1016/j.sbspro.2014.03.700. [66] O. Rodas, M. A. To, J. Alvarez, and S. Maag, “Protecting Wireless Mesh Networks through a distributed intrusion prevention framework,” 2015 7th IEEE Latin-American Conf. Commun. LATINCOM 2015, pp. 1–6, 2016, doi: 10.1109/LATINCOM.2015.7430126. [67] J. A. Goncalves, V. S. Faria, G. B. Vieira, C. A. M. Silva, and D. M. Mascarenhas, “WIDIP: Wireless distributed IPS for DDoS attacks,” 2017 1st Cyber Secur. Netw. Conf. CSNet 2017, vol. 2017-Janua, pp. 1–3, 2017, doi: 10.1109/CSNET.2017.8241996. [68] M. Buvaneswari and T. Subha, “IHoneycol: A distributed collaborative approach for mitigation of DDoS attack,” 2013 Int. Conf. Inf. Commun. Embed. Syst. ICICES 2013, pp. 340–345, 2013, doi: 10.1109/ICICES.2013.6508281. [69] R. P. Foundation, “Raspberry Pi,” 2021, 2021. https://www.raspberrypi.org/about/. [70] Open Mesh, “BATMAN - Adv. Protocol concept,” 2021. https://www.open-mesh.org/projects/batman-adv/wiki/Protocol_information. [71] O. Mesh, “Open Mesh - Batman Adv. Routing scenarios,” 2021. https://www.open-mesh.org/doc/open-mesh/Routing_scenarios.html. [72] OpenMesh, “ALFRED,” 2021. https://www.open-mesh.org/projects/alfred/wiki. [73] Linux Foundation, “Linux Netem,” 2021. https://wiki.linuxfoundation.org/networking/netem#how_can_i_use_netem_on_incoming_traffic. [74] Avahi, “Avahi,” 2021. https://www.avahi.org/. [75] Docker, “Docker,” 2021. https://www.docker.com/resources/what-container. [76] Python Foundation, “Python,” 2021. https://www.python.org/about/. [77] M. Kumar, A. J. Kulkarni, and S. C. Satapathy, “Socio evolution & learning optimization algorithm: A socio-inspired optimization methodology,” Futur. Gener. Comput. Syst., vol. 81, pp. 252–272, 2018, doi: 10.1016/j.future.2017.10.052. [78] J. Zhang, W. Wang, F. Xia, Y. R. Lin, and H. Tong, “Data-Driven Computational Social Science: A Survey,” Big Data Res., vol. 21, pp. 1–28, 2020, doi: 10.1016/j.bdr.2020.100145. [79] J. F. L. Ochoa, “Compromiso y simpatía: emotividad en la toma de decisiones cooperativas en redes estocásticas de siguiente generación,” 2017, [Online]. Available: http://bdigital.unal.edu.co/59415/. [80] H. Nunoo-Mensah, K. O. Boateng, and J. D. Gadze, “The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: A survey,” Int. J. Commun. Syst., vol. 31, no. 7, pp. 1–18, 2018, doi: 10.1002/dac.3444. [81] H. Yu, Z. Shen, C. Leung, C. Miao, and V. R. Lesser, “A survey of multi-Agent trust management systems,” IEEE Access, vol. 1, no. January 2014, pp. 35–50, 2013, doi: 10.1109/ACCESS.2013.2259892. [82] A. Ferrario, M. Loi, and E. Viganò, “In AI We Trust Incrementally: a Multi-layer Model of Trust to Analyze Human-Artificial Intelligence Interactions,” Philos. Technol., vol. 33, no. 3, pp. 523–539, 2020, doi: 10.1007/s13347-019-00378-3. [83] J.-H. Cho, A. Swami, and I.