A distributed trust management scheme in the pervasive computing environment

被引:0
|
作者
Sun, Tao [1 ]
Denko, Mieso K. [1 ]
机构
[1] Univ Guelph, Dept Comp & Informat Sci, Guelph, ON N1G 2W1, Canada
关键词
pervasive computing; trust; security; ubquitous;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Pervasive computing allows a seamless interaction among users, devices, and applications, anytime and anywhere. Yet portable devices in pervasive computing are mainly powered by batteries and have limited computational and communication capability. Thus the open and dynamic environment in pervasive computing raises challenges in security and trust management. Without trust, pervasive devices cannot cooperate effectively, and the deployment of pervasive computing systems will be restricted to specific application scenarios. The traditional centralized security management schemes are not directly applicable in pervasive computing environments. Moreover, existing user authentication and access control schemes are inadequate to ensure security in pervasive computing. To overcome the limitation of centralized schemes, we need a distributed solution. In this paper, we propose a distributed trust management scheme to ensure security in pervasive computing environments. The main contributions of this paper are: (1) the employment of a simple, distributed trust computation and maintenance mechanism to reduce communication and computational overhead without compromising security; (2) the building of an aggregate trust metric that is based on direct observation and indirect observations obtained from neighbors' recommendations. The scheme gives more weight to direct observations and less weight to indirect observations. Every device computes and updates the trust value periodically in a distributed fashion. However, the exchange of trust information is carried out on demand to reduce communication overhead. The operation of the proposed scheme with varying parameter settings is illustrated, using an analytical approach.
引用
收藏
页码:1219 / 1222
页数:4
相关论文
共 50 条
  • [1] Trust Management in the Pervasive Computing Era
    Trcek, Denis
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (04) : 52 - 55
  • [2] Probabilistic Trust Management in Pervasive Computing
    Denko, Mieso K.
    Sun, Tao
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 610 - 615
  • [3] A Novel Trust Management Scheme Using Fuzzy Logic for a Pervasive Environment
    Uthariaraj, V. Rhymend
    Valarmathi, J.
    Kumar, G. Arjun
    Subramanian, Praveen
    Karthick, R.
    [J]. RECENT TRENDS IN NETWORKS AND COMMUNICATIONS, 2010, 90 : 144 - 152
  • [4] Multilevel Trust Management Framework for Pervasive Computing
    Zhong Dong
    Zhu Yian
    Lei Wanbao
    Gu Jianhua
    Wang Yunlan
    [J]. THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 159 - 162
  • [5] Research on trust management model in pervasive computing
    Zhu, Jian-Yong
    [J]. 2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 436 - 440
  • [6] Towards Secure Trust Bootstrapping in Pervasive Computing Environment
    Ahamed, Sheikh I.
    Hoque, Endadul
    Rahman, Farzana
    Zulkernine, Mohammad
    [J]. 11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 89 - +
  • [7] Distributed Trust Based Access Control Architecture for Pervasive Computing
    Javeed, M. Younas
    Nawaz, Sidra
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 464 - 469
  • [8] An efficient key management scheme for pervasive computing
    Ge, H
    [J]. ISM 2005: SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2005, : 657 - 661
  • [9] Qualitative Trust Dynamics Algebra for Trust Management in Pervasive Computing Environments
    Trcek, Denis
    [J]. AIC '09: PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS: RECENT ADVANCES IN APPLIED INFORMAT AND COMMUNICATIONS, 2009, : 34 - +
  • [10] CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment
    Ahene, Emmanuel
    Guan, Yuanfeng
    Zhang, Zhiwei
    Li, Fagen
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 67 - 83