ARCHITECTURE AND IMPLEMENTATION OF A TRUST MODEL FOR PERVASIVE APPLICATIONS

Authors

  • SHEIKH I. AHAMED Marquette University, Milwaukee, WI -53201, USA
  • MOHAMMAD ZULKERNINE Queen’s University, Kingstone, Canada
  • SAILAJA BULUSU Marquette University, Milwaukee, WI -53201, USA
  • MEHRAB MONJUR Marquette University, Milwaukee, WI -53201, USA

Keywords:

Pervasive computing, trust model, security level

Abstract

Collaborative effort to share resources is a significant feature of pervasive computing environments. To achieve secure service discovery and sharing, and to distinguish between malevolent and benevolent entities, trust models must be defined. It is critical to estimate a device’s initial trust value because of the transient nature of pervasive smart space; however, most of the prior research work on trust models for pervasive applications used the notion of constant initial trust assignment. In this paper, we design and implement a trust model called DIRT. We categorize services in different security levels and depending on the service requester’s context information, we calculate the initial trust value. Our trust value is assigned for each device and for each service. Our overall trust estimation for a service depends on the recommendations of the neighbouring devices, inference from other service-trust values for that device, and direct trust experience. We provide an extensive survey of related work, and we demonstrate the distinguishing features of our proposed model with respect to the existing models. We implement a healthcare-monitoring application and a location-based service prototype over DIRT. We also provide a performance analysis of the model with respect to some of its important characteristics tested in various scenarios.

 

Downloads

Download data is not yet available.

References

A. Tripathi, T. Ahmed, D. Kulkarni, R. Kumar, and K. Kashiramka, “Context-Based Secure

Resource Access in Pervasive Computing Environments,” Proceedings of the Second IEEE

Annual Conference on Pervasive Computing and Communications Workshops, Vol. 00, Florida,

, pp. 159-163.

A. Josang, “The right type of trust for distributed systems,” Proceedings of the 1996 workshop on

New security paradigms, ACM, September, 1996.

J. Buford, I. P. Park, G. Perkins, “Social certificates and trust negotiation,” Proceedings of the 3rd

IEEE Consumer Communications and Networking Conference, Volume 1, Las Vegas, 8-10

January 2006, pp. 615-619.

C. Lin, V. Varadarajan, “Trust-Based Management for Distributed System Security – A New

Approach,” Proceedings of the First International Conference on Availability, Reliability and

Security (ARES’06), Vienna, Austria, April 2006.

C. English, P. Nixon, S. Terzis, A. McGettrick and H. Lowe, “Dynamic trust models for

ubiquitous computing environments,” Proceedings of the Fifth International Conference on

Ubiquitous Computing, October 12-15, 2003, Seattle, USA.

D. Quercia, S. Hailes, and L. Capra, “B-trust: Bayesian Trust Framework for Pervasive

Computing,” iTrust. LNCS. May 2006. Pisa, Italy.

D. Quercia, S. Hailes, L. Capra: “Lightweight Distributed Trust Propagation”, Proceedings of the

th IEEE Int. Conference on Data Mining (ICDM 2007), September 2007, Omaha, USA

D. Gambetta, Can we trust?,” In D. Gambetta (Ed.), Trust: Making and breaking cooperative

relations, pp. 213-237. Oxford: Basil Blackwell.

F. Zhu, M. Mutka, L. Ni, “Splendor: A secure, private, and location-aware service discovery

protocol supporting mobile services,” Pervasive Computing and Communications, March 2003,

pp. 235–242.

F. Zhu, M. Mutka, and L. Ni, “PrudentExposure: A Private and User-centric Service Discovery

Protocol,” Proceedings of the Second IEEE International Conference on Pervasive Computing and

Communications (PerCom 2004), March 2004, pp. 329-340.

F. Zhu, M. Mutka, and L. Ni, “Expose or not? A progressive exposure approach for service

discovery in pervasive computing environments,” Proceedings of the third International

Conference on Pervasive Computing and Communications, Mar 2005, pp. 225-234.

F. Almenarez, A. Marin, C. Campo, and C. Garcia, “PTM: A Pervasive Trust Management Model

for dynamic open environments,” Proceedings of the first workshop on Pervasive Security,

Privacy, and Trust (pspt 2004), Boston, August 2004.

F. Almenarez and C. Campo, “SPDP: A Secure Service Discovery Protocol for Ad-hoc networks,”

Proceedings of the 9th open European summer school and IFIP workshop on net generation

networks (EUNICE 2003), Hungary, September 2003.

F. Almenarez, A. Marin, D. Diaz and J. Sanchez, “Developing a model for trust management in

pervasive devices,” Proceedings of the 4th annual IEEE international conference on pervasive

computing and communications workshops (PERCOMW’06), March 2006, Pisa, Italy

M. M. Haque; S. I. Ahamed, “An Omnipresent Formal Trust Model (FTM) for Pervasive

Computing Environment,” Proceedings of the 31st Annual Internatiobal Conference on 24-27 July

, pp. 49 –56.

O. K. Hussain; E. Chang; F.K. Hussain; T.S. Dillon; B. Soh;, “A Methodology for determining

riskiness in peer to peer communications,” 3rd IEEE International Conference on Industrial

Informatics, Aug 2005, pages pp. 665-666.

J. Liu and V. Issarny, “Enhanced Reputation Mechanism for Mobile Ad Hoc Networks,”

Proceedings of the 2nd International Conference on Trust Management, vol. 2995. Oxford, UK:

LNCS, March 2004, pp. 48–62.

K. Ranganathan, “Trustworthy Pervasive Computing: The hard Security Problems,” Proceedings

of the 2nd annual conference on pervasive computing and communications workshops

(PERCOMW’04), 2004.