-R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE Commun. Surv. Tutorials Tutorials, vol. 13, no. 4, pp. 562–583, 2011, doi: 10.1109/SURV.2011.092110.00088. [84] M. Poulshock, “The Foundations of Political Realism,” pp. 1–33, Oct. 2019, doi: 10.7312/burg93494. [85] W. Long, “Escaping the State of Nature: A Hobbesian Approach to Cooperation in Multi-agent Reinforcement Learning,” J. Chem. Inf. Model., vol. 53, no. 9, pp. 1689–1699, Jun. 2019, doi: 10.1017/CBO9781107415324.004. [86] R. Ross, M. McEvilley, and J. C. Oren, “NIST Special Publication 800-160 Volume 1 - Systems security engineering: considerations for a multidisciplinary approach in the engineering of trustworthy secure systems, volume 1,” NIST Spec. Publ., vol. 1, 2018, [Online]. Available: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v1.pdf. [87] E. Cayirci and C. Rong, Security in Wireless Ad Hoc and Sensor Networks, 1st ed. Chippenham: Wiley Publishing, Inc., 2009. [88] O. A. A. Elahe Fazeldehkordi, I.S. Amiri, A Study of Black Hole Attack Solutions, vol. 4333, no. March. 2016. [89] OpenMesh, “JOKER,” 2021. https://www.open-mesh.org/doc/open-mesh/Joker.html. [90] H. Zárate Ceballos, “Diseño de un Sub-Sistema de Cómputo Distribuido que permita implementar virtualización inalámbrica para gestionar recursos (Procesamiento, memoria, almacenamiento y dispositivos E/S) distribuidos en una Red Ad Hoc, mediante el modelo de pseudo Esta,” 2018. [91] P. Bowen, J. Hash, and M. Wilson, “Information Security Handbook: A Guide for Managers NIST Special Publication 800-100,” NIST Spec. Publ. 800-100, no. October, p. 137, 2006, [Online]. Available: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-100.pdf. [92] G. Boella, L. van der Torre, and H. Verhagen, “Introduction to normative multiagent systems,” Comput. Math. Organ. Theory, vol. 12, no. 2-3 SPEC. ISS., pp. 71–79, 2006, doi: 10.1007/s10588-006-9537-7. [93] E. Aizenberg and J. van den Hoven, “Designing for human rights in AI,” Big Data Soc., vol. 7, no. 2, pp. 1–30, 2020, doi: 10.1177/2053951720949566. [94] S. Tomic, F. Pecora, and A. Saffiotti, “Norms , Institutions , and Robots,” vol. 14, no. 8, pp. 1–12, 2015. [95] “Construcción de un módulo de seguridad Informática en el sistema TLÖN que permita tener características de disponibilidad,” Universidad Nacional de Colombia, 2019. [96] A. C. & D. L. John Sherwood, “White Paper - Enterprise Security Architecture,” SABSA, pp. 1–25. [97] A. Checa, “Diseño de un mecanismo de clustering en redes ad hoc para sistemas distribuidos en el contexto del sistema TLÖN,” Repositorio.Unal.Edu.Co, 2019, [Online]. Available: https://repositorio.unal.edu.co/handle/unal/77382. [98] J. F. Sanchez Cifuentes, “Prototipo de un lenguaje de programación para la implementación de servicios a través de comunidades de agentes social inspirados sobre redes Ad-hoc,” 2018. [99] “Open Mesh BATMAN.” https://www.open-mesh.org/doc/batman-adv/index.html. [100] R. Dilli and P. C. S. Reddy, “Implementation of security features in MANETs using SHA-3 standard algorithm,” in 2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016, 2016, pp. 455–458, doi: 10.1109/CSITSS.2016.7779410. [101] J. Granatyr, V. Botelho, O. R. Lessing, E. E. Scalabrin, J. P. Barthes, and F. Enembreck, “Trust and reputation models for multiagent systems,” ACM Comput. Surv., vol. 48, no. 2, 2015, doi: 10.1145/2816826. [102] N. Dhieb, H. Ghazzai, H. Besbes, Y. Massoud, “Scalable and Secure Architecture for DistributedIoT Systems,” 2020 IEEE Technology & Engineering Management Conference (TEMSCON), 2020, doi: 10.1109/TEMSCON47658.2020.9140108.
