Toward trust based protocols in a pervasive and mobile computing environment: A survey

被引:11
|
作者
Usman, Aminu Bello [1 ]
Gutierrez, Jairo [1 ]
机构
[1] Auckland Univ Technol, Sch Engn Comp & Math Sci, Auckland, New Zealand
关键词
Trust-based routing protocol; Pervasive and mobile computing; Secure routing protocols; Device-to-device communication; Wireless mobile networks; QOS ROUTING ALGORITHM; AD HOC NETWORKS; REPUTATION SYSTEMS; MODEL; MANAGEMENT; MECHANISM; AUTHENTICATION; INTERNET; DESIGN; RECIPROCITY;
D O I
10.1016/j.adhoc.2018.07.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the blooming era of Pervasive and Mobile Computing, trust has been accepted as a vital factor for provisioning secure, reliable and seamless communications between pervasive computing elements. However, advancing research in the area of trust-based protocol for distributed Pervasive and Mobile Computing might be challenging due to the ambiguity of the concept of trust as well as the variety of divergent trust models, protocols and algorithms in different contexts. In this research, we augment the trust concept and definition from various field of studies and proposed models in the literature and provide general conceptual phases and methods of trust management toward-trust-based protocols, in the context of Pervasive and Mobile Computing. The paper addresses a broad range of techniques, methods, models, applications and desired futures of trust-based protocols. A number of the currently used trust-based protocols are critically reviewed, and this further leads our discussion to the security attacks and mitigation strategies used with trust-based protocols for pervasive and mobile computing. Finally, the paper discusses open research issues. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:143 / 159
页数:17
相关论文
共 50 条
  • [1] An Adaptive Framework for Trust based Security in Pervasive Computing Environment
    Iltaf, Naima
    Ghafoor, Abdul
    Hussain, Khtar
    [J]. 2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 624 - 628
  • [2] Trust Based Pervasive Computing
    Shane Balfe
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1477 - 1480
  • [3] A fuzzy based credibility evaluation of recommended trust in pervasive computing environment
    Iltaf, Naima
    Ghafoor, Abdul
    [J]. 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 617 - 620
  • [4] A fuzzy based credibility evaluation of recommended trust in pervasive computing environment
    Iltaf, Naima
    Ghafoor, Abdul
    [J]. 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 669 - 672
  • [5] A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment
    Iltaf, Naima
    Hussain, Mukhtar
    Kamran, Farrukh
    [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 702 - +
  • [6] A distributed trust management scheme in the pervasive computing environment
    Sun, Tao
    Denko, Mieso K.
    [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1219 - 1222
  • [7] Towards Secure Trust Bootstrapping in Pervasive Computing Environment
    Ahamed, Sheikh I.
    Hoque, Endadul
    Rahman, Farzana
    Zulkernine, Mohammad
    [J]. 11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 89 - +
  • [8] A trust-based service evaluation and selection model in pervasive computing environment
    Chen, Zhenxiang
    Ge, Liansheng
    Wang, Haiyang
    Huang, Xianzhi
    Lin, Jinjiao
    [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 641 - +
  • [9] A Dynamic Trust Evaluation Algorithm based on Subjective Logic in Pervasive Computing Environment
    Yang, Yan
    He, Liang
    Cai, Xueming
    [J]. 2008 10TH INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION ROBOTICS & VISION: ICARV 2008, VOLS 1-4, 2008, : 1078 - 1083
  • [10] Mobile cloud computing framework for a pervasive and ubiquitous environment
    Min Choi
    Jonghyuk Park
    Young-Sik Jeong
    [J]. The Journal of Supercomputing, 2013, 64 : 331 - 356