L. Kagal, T. Finin, A. Joshi, “Trust-based security in pervasive computing environments,” IEEE

Computer, volume 34, pages pp. 154-157, December 2001.

L. Kagal, T. Finin, A. Joshi, “Moving from security to distributed trust in ubiquitous computing

environments,” IEEE Computer, 2001.

L. Capra, M. Musolesi, “Autonomic trust prediction for pervasive systems,” Proceedings of the

th International Conference on Advanced Information Networking and Applications (AINA

, 18-20 April 2006, Vienna, Austria. IEEE Computer Society 2006, pages pp 481 – 488.

M. Satyanarayanan, “Fundamental Challenges in Mobile Computing,” Fifteenth ACM

Symposium on Principles of Distributed Computing, May 1996.

M. Sharmin, S. Ahmed, and S. I. Ahamed, “An Adaptive Lightweight Trust Reliant Secure

Resource Discovery for Pervasive Computing Environments,” Fourth Annual IEEE International

Conference on Pervasive Computer and Communications (PerCom 2006), Pisa – Italy, Mar 2006.

Microsoft Corporation, “Universal Plug and Play Device Architecture,” Version 1.0, Microsoft

Co., 2000.

M. Sharmin, S. Ahmed, and S. I. Ahamed, “MARKS (Middleware Adaptability for Resource

Discovery, Knowledge Usability, and Self Healing) in Pervasive Computing Environments,”

Third International Conference on Information Technology: New Generations, NV, USA, April

, pp. 306-313.

M. M. Haque, and S. I. Ahamed, “An Impregnable Lightweight Device Discovery (ILDD) Model

for Pervasive Computing Environment,” IEEE Transactions on Systems, Man, and Cybernetics, to

appear, 2008.

M. Nidd, “Service Discovery in DEAPspace,” IEEE Personal Communications, Aug 2001, pp. 39-

M. Sharmin, S. Ahmed, S. I. Ahamed, and H. Li , SSRD+: A Privacy-aware Trust and Security

Model for Resource Discovery in Pervasive Computing Environment,” Proceedings of the 30th

Annual International Computer Software and Applications Conference (COMPSAC 2006),

Chicago, USA, September 17-21, 2006, pp. 67-70.

M. Sharmin, S. Ahmed, S. I. Ahamed, M. Haque, and A. J. Khan, “Healthcare Aide: Towards a

Virtual Assistant for Doctors, Patients, Nurses and Resident Doctors Using Pervasive

Middleware,” Proceedings of the 1st Workshop on Ubiquitous and Pervasive Health Care

(UbiCare 2006), Pisa, Italy, Mar 2006, pp. 490-495.

M. Weiser, “Some Computer Science Problems in Ubiquitous Computing,” Communications of

the ACM, Vol. 36, No. 7, Jul 1993, pp. 75-84.

N Shankar, W Arbaugh, “On trust for ubiquitous computing,” Workshop on Security in

Ubiquitous Computing, UBICOMP, 2002.

OMNet++ Discrete Event Simulation Systems, http://www.omnetpp.org.

P. Brezillon and G.K. Mostefaoui, “Context-based security policies: a new modeling approach,”

Second IEEE International Conference on Pervasive Computing and Communications Workshops,

Florida, 2004, pp. 154–158.

D. Quercia and S. Hailes and L. Capra, TRULLO - local trust bootstrapping for ubiquitous

devices. In: 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing,

Networking and Services, 6-10 Aug 2007, Philadelphia, USA.

Random House Unabridged Dictionary, Random House Inc., www.dictionary.com, 2006.

R. He, J. Niu, M. Yuan and J. Hu, “A novel cloud-based trust model for pervasive computing,” 4th

international conference on Computer and Information Technology, Sep 2004, pp. 693-700.

R.C.Mayer, J.H.Davis and F.D.Schoorman, “An integrative model of Organizational Trust,”

Academy of management review, 1995, Vol 20. No. 3, pp. 709 – 734.

R. Levien and A. Aiken. Attack-resistant trust metrics for public key certification. In Proc. of

USENIX Security, 1998.

S. L. Presti, M. Butler, M.Leuschel and C. Booth, “A trust analysis methodology for pervasive

computing systems,” Trusting Agents for Trusting Electronic Societies, Lecture Notes in

Computer Science (LNCS), Springer – Verlag, 2005.

S. Buchegger and J.-Y. L. Boudec, “A robust reputation system for P2P and mobile ad-hoc

networks,” Proceedings of the 2nd Workshop on the Economics of Peer-to-Peer Systems,

Cambridge, USA, June 2004.

S. P. Marsh, “Formalising Trust as a computational concept,” PhD thesis, University of Stirling,

April 2004.

S. T. Wolfe, S. I. Ahamed, and M. Zulkernine, “A Trust Framework for Pervasive Computing

Environments”, Proceedings of the 4th ACS/IEEE International Conference on Computer Systems

and Applications (AICCSA-06), IEEE CS Press, Dubai, UAE, March 2006, pp. 312-319.

V. Cahill, E. Gray, J.M. Seigneur, C. Jensen, Y. Chen, “Using trust for secure collaboration in

uncertain environments,” IEEE CS and IEEE ComSoc, pp. 52 – 61, July – September 2003.

Downloads

Published

2008-04-23

How to Cite

AHAMED, S. I. ., ZULKERNINE, M. ., BULUSU, S., & MONJUR, M. . (2008). ARCHITECTURE AND IMPLEMENTATION OF A TRUST MODEL FOR PERVASIVE APPLICATIONS. Journal of Mobile Multimedia, 4(2), 084–103. Retrieved from https://journals.riverpublishers.com/index.php/JMM/article/view/4847

Issue

Section

Articles