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.license.spa.fl_str_mv Atribución-NoComercial 4.0 Internacional
dc.rights.uri.spa.fl_str_mv http://creativecommons.org/licenses/by-nc/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
rights_invalid_str_mv Atribución-NoComercial 4.0 Internacional
http://creativecommons.org/licenses/by-nc/4.0/
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.extent.spa.fl_str_mv 149 páginas
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Universidad Nacional de Colombia
dc.publisher.program.spa.fl_str_mv Bogotá - Ingeniería - Maestría en Ingeniería - Ingeniería de Sistemas y Computación
dc.publisher.department.spa.fl_str_mv Departamento de Ingeniería de Sistemas e Industrial
dc.publisher.faculty.spa.fl_str_mv Facultad de Ingeniería
dc.publisher.place.spa.fl_str_mv Bogotá - Colombia
dc.publisher.branch.spa.fl_str_mv Universidad Nacional de Colombia - Sede Bogotá
institution Universidad Nacional de Colombia
bitstream.url.fl_str_mv https://repositorio.unal.edu.co/bitstream/unal/80324/1/license.txt
https://repositorio.unal.edu.co/bitstream/unal/80324/3/license_rdf
https://repositorio.unal.edu.co/bitstream/unal/80324/4/1030626820.2021.pdf
https://repositorio.unal.edu.co/bitstream/unal/80324/5/1030626820.2021.pdf.jpg
bitstream.checksum.fl_str_mv cccfe52f796b7c63423298c2d3365fc6
24013099e9e6abb1575dc6ce0855efd5
4e50fc6b91834d99ea19169f98b85095
3a8f4b5ae6a877bf4bfb74c2ef954725
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional Universidad Nacional de Colombia
repository.mail.fl_str_mv repositorio_nal@unal.edu.co
_version_ 1814089380988452864
spelling Atribución-NoComercial 4.0 Internacionalhttp://creativecommons.org/licenses/by-nc/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Ortiz Triviño Ph.D., Jorge EduardoMsc.3d5059a2e5cefa0237c9955271d5caf5Molano Saavedra, Manuel Leonedb0b9f0d7fce8f8a7adfb02d2ce1b17ecZarate Ceballos Ph.D. Msc., HenryComputación aplicada - Seguridad informática2021-09-28T15:46:39Z2021-09-28T15:46:39Z2021-08-01https://repositorio.unal.edu.co/handle/unal/80324Universidad Nacional de ColombiaRepositorio Institucional Universidad Nacional de Colombiahttps://repositorio.unal.edu.co/gráficos, ilustraciones, tablasEl sistema TLÖN es un sistema cómputo distribuido del tipo móvil y con características social-inspiradas, que está desplegado sobre MANETs. Estas son un tipo de redes inalámbricas que, a diferencia de las redes tradicionales, se caracterizan por no requerir de infraestructura de direccionamiento y/o enrutamiento definido para operar. Esta habilidad para operar sin infraestructura les permite funcionar de forma descentralizada, pero también les permite ejecutar comportamientos distribuidos. El enfoque TLÖN para modelar estos comportamientos distribuidos desde un punto de vista social-inspirado, ha sido la creación de un “estado TLÖN”, cuyo “territorio TLÖN” es asimilado como una MANET, sobre la cual pueden implementarse agentes computacionales actuando como “ciudadanos de TLÖN” y módulos con funcionalidades específicas de regulación de las interacciones entre estos agentes, actuando como “instituciones de TLÖN”. Debido a que generalmente los sistemas computaciones son vulnerables en términos de seguridad informática, este trabajo busca presentar un enfoque de “institución de TLÖN” que pueda abordar los problemas de seguridad en MANETs, particularmente los problemas de integridad relacionados con un ataque a la integridad de la información dentro del contexto del Sistema de Cómputo Distribuido TLÖN. (Texto tomado de la fuente)The TLÖN system is a mobile-type distributed computing system with social-inspired characteristics, which is deployed on MANETs. These are a type of wireless networks that, unlike traditional networks, are characterized by not requiring a defined addressing and / or routing infrastructure to operate. This ability to operate without infrastructure allows them to function in a decentralized way, but it also allows them