ARCHITECTURE AND IMPLEMENTATION OF A TRUST MODEL FOR PERVASIVE APPLICATIONS
Keywords:
Pervasive computing, trust model, security levelAbstract
Collaborative effort to share resources is a significant feature of pervasive computing environments. To achieve secure service discovery and sharing, and to distinguish between malevolent and benevolent entities, trust models must be defined. It is critical to estimate a device’s initial trust value because of the transient nature of pervasive smart space; however, most of the prior research work on trust models for pervasive applications used the notion of constant initial trust assignment. In this paper, we design and implement a trust model called DIRT. We categorize services in different security levels and depending on the service requester’s context information, we calculate the initial trust value. Our trust value is assigned for each device and for each service. Our overall trust estimation for a service depends on the recommendations of the neighbouring devices, inference from other service-trust values for that device, and direct trust experience. We provide an extensive survey of related work, and we demonstrate the distinguishing features of our proposed model with respect to the existing models. We implement a healthcare-monitoring application and a location-based service prototype over DIRT. We also provide a performance analysis of the model with respect to some of its important characteristics tested in various scenarios.
Downloads
References
A. Tripathi, T. Ahmed, D. Kulkarni, R. Kumar, and K. Kashiramka, “Context-Based Secure
Resource Access in Pervasive Computing Environments,” Proceedings of the Second IEEE
Annual Conference on Pervasive Computing and Communications Workshops, Vol. 00, Florida,
, pp. 159-163.
A. Josang, “The right type of trust for distributed systems,” Proceedings of the 1996 workshop on
New security paradigms, ACM, September, 1996.
J. Buford, I. P. Park, G. Perkins, “Social certificates and trust negotiation,” Proceedings of the 3rd
IEEE Consumer Communications and Networking Conference, Volume 1, Las Vegas, 8-10
January 2006, pp. 615-619.
C. Lin, V. Varadarajan, “Trust-Based Management for Distributed System Security – A New
Approach,” Proceedings of the First International Conference on Availability, Reliability and
Security (ARES’06), Vienna, Austria, April 2006.
C. English, P. Nixon, S. Terzis, A. McGettrick and H. Lowe, “Dynamic trust models for
ubiquitous computing environments,” Proceedings of the Fifth International Conference on
Ubiquitous Computing, October 12-15, 2003, Seattle, USA.
D. Quercia, S. Hailes, and L. Capra, “B-trust: Bayesian Trust Framework for Pervasive
Computing,” iTrust. LNCS. May 2006. Pisa, Italy.
D. Quercia, S. Hailes, L. Capra: “Lightweight Distributed Trust Propagation”, Proceedings of the
th IEEE Int. Conference on Data Mining (ICDM 2007), September 2007, Omaha, USA
D. Gambetta, Can we trust?,” In D. Gambetta (Ed.), Trust: Making and breaking cooperative
relations, pp. 213-237. Oxford: Basil Blackwell.
F. Zhu, M. Mutka, L. Ni, “Splendor: A secure, private, and location-aware service discovery
protocol supporting mobile services,” Pervasive Computing and Communications, March 2003,
pp. 235–242.
F. Zhu, M. Mutka, and L. Ni, “PrudentExposure: A Private and User-centric Service Discovery
Protocol,” Proceedings of the Second IEEE International Conference on Pervasive Computing and
Communications (PerCom 2004), March 2004, pp. 329-340.
F. Zhu, M. Mutka, and L. Ni, “Expose or not? A progressive exposure approach for service
discovery in pervasive computing environments,” Proceedings of the third International
Conference on Pervasive Computing and Communications, Mar 2005, pp. 225-234.
F. Almenarez, A. Marin, C. Campo, and C. Garcia, “PTM: A Pervasive Trust Management Model
for dynamic open environments,” Proceedings of the first workshop on Pervasive Security,
Privacy, and Trust (pspt 2004), Boston, August 2004.
F. Almenarez and C. Campo, “SPDP: A Secure Service Discovery Protocol for Ad-hoc networks,”
Proceedings of the 9th open European summer school and IFIP workshop on net generation
networks (EUNICE 2003), Hungary, September 2003.
F. Almenarez, A. Marin, D. Diaz and J. Sanchez, “Developing a model for trust management in
pervasive devices,” Proceedings of the 4th annual IEEE international conference on pervasive
computing and communications workshops (PERCOMW’06), March 2006, Pisa, Italy
M. M. Haque; S. I. Ahamed, “An Omnipresent Formal Trust Model (FTM) for Pervasive
Computing Environment,” Proceedings of the 31st Annual Internatiobal Conference on 24-27 July
, pp. 49 –56.
O. K. Hussain; E. Chang; F.K. Hussain; T.S. Dillon; B. Soh;, “A Methodology for determining
riskiness in peer to peer communications,” 3rd IEEE International Conference on Industrial
Informatics, Aug 2005, pages pp. 665-666.
J. Liu and V. Issarny, “Enhanced Reputation Mechanism for Mobile Ad Hoc Networks,”
Proceedings of the 2nd International Conference on Trust Management, vol. 2995. Oxford, UK:
LNCS, March 2004, pp. 48–62.
K. Ranganathan, “Trustworthy Pervasive Computing: The hard Security Problems,” Proceedings
of the 2nd annual conference on pervasive computing and communications workshops
(PERCOMW’04), 2004.
