DETERMINISTIC TRUST MANAGEMENT IN PERVASIVE COMPUTING

Authors

  • MIESO K. DENKO Department of Computing and Information Science University of Guelph, Guelph
  • TAO SUN Department of Computing and Information Science University of Guelph, Guelph
  • ISAAC WOUNGANG Department of Computer Science Ryerson University, Toronto

Keywords:

Trust, trust management, deterministic trust

Abstract

An effective trust management technique plays a vital role in evaluating relationships among devices in pervasive computing. In this paper, we propose a deterministic trust management scheme that aims at establishing trust relationships among devices using direct and indirect computation methods. Recommendations and trust updating mechanisms are used to increase the reliability of trust computations. We have carried out performance evaluations using simulation experiments. The results show that trust management with recommendation outperforms other schemes.

 

Downloads

Download data is not yet available.

References

Weiser, M, The Computer for the 21st Century, Scientific American, vol. 265, 1991, pp. 66-75.

Kagal, L., Finin, T. and Joshi, A., Moving from Security to Distributed Trust in Ubiquitous

Computing Environments. In LNCS 2867, 2003.

Sun, Y. L., Han, Z., Yu, W. and Liu, K. J. R., A Trust Evaluation Framework in Distributed

Networks: Vulnerability Analysis and Defence Against Attacks. In 25th IEEE International

Conference on Computer Communications (INFOCOM 2006), 2006, pp. 1-13.

Nguyen, C. T., Camp, O., and Loiseau, S., A Bayesian network based trust model for improving

collaboration in mobile ad hoc networks. In 2007 IEEE International Conference on Research,

Innovation and Vision for the Future, 2007, pp. 144-151.

McNamara, L., Mascolo, C. and Capra, L., Trust and Mobility Aware Service Provision for

Pervasive Computing. In First International Workshop on Requirements and Solutions for

Pervasive Software Infrastructures (co-located with Pervasive 2006), Dublin, Ireland, May 2006.

Jøsang, A., and Ismail, R., The Beta Reputation System. In Proceedings of the 15th Bled

Conference on Electronic Commerce, June 2002, pp. 17-19.

Langheinrich, M., When Trust Does Not Compute - The Role of Trust in Ubiquitous Computing.

In the Proceedings of Privacy Workshop in Ubicomp'03, 2003.

Ranganathan, K., Trustworthy Pervasive Computing: The Hard Security Problem. In Proceedings

of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops,

-17, March 2004, pp: 117 - 121.

Goecks, J., and Mynatt, E., Enabling Privacy Management in Ubiquitous Computing

Environments Through Trust and Reputation Systems. In Workshop on Privacy in Digital

Environments: Empowering Users. In the Proceedings of CSCW 2002, 2002.

Kagal, L., Finin, T., and Joshi, A., Trust-based Security in Pervasive Computing Environments. In

Computer, 2001, vol. 34, issue 12, pp. 154-157.

Nielsen, M., and Krukow, K., A Bayesian Model for Event-based Trust. In Electronic Notes in

Theoretical Computer Science (ENTCS), 2007, vol. 172, pp. 499-521.

Quercia, D., Hailes, S., and Capra, L., B-Trust: Bayesian Trust Framework for Pervasive

Computing”. In Lecture Notes in Computer Science, 2006, vol. 3986, pp. 298- 312.

Yuan, W., Guan, D., Lee, S., and Lee, Y.-K. A Dynamic Trust Model Based on Naive Bayes

Classifier for Ubiquitous Environments. In the 2006 International Conference on High

Performance Computing and Communications (HPCC-06), Munich, Germany, Sept. 13-15, 2006.

Yuan, W., Guan, D., Lee, S., and Lee, Y. K., The Role of Trust in Ubiquitous Healthcare. In the

Proceedings of the 9th International Conference on e-Health Networking, Application and

Services, 2007, 312-315.

Dong, C., and Dulay, N., Privacy Preserving Trust Negotiation for Pervasive Healthcare. In the 1st

International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth

, 2006, 1-9.

Sun, T., and Denko, M. K., A Distributed Trust Management Scheme in Pervasive Computing

Environment. In the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE

, 2007, 1219-1222.

Gambetta, D., Can We Trust? In Trust: Making and Breaking Cooperative Relations, 1988, pp.

-237.

Jøsang, A., The Right Type of Trust for Distributed Systems. In the Proceedings of the 1996

Workshop on new security paradigms, NSPW '96, ACM Press, 1996, pp. 119-131.

Varshney, U. Pervasive Healthcare, Computer, vol. 36, Issue 12, 2003, pp. 138-140.

Downloads

Published

2008-09-01

How to Cite

DENKO, M. K. ., SUN, T. ., & WOUNGANG, I. . (2008). DETERMINISTIC TRUST MANAGEMENT IN PERVASIVE COMPUTING. Journal of Mobile Multimedia, 5(1), 064–080. Retrieved from https://journals.riverpublishers.com/index.php/JMM/article/view/4829

Issue

Section

Articles