to execute distributed behaviors. The TLÖN approach to model these distributed behaviors from a social-inspired point of view has been the creation of a “TLÖN state”, whose “TLÖN territory” is assimilated as a MANET, on which computational agents acting as “citizens of TLÖN” can be implemented, and modules with specific functionalities for regulating the interactions between these agents, acting as “TLÖN institutions”. Since computer systems are generally vulnerable in terms of computer security, this paper seeks to present a "TLÖN institution" approach that can address security issues in MANETs, particularly integrity issues related to a security integrity attack, within of the context of the TLÖN Distributed Computing System.TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación DistribuidosMaestríaMagíster en Ingeniería - Ingeniería de Sistemas y ComputaciónInvestigación experimentalComputación Aplicada, Seguridad informática149 páginasapplication/pdfspaUniversidad Nacional de ColombiaBogotá - Ingeniería - Maestría en Ingeniería - Ingeniería de Sistemas y ComputaciónDepartamento de Ingeniería de Sistemas e IndustrialFacultad de IngenieríaBogotá - ColombiaUniversidad Nacional de Colombia - Sede Bogotá620 - Ingeniería y operaciones afinesMANETsSeguridad informáticaSeguridad de la informaciónSistemas distribuidosComputación social-inspiradaMANETsComputer securityInformation securityDistributed systemsSocial computingMódulo de seguridad de la información, social-inspirado y orientado hacia el objetivo de integridad en MANETs dentro del contexto del sistema de cómputo distribuido TLÖNInformation security module, social-inspired and oriented towards the objective of integrity in MANETs within the context of the TLÖN distributed computing systemTrabajo de grado - Maestríainfo:eu-repo/semantics/masterThesisinfo:eu-repo/semantics/acceptedVersionTexthttp://purl.org/redcol/resource_type/TM[1] M. Van Steen and A. S. Tanenmabum. Distributed Systems, vol. 01. 2017. [2] P. Brody and V. Pureswaran, “Device democracy: Saving the future of the Internet of Things IBM,” IBM Glob. Bus. Serv. Exec. Rep., 2015, [Online]. Available: http://m2mworldnews.com/download/white-papers/IBM-Saving-the-future-of-IoT.pdf. [3] Ericsson, “Mobility Report,” White Pap., no. May, pp. 7–8, 2016, doi: 10.3103/S0005105510050031. [4] R. Helmus and J. Grabenhofer, “TURNING THE INTERNET OF THINGS INTO REALITY: A practical approach to your unique IoT journey,” p. 30, 2019, [Online]. Available: https://assets.new.siemens.com/siemens/assets/api/uuid:131ac2f9-5e8b-4968-ba2f-734eefccdb50/version:1556633115/turning-iot-into-reality-whitepaper-by-siemens-iot-services-fina.pdf. [5] E. M. Royer and C.-K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks,” Pers. Commun. IEEE, vol. 6, no. 2, pp. 46–55, 1999, doi: 10.1109/98.760423. [6] S. R. Surya and G. A. Magrica, “A survey on wireless networks attacks,” in 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), Feb. 2017, pp. 240–247, doi: 10.1109/ICCCT2.2017.7972278. [7] K. Shcwab, The Fourth Industrial Revolution, no. 1. CH-1223 Cologny/Geneva: World Economic Forum, 2016. [8] D. O. M. Thomas W. Edgar, Research Methods for Cyber Security. 2017. [9] I. E. T. Force, “RFC 4949 Internet Engineering Task Force,” RFC 4949, 2007. [10] C. C. C. Chigan and R. Bandaru, “Secure node misbehaviors in mobile ad hoc networks,” IEEE 60th Veh. Technol. Conf. 2004. VTC2004-Fall. 2004, vol. 7, pp. 4730–4734, 2004, doi: 10.1109/VETECF.2004.1404990. [11] J. E. Ortiz-Triviñio, H. Zárate-Ceballos, J. F. Sanchez-Cifuentes, and J. P. Ospina-López, “Sistema de Telecomunicaciones Social-Inspirado mediante Comunidades de Agentes,” Cicom, p. 1, 2015. [12] J. P. Ospina-López and J. E. Ortiz-Triviñio, “Characterization of a cluster and its resources in an Ad-Hoc network starting from the truncated geometric distribution,” ITECKNE Innovación e Investig. en Ing., vol. 12, no. 1, pp. 68–75, 2015. [13] H. Zárate Ceballos, “Diseño de un Sub-Sistema