L. Kagal, T. Finin, A. Joshi, “Trust-based security in pervasive computing environments,” IEEE
Computer, volume 34, pages pp. 154-157, December 2001.
L. Kagal, T. Finin, A. Joshi, “Moving from security to distributed trust in ubiquitous computing
environments,” IEEE Computer, 2001.
L. Capra, M. Musolesi, “Autonomic trust prediction for pervasive systems,” Proceedings of the
th International Conference on Advanced Information Networking and Applications (AINA
, 18-20 April 2006, Vienna, Austria. IEEE Computer Society 2006, pages pp 481 – 488.
M. Satyanarayanan, “Fundamental Challenges in Mobile Computing,” Fifteenth ACM
Symposium on Principles of Distributed Computing, May 1996.
M. Sharmin, S. Ahmed, and S. I. Ahamed, “An Adaptive Lightweight Trust Reliant Secure
Resource Discovery for Pervasive Computing Environments,” Fourth Annual IEEE International
Conference on Pervasive Computer and Communications (PerCom 2006), Pisa – Italy, Mar 2006.
Microsoft Corporation, “Universal Plug and Play Device Architecture,” Version 1.0, Microsoft
Co., 2000.
M. Sharmin, S. Ahmed, and S. I. Ahamed, “MARKS (Middleware Adaptability for Resource
Discovery, Knowledge Usability, and Self Healing) in Pervasive Computing Environments,”
Third International Conference on Information Technology: New Generations, NV, USA, April
, pp. 306-313.
M. M. Haque, and S. I. Ahamed, “An Impregnable Lightweight Device Discovery (ILDD) Model
for Pervasive Computing Environment,” IEEE Transactions on Systems, Man, and Cybernetics, to
appear, 2008.
M. Nidd, “Service Discovery in DEAPspace,” IEEE Personal Communications, Aug 2001, pp. 39-
M. Sharmin, S. Ahmed, S. I. Ahamed, and H. Li , SSRD+: A Privacy-aware Trust and Security
Model for Resource Discovery in Pervasive Computing Environment,” Proceedings of the 30th
Annual International Computer Software and Applications Conference (COMPSAC 2006),
Chicago, USA, September 17-21, 2006, pp. 67-70.
M. Sharmin, S. Ahmed, S. I. Ahamed, M. Haque, and A. J. Khan, “Healthcare Aide: Towards a
Virtual Assistant for Doctors, Patients, Nurses and Resident Doctors Using Pervasive
Middleware,” Proceedings of the 1st Workshop on Ubiquitous and Pervasive Health Care
(UbiCare 2006), Pisa, Italy, Mar 2006, pp. 490-495.
M. Weiser, “Some Computer Science Problems in Ubiquitous Computing,” Communications of
the ACM, Vol. 36, No. 7, Jul 1993, pp. 75-84.
N Shankar, W Arbaugh, “On trust for ubiquitous computing,” Workshop on Security in
Ubiquitous Computing, UBICOMP, 2002.
OMNet++ Discrete Event Simulation Systems, http://www.omnetpp.org.
P. Brezillon and G.K. Mostefaoui, “Context-based security policies: a new modeling approach,”
Second IEEE International Conference on Pervasive Computing and Communications Workshops,
Florida, 2004, pp. 154–158.
D. Quercia and S. Hailes and L. Capra, TRULLO - local trust bootstrapping for ubiquitous
devices. In: 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing,
Networking and Services, 6-10 Aug 2007, Philadelphia, USA.
Random House Unabridged Dictionary, Random House Inc., www.dictionary.com, 2006.
R. He, J. Niu, M. Yuan and J. Hu, “A novel cloud-based trust model for pervasive computing,” 4th
international conference on Computer and Information Technology, Sep 2004, pp. 693-700.
R.C.Mayer, J.H.Davis and F.D.Schoorman, “An integrative model of Organizational Trust,”
Academy of management review, 1995, Vol 20. No. 3, pp. 709 – 734.
R. Levien and A. Aiken. Attack-resistant trust metrics for public key certification. In Proc. of
USENIX Security, 1998.
S. L. Presti, M. Butler, M.Leuschel and C. Booth, “A trust analysis methodology for pervasive
computing systems,” Trusting Agents for Trusting Electronic Societies, Lecture Notes in
Computer Science (LNCS), Springer – Verlag, 2005.
S. Buchegger and J.-Y. L. Boudec, “A robust reputation system for P2P and mobile ad-hoc
networks,” Proceedings of the 2nd Workshop on the Economics of Peer-to-Peer Systems,
Cambridge, USA, June 2004.
S. P. Marsh, “Formalising Trust as a computational concept,” PhD thesis, University of Stirling,
April 2004.
S. T. Wolfe, S. I. Ahamed, and M. Zulkernine, “A Trust Framework for Pervasive Computing
Environments”, Proceedings of the 4th ACS/IEEE International Conference on Computer Systems
and Applications (AICCSA-06), IEEE CS Press, Dubai, UAE, March 2006, pp. 312-319.
V. Cahill, E. Gray, J.M. Seigneur, C. Jensen, Y. Chen, “Using trust for secure collaboration in
uncertain environments,” IEEE CS and IEEE ComSoc, pp. 52 – 61, July – September 2003.