A distributed trust management scheme in the pervasive computing environment

被引:0
|
作者
Sun, Tao [1 ]
Denko, Mieso K. [1 ]
机构
[1] Univ Guelph, Dept Comp & Informat Sci, Guelph, ON N1G 2W1, Canada
关键词
pervasive computing; trust; security; ubquitous;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Pervasive computing allows a seamless interaction among users, devices, and applications, anytime and anywhere. Yet portable devices in pervasive computing are mainly powered by batteries and have limited computational and communication capability. Thus the open and dynamic environment in pervasive computing raises challenges in security and trust management. Without trust, pervasive devices cannot cooperate effectively, and the deployment of pervasive computing systems will be restricted to specific application scenarios. The traditional centralized security management schemes are not directly applicable in pervasive computing environments. Moreover, existing user authentication and access control schemes are inadequate to ensure security in pervasive computing. To overcome the limitation of centralized schemes, we need a distributed solution. In this paper, we propose a distributed trust management scheme to ensure security in pervasive computing environments. The main contributions of this paper are: (1) the employment of a simple, distributed trust computation and maintenance mechanism to reduce communication and computational overhead without compromising security; (2) the building of an aggregate trust metric that is based on direct observation and indirect observations obtained from neighbors' recommendations. The scheme gives more weight to direct observations and less weight to indirect observations. Every device computes and updates the trust value periodically in a distributed fashion. However, the exchange of trust information is carried out on demand to reduce communication overhead. The operation of the proposed scheme with varying parameter settings is illustrated, using an analytical approach.
引用
收藏
页码:1219 / 1222
页数:4
相关论文
共 50 条
  • [21] An inter-domain authentication scheme for pervasive computing environment
    Yao, Lin
    Wang, Lei
    Kong, Xiangwei
    Wu, Guowei
    Xia, Feng
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 234 - 244
  • [22] Trust Based Pervasive Computing
    Shane Balfe
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1477 - 1480
  • [23] A Trust Model in Pervasive Computing
    Wang, Jing
    Yang, Zhimin
    Chen, Yunlei
    Kou, Weili
    Zhang, Zengguang
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 370 - 374
  • [24] Application of fuzzy logic in federated trust management for pervasive computing
    Wu, Zhengping
    Weaver, Alfred C.
    [J]. 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 215 - +
  • [25] Toward trust based protocols in a pervasive and mobile computing environment: A survey
    Usman, Aminu Bello
    Gutierrez, Jairo
    [J]. AD HOC NETWORKS, 2018, 81 : 143 - 159
  • [26] A fuzzy based credibility evaluation of recommended trust in pervasive computing environment
    Iltaf, Naima
    Ghafoor, Abdul
    [J]. 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 617 - 620
  • [27] A fuzzy based credibility evaluation of recommended trust in pervasive computing environment
    Iltaf, Naima
    Ghafoor, Abdul
    [J]. 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 669 - 672
  • [28] A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment
    Iltaf, Naima
    Hussain, Mukhtar
    Kamran, Farrukh
    [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 702 - +
  • [29] A Trust Management Scheme for Enhancing Security in Pervasive Wireless Networks
    Denko, Mieso K.
    Sun, Tao
    Woungang, Isaac
    Rodrigues, Joel J. P. C.
    Chao, Han-Chieh
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 3670 - +
  • [30] Toward a Distributed Trust Management scheme for VANET
    Kchaou, Amira
    Abassi, Ryma
    Guemara, Sihem
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,