de Cómputo Distribuido que permita implementar virtualización inalámbrica para gestionar recursos (Procesamiento, memoria, almacenamiento y dispositivos E/S) distribuidos en una Red Ad Hoc, mediante el modelo de pseudo Esta,” 2018. [14] J. P. O. López, H. Z. Ceballos, and J. E. O. Triviño, “Scalability in ad hoc networks under hierarchical architectures,” 2015 IEEE Colomb. Conf. Commun. Comput. COLCOM 2015 - Conf. Proc., 2015, doi: 10.1109/ColComCon.2015.7152087. [15] J. Alexander and J. E. Ortiz, “Diseñ o Socio-inspirado de la M á quina Virtual Distribuida ( Ö rbis Virt ü alis Maqüinus Ö VM ) para la red Ad-Hoc TL Ö N,” no. 45. [16] J. P. Ospina-López and J. E. Ortiz-Triviño, “Estimation of a Growth Factor to Achieve Scalable ad hoc Networks,” Ing. Univ., vol. 21, no. 1, pp. 49–70, 2017, doi: 10.11144/ Javeriana.iyu21-1.egfa. [17] J. F. Sánchez, J. P. Ospina, J. E. Gonzalez, and J. E. Ortiz, “Sociability as a decision model for artificial agents,” pp. 1–8, 2017. [18] C. A. Gomez and J. E. Ortiz, “A greener method for content sharing in mobile ad hoc networks,” in 2010 IEEE Latin-American Conference on Communications, Sep. 2010, pp. 1–6, doi: 10.1109/LATINCOM.2010.5640998. [19] J. E. P. Amaris, A. C. C. Hurtado, and J. E. O. Trivino, “Bacteria agent colony inside an ad-hoc network,” 2015 10th Comput. Colomb. Conf., pp. 347–350, 2015, doi: 10.1109/ColumbianCC.2015.7333444. [20] F. Téllez and J. Ortiz, “Behavior of Elliptic Curve Cryptosystems for the Wormhole Intrusion in MANET : A Survey and Analysis,” J. Comput. Sci., vol. 11, no. 9, pp. 1–12, 2011. [21] TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos, “TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos,” 2020, 2020. http://tlon.unal.edu.co/. [22] Z. Henry, J. Eduardo, and O. Triviño, “S . O . V . O . R . A .: A Distributed Wireless,” 2020. [23] F. Ahmed, S. Robinson, and A. A. Tako, “Using the structred analysis and design technique (SADT) in simulation conceptual modeling,” in Proceedings of the Winter Simulation Conference 2014, Dec. 2014, no. 1983, pp. 1038–1049, doi: 10.1109/WSC.2014.7019963. [24] D. D. Clark and D. R. Wilson, “A Comparison of Commercial and Military Computer Security Policies,” pp. 184–184, 2015, doi: 10.1109/sp.1987.10001. [25] F. Edition, CISSP: The Official (ISC)2 CISSP CBK Reference. 2019. [26] S. Beissel, Cybersecurity Investments. 2016. [27] M. M. Alani, “MANET security: A survey,” Proc. - 4th IEEE Int. Conf. Control Syst. Comput. Eng. ICCSCE 2014, no. November, pp. 559–564, 2014, doi: 10.1109/ICCSCE.2014.7072781. [28] ISO, “SO/IEC27001,” Int. Organ. Stand., vol. 27001, 2013. [29] ISO, “ISO/IEC 27002 2013,” Internation Organization for Standardization. 2013. [30] NIST, “Framework for Improving Critical Infrastructure Cybersecurity,” 2018, doi: 10.6028/NIST.CSWP.04162018. [31] ISACA, COBIT 5. 2012. [32] I. Response, “Security Leadership Five Keys for Building a Five Keys for Building a Cybersecurity Program.” [33] Common Criteria, “Common Methodology for Information Technology Security Evaluation Evaluation methodology April 2017 Revision 5 Foreword,” Common Criteria, no. April, 2017. [34] T. Hobbes, El Leviatán. 1651. [35] The Open Group, “The TOGAF® Standard, Version 9.2.” . [36] John Zachman, “About the Zachman Framework.” . [37] “Open Security Architecture.” http://www.opensecurityarchitecture.org/cms/. [38] “SABSA Executive Summary - The SABSA Institute.” https://sabsa.org/sabsa-executive-summary/. [39] J. Sherwood, A. Clark, and D. Lynas, Enterprise security architecture a business-driven approach, vol. 21, no. 4. 2005. [40] Serge Haddad Fabrice Kordon Laurent Pautet Laure Petrucci, Distributed Systems: Design and algorithms, vol. 28, no. 11. John Wiley & Sons, Inc., 2011. [41] R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. 