DETERMINISTIC TRUST MANAGEMENT IN PERVASIVE COMPUTING
Keywords:
Trust, trust management, deterministic trustAbstract
An effective trust management technique plays a vital role in evaluating relationships among devices in pervasive computing. In this paper, we propose a deterministic trust management scheme that aims at establishing trust relationships among devices using direct and indirect computation methods. Recommendations and trust updating mechanisms are used to increase the reliability of trust computations. We have carried out performance evaluations using simulation experiments. The results show that trust management with recommendation outperforms other schemes.
Downloads
References
Weiser, M, The Computer for the 21st Century, Scientific American, vol. 265, 1991, pp. 66-75.
Kagal, L., Finin, T. and Joshi, A., Moving from Security to Distributed Trust in Ubiquitous
Computing Environments. In LNCS 2867, 2003.
Sun, Y. L., Han, Z., Yu, W. and Liu, K. J. R., A Trust Evaluation Framework in Distributed
Networks: Vulnerability Analysis and Defence Against Attacks. In 25th IEEE International
Conference on Computer Communications (INFOCOM 2006), 2006, pp. 1-13.
Nguyen, C. T., Camp, O., and Loiseau, S., A Bayesian network based trust model for improving
collaboration in mobile ad hoc networks. In 2007 IEEE International Conference on Research,
Innovation and Vision for the Future, 2007, pp. 144-151.
McNamara, L., Mascolo, C. and Capra, L., Trust and Mobility Aware Service Provision for
Pervasive Computing. In First International Workshop on Requirements and Solutions for
Pervasive Software Infrastructures (co-located with Pervasive 2006), Dublin, Ireland, May 2006.
Jøsang, A., and Ismail, R., The Beta Reputation System. In Proceedings of the 15th Bled
Conference on Electronic Commerce, June 2002, pp. 17-19.
Langheinrich, M., When Trust Does Not Compute - The Role of Trust in Ubiquitous Computing.
In the Proceedings of Privacy Workshop in Ubicomp'03, 2003.
Ranganathan, K., Trustworthy Pervasive Computing: The Hard Security Problem. In Proceedings
of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops,
-17, March 2004, pp: 117 - 121.
Goecks, J., and Mynatt, E., Enabling Privacy Management in Ubiquitous Computing
Environments Through Trust and Reputation Systems. In Workshop on Privacy in Digital
Environments: Empowering Users. In the Proceedings of CSCW 2002, 2002.
Kagal, L., Finin, T., and Joshi, A., Trust-based Security in Pervasive Computing Environments. In
Computer, 2001, vol. 34, issue 12, pp. 154-157.
Nielsen, M., and Krukow, K., A Bayesian Model for Event-based Trust. In Electronic Notes in
Theoretical Computer Science (ENTCS), 2007, vol. 172, pp. 499-521.
Quercia, D., Hailes, S., and Capra, L., B-Trust: Bayesian Trust Framework for Pervasive
Computing”. In Lecture Notes in Computer Science, 2006, vol. 3986, pp. 298- 312.
Yuan, W., Guan, D., Lee, S., and Lee, Y.-K. A Dynamic Trust Model Based on Naive Bayes
Classifier for Ubiquitous Environments. In the 2006 International Conference on High
Performance Computing and Communications (HPCC-06), Munich, Germany, Sept. 13-15, 2006.
Yuan, W., Guan, D., Lee, S., and Lee, Y. K., The Role of Trust in Ubiquitous Healthcare. In the
Proceedings of the 9th International Conference on e-Health Networking, Application and
Services, 2007, 312-315.
Dong, C., and Dulay, N., Privacy Preserving Trust Negotiation for Pervasive Healthcare. In the 1st
International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth
, 2006, 1-9.
Sun, T., and Denko, M. K., A Distributed Trust Management Scheme in Pervasive Computing
Environment. In the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE
, 2007, 1219-1222.
Gambetta, D., Can We Trust? In Trust: Making and Breaking Cooperative Relations, 1988, pp.
-237.
Jøsang, A., The Right Type of Trust for Distributed Systems. In the Proceedings of the 1996
Workshop on new security paradigms, NSPW '96, ACM Press, 1996, pp. 119-131.
Varshney, U. Pervasive Healthcare, Computer, vol. 36, Issue 12, 2003, pp. 138-140.