Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Towards self-protecting ubiquitous systems: monitoring trust-based interactions

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches ineffective. As a result, to support secure collaborations entities must implement self-protective measures. Trust management is a solution well suited to this task as reasoning about future interactions is based on the outcome of past ones. This requires monitoring of interactions as they take place. Such monitoring also allows us to take corrective action when interactions are proceeding unsatisfactorily. In this vein, we first present a trust-based model of interaction based on event structures. We then describe our ongoing work in the development of a monitor architecture which enables self-protective actions to be carried out at critical points during principal interaction. Finally, we discuss some potential directions for future work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Kindberg T, Fox A (2002) System software for ubiquitous computing. IEEE Pervasive Comput 1(1):70–81

    Article  Google Scholar 

  2. Yu B, Singh MP (2002) An evidential model of distributed reputation management. In: Proceedings of the 1st international joint conference on Autonomous agents and multiagent systems. ACM Press, Bologna, pp 294–301

  3. Xiong L, Liu L (2002) Building trust in decentralized peer-to-peer electronic communities. In: Proceedings of the 5th international conference on electronic commerce research (ICECR-5), Montreal

  4. Grandison T, Sloman M (2003) Trust management tools for internet applications. In: Nixon P, Terzis S (eds) Proceedings of the 1st international conference on trust management, vol 2692, series LNCS, May 2003, Heraklion, Crete. Springer, Berlin Heidelberg New York, pp 91-107

  5. Cahill V, Gray E, Seigneur JM, Jensen C, Chen Y, Shand B, Dimmock N, Twigg A, Bacon J, English C, Wagealla W, Terzis S, Nixon P, Serugendo G, Bryce C, Carbone M, Krukow K, Nielsen M (2003) Using trust for secure collaboration in uncertain environments. Pervasive Computing Magazine. IEEE Computer Society Press 2(3):52–61

    Google Scholar 

  6. Carbone M, Krukow K, Nielsen M (2003) Revised computational trust model. SECURE Deliverable 1.3

  7. Paton N (1998) Active rules in database systems. Springer, Berlin Heidelberg New York. ISBN 0387985298

  8. Gross PN, Gupta S, Kaiser GE, Kc GS, Parekh JJ (2001) An active events model for systems monitoring. Working conference on complex and dynamic systems architecture

Download references

Acknowledgements

This work is supported by the EU project SECURE: Secure Environments for Collaboration among Ubiquitous Roaming Entities (IST-2001-32486). The authors would also like to acknowledge the contribution by Waleed Wagealla.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Colin English.

Rights and permissions

Reprints and permissions

About this article

Cite this article

English, C., Terzis, S. & Nixon, P. Towards self-protecting ubiquitous systems: monitoring trust-based interactions. Pers Ubiquit Comput 10, 50–54 (2006). https://doi.org/10.1007/s00779-005-0030-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-005-0030-y

Keywords

Navigation