2008. [42] D. Harinath, P. Satyanarayana, and M. V. R. Murthy, “A Review on Security Issues and Attacks in Distributed Systems,” J. Adv. Inf. Technol., vol. 8, no. 1, pp. 1–9, 2017, doi: 10.12720/jait.8.1.1-9. [43] S. Gilbert and N. Lynch, “Perspectives on the CAP Theorem,” Computer (Long. Beach. Calif)., vol. 45, no. 2, pp. 30–36, 2012, doi: 10.1109/mc.2011.389. [44] S. M. Specht and R. B. Lee, “Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures,” Int. Work. Secur. Parallel Distrib. Syst., no. 9, pp. 543–550, 2004, doi: 10.1.1.133.4566. [45] V. Krasnoproshin and T. Galibus, “Conceptual distributed system models and organization of security mechanisms,” Proc. 2015 IEEE 8th Int. Conf. Intell. Data Acquis. Adv. Comput. Syst. Technol. Appl. IDAACS 2015, vol. 1, no. September, pp. 432–435, 2015, doi: 10.1109/IDAACS.2015.7340773. [46] M. D. Vijay Prakash, “A Review on Security Issues in Distributed Systems,” in International Journal of Scientific & Engineering Research, Volume 3,., vol. 3, no. 9, International Journal of Scientific & Engineering Research Volume 3, Issue 9, September-2012, 2012. [47] V. Hoa La and A. Cavalli, “Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey,” Int. J. AdHoc Netw. Syst., vol. 4, no. 2, pp. 1–20, Apr. 2014, doi: 10.5121/ijans.2014.4201. [48] M. Mauve, J. Widmer, and H. Hartenstein, “A survey on position-based routing in mobile ad hoc networks,” Network, IEEE, vol. 15, no. 6, pp. 30–39, 2001, doi: 10.1109/65.967595. [49] I. Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile ad hoc networking: Imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, 2003, doi: 10.1016/S1570-8705(03)00013-1. [50] D. Djenouri, L. Khelladi, and a N. Badache, “A survey of security issues in mobile ad hoc and sensor networks,” IEEE Commun. Surv. Tutorials, vol. 7, no. 4, pp. 2–28, 2005, doi: 10.1109/COMST.2005.1593277. [51] I. Akyildiz and X. Wang, “A survey on wireless mesh networks,” Commun. Mag. IEEE, no. September, pp. 23–30, 2005, doi: 10.1109/MCOM.2005.1509968. [52] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: A survey,” Comput. Networks, vol. 47, no. 4, pp. 445–487, 2005, doi: 10.1016/j.comnet.2004.12.001. [53] J. Usmani, R. Kumar, and J. Prakash, “A survey on secure gateway discovery in MANET,” in 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence, Jan. 2017, pp. 362–368, doi: 10.1109/CONFLUENCE.2017.7943176. [54] P. R. . Arun Kumar. R, Abhishek M. K, Tejashwini. A. I, Niranjan J. T, “A Review on Intrusion Detection Systems in MANET,” Int. J. Eng. Sci. Innov. Technol. Vol. 2, Issue 2, March 2013, vol. 2, no. 2, pp. 453–459, 2013, [Online]. Available: http://www.ijesit.com/Volume 2/Issue 2/IJESIT201302_96.pdf. [55] L. Abusalah, A. Khokhar, and M. Guizani, “A survey of secure mobile Ad Hoc routing protocols,” IEEE Commun. Surv. Tutorials, vol. 10, no. 4, pp. 78–93, 2008, doi: 10.1109/SURV.2008.080407. [56] L. Zhou and Z. J. Hass, “Securing Ad Hoc Networks,” IEEE Netw., vol. 13, no. 6, pp. 24–30, 1999, doi: 10.1109/65.806983. [57] E. Alotaibi and B. Mukherjee, “A survey on routing algorithms for wireless Ad-Hoc and mesh networks,” Comput. Networks, vol. 56, no. 2, pp. 940–965, 2012, doi: 10.1016/j.comnet.2011.10.011. [58] I. Bekmezci, O. K. Sahingoz, and Ş. Temel, “Flying Ad-Hoc Networks (FANETs): A survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–1270, 2013, doi: 10.1016/j.adhoc.2012.12.004. [59] S. Aluvala, K. R. Sekhar, and D. Vodnala, “An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks,” Procedia Comput. Sci., vol. 92, pp. 554–561, 2016, doi: 10.1016/j.procs.2016.07.382. [60] Congzhe Zhang, MengChu Zhou1, and Ming Yu, “Ad hoc network routing and security: A review,” Int. J. Commun. Syst., vol. 20, no. 8, pp. 909–925, 2007, doi: 10.1002/dac.840. [61] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” Wirel. Commun. IEEE, vol. 11, no. February, pp. 38–47, 2004, doi: 10.1109/MWC.2004.1269716. [62] A. Dorri and S. R. Kamel, “Security Challenges in Mobile Ad Hoc Networks: A Survey,” Int. J. Comput. Sci. Eng. Surv., vol. 6, no. 1, pp. 15–29, 2015, doi: 10.5121/ijcses.2015.6102. [63] S. Jain, “Security Threats in Manets: A Review,” Int. J. Inf. Theory, vol. 3, no. 2, pp. 37–50, Apr. 2014, doi: 10.5121/ijit.2014.3204. [64] A. K. Abdelaziz, M. Nafaa, and G. Salim, “Survey of routing attacks and countermeasures in mobile ad hoc networks,” Proc. - UKSim 15th Int. Conf. Comput. Model. Simulation, UKSim 2013, pp. 693–698, 2013, doi: 10.1109/UKSim.2013.48. [65] E. Amiri, H. Keshavarz, H. Heidari, E. Mohamadi, and H. Moradzadeh, “Intrusion Detection Systems in MANET: A Review,” Procedia - Soc. Behav. Sci., vol. 129, pp. 453–459, 2014, doi: 10.1016/j.sbspro.2014.03.700. [66] O. Rodas, M. A. To, J. Alvarez, and S. Maag, “Protecting Wireless Mesh Networks through a distributed intrusion prevention framework,” 2015 7th IEEE Latin-American Conf. Commun. LATINCOM 2015, pp. 1–6, 2016, doi: 10.1109/LATINCOM.2015.7430126. [67] J. A. Goncalves, V. S. Faria, G. B. Vieira, C. A. M. Silva, and D. M. Mascarenhas, “WIDIP: Wireless distributed IPS for DDoS attacks,” 2017 1st Cyber Secur. Netw. Conf. CSNet 2017, vol. 2017-Janua, pp. 1–3, 2017, doi: 10.1109/CSNET.2017.8241996. [68] M. Buvaneswari and T. Subha, “IHoneycol: A distributed collaborative approach for mitigation of DDoS attack,” 2013 Int. Conf. Inf. Commun. Embed. Syst. ICICES 2013, pp. 340–345, 2013, doi: 10.1109/ICICES.2013.6508281. [69] R. P. Foundation, “Raspberry Pi,” 2021, 2021. https://www.raspberrypi.org/about/. [70] Open Mesh, “BATMAN - Adv. Protocol concept,” 2021. https://www.open-mesh.org/projects/batman-adv/wiki/Protocol_information. [71] O. Mesh, “Open Mesh - Batman Adv. Routing scenarios,” 2021. https://www.open-mesh.org/doc/open-mesh/Routing_scenarios.html. [72] OpenMesh, “ALFRED,” 2021. https://www.open-mesh.org/projects/alfred/wiki. [73] Linux Foundation, “Linux Netem,” 2021. https://wiki.linuxfoundation.org/networking/netem#how_can_i_use_netem_on_incoming_traffic. [74] Avahi, “Avahi,” 2021. https://www.avahi.org/. [75] Docker, “Docker,” 2021. https://www.docker.com/resources/what-container. [76] Python Foundation, “Python,” 2021. https://www.python.org/about/. [77] M. Kumar, A. J. Kulkarni, and S. C. Satapathy, “Socio evolution & learning optimization algorithm: A socio-inspired optimization methodology,” Futur. Gener. Comput. Syst., vol. 81, pp. 252–272, 2018, doi: 10.1016/j.future.2017.10.052. [78] J. Zhang, W. Wang, F. Xia, Y. R. Lin, and H. Tong, “Data-Driven Computational Social Science: A Survey,” Big Data Res., vol. 21, pp. 1–28, 2020, doi: 10.1016/j.bdr.2020.100145. [79] J. F. L. Ochoa, “Compromiso y simpatía: emotividad en la toma de decisiones cooperativas en redes estocásticas de siguiente generación,” 2017, [Online]. Available: http://bdigital.unal.edu.co/59415/. [80] H. Nunoo-Mensah, K. O. Boateng, and J. D. Gadze, “The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: A survey,” Int. J. Commun. Syst., vol. 31, no. 7, pp. 1–18, 2018, doi: 10.1002/dac.3444. [81] H. Yu, Z. Shen, C. Leung, C. Miao, and V. R. Lesser, “A survey of multi-Agent trust management systems,” IEEE Access, vol. 1, no. January 2014, pp. 35–50, 2013, doi: 10.1109/ACCESS.2013.2259892. [82] A. Ferrario, M. Loi, and E. Viganò, “In AI We Trust Incrementally: a Multi-layer Model of Trust to Analyze Human-Artificial Intelligence Interactions,” Philos. Technol., vol. 33, no. 3, pp. 523–539, 2020, doi: 10.1007/s13347-019-00378-3. [83] J.-H. Cho, A. Swami, and I.-R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE Commun. Surv. Tutorials Tutorials, vol. 13, no. 4, pp. 562–583, 2011, doi: 10.1109/SURV.2011.092110.00088. [84] M. Poulshock, “The Foundations of Political Realism,” pp. 1–33, Oct. 2019, doi: 10.7312/burg93494. [85] W. Long, “Escaping the State of Nature: A Hobbesian Approach to Cooperation in Multi-agent Reinforcement Learning,” J. Chem. Inf. Model., vol. 53, no. 9, pp. 1689–1699, Jun. 2019, doi: 10.1017/CBO9781107415324.004. [86] R. Ross, M. McEvilley, and J. C. Oren, “NIST Special Publication 800-160 Volume 1 - Systems security engineering: considerations for a multidisciplinary approach in the engineering of trustworthy secure systems, volume 1,” NIST Spec. Publ., vol. 1, 2018, [Online]. Available: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v1.pdf. [87] E. Cayirci and C. Rong, Security in Wireless Ad Hoc and Sensor Networks, 1st ed. Chippenham: Wiley Publishing, Inc., 2009. [88] O. A. A. Elahe Fazeldehkordi, I.S. Amiri, A Study of Black Hole Attack Solutions, vol. 4333, no. March. 2016. [89] OpenMesh, “JOKER,” 2021. https://www.open-mesh.org/doc/open-mesh/Joker.html. [90] H. Zárate Ceballos, “Diseño de un Sub-Sistema de Cómputo Distribuido que permita implementar virtualización inalámbrica para gestionar recursos (Procesamiento, memoria, almacenamiento y dispositivos E/S) distribuidos en una Red Ad Hoc, mediante el modelo de pseudo Esta,” 2018. [91] P. Bowen, J. Hash, and M. Wilson, “Information Security Handbook: A Guide for Managers NIST Special Publication 800-100,” NIST Spec. Publ. 800-100, no. October, p. 137, 2006, [Online]. Available: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-100.pdf. [92] G. Boella, L. van der Torre, and H. Verhagen, “Introduction to normative multiagent systems,” Comput. Math. Organ. Theory, vol. 12, no. 2-3 SPEC. ISS., pp. 71–79, 2006, doi: 10.1007/s10588-006-9537-7. [93] E. Aizenberg and J. van den Hoven, “Designing for human rights in AI,” Big Data Soc., vol. 7, no. 2, pp. 1–30, 2020, doi: 10.1177/2053951720949566. [94] S. Tomic, F. Pecora, and A. Saffiotti, “Norms , Institutions , and Robots,” vol. 14, no. 8, pp. 1–12, 2015. [95] “Construcción de un módulo de seguridad Informática en el sistema TLÖN que permita tener características de disponibilidad,” Universidad Nacional de Colombia, 2019. [96] A. C. & D. L. John Sherwood, “White Paper - Enterprise Security Architecture,” SABSA, pp. 1–25. [97] A. Checa, “Diseño de un mecanismo de clustering en redes ad hoc para sistemas distribuidos en el contexto del sistema TLÖN,” Repositorio.Unal.Edu.Co, 2019, [Online]. Available: https://repositorio.unal.edu.co/handle/unal/77382. [98] J. F. Sanchez Cifuentes, “Prototipo de un lenguaje de programación para la implementación de servicios a través de comunidades de agentes social inspirados sobre redes Ad-hoc,” 2018. [99] “Open Mesh BATMAN.” https://www.open-mesh.org/doc/batman-adv/index.html. [100] R. Dilli and P. C. S. Reddy, “Implementation of security features in MANETs using SHA-3 standard algorithm,” in 2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016, 2016, pp. 455–458, doi: 10.1109/CSITSS.2016.7779410. [101] J. Granatyr, V. Botelho, O. R. Lessing, E. E. Scalabrin, J. P. Barthes, and F. Enembreck, “Trust and reputation models for multiagent systems,” ACM Comput. Surv., vol. 48, no. 2, 2015, doi: 10.1145/2816826. [102] N. Dhieb, H. Ghazzai, H. Besbes, Y. Massoud, “Scalable and Secure Architecture for DistributedIoT Systems,” 2020 IEEE Technology & Engineering Management Conference (TEMSCON), 2020, doi: 10.1109/TEMSCON47658.2020.9140108.Proyecto TLÖNTLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación DistribuidosLICENSElicense.txtlicense.txttext/plain; charset=utf-83964https://repositorio.unal.edu.co/bitstream/unal/80324/1/license.txtcccfe52f796b7c63423298c2d3365fc6MD51CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8914https://repositorio.unal.edu.co/bitstream/unal/80324/3/license_rdf24013099e9e6abb1575dc6ce0855efd5MD53ORIGINAL1030626820.2021.pdf1030626820.2021.pdfTesis de Maestría en Ingeniería de Sistemas y Computaciónapplication/pdf5945246https://repositorio.unal.edu.co/bitstream/unal/80324/4/1030626820.2021.pdf4e50fc6b91834d99ea19169f98b85095MD54THUMBNAIL1030626820.2021.pdf.jpg1030626820.2021.pdf.jpgGenerated Thumbnailimage/jpeg4123https://repositorio.unal.edu.co/bitstream/unal/80324/5/1030626820.2021.pdf.jpg3a8f4b5ae6a877bf4bfb74c2ef954725MD55unal/80324oai:repositorio.unal.edu.co:unal/803242024-07-25 23:14:37.563Repositorio Institucional Universidad Nacional de Colombiarepositorio_nal@unal.edu.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