Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Trust management in ubiquitous computing: A Bayesian approach

Published: 01 March 2011 Publication History

Abstract

Designing a trust management scheme that can effectively evaluate the relationships among devices in pervasive computing environments is a challenging task. This paper continues the investigation of our recently proposed probabilistic trust management scheme for pervasive computing environments. We argue that in addition to allowing a device to find other appropriate devices with which to interact, while detecting those that are malicious, our trust management scheme is also capable of (1) allowing a device to judge the trustworthiness of another device it interacts with, while making a better use of the received recommendations and (2) behaving as expected when a device has little or enough experience of interactions with other devices and changes dynamically occur in the proportion of malicious devices. Simulation experiments are provided to assess the achievement of the stated goals, using some representative performance metrics.

References

[1]
Weiser, M., . 1991. The Computer for the 21st Century, 1991.Scientific American.
[2]
D. Lewellyn-Jones, M. Merabti, Q.Shi, B. Askwith, A security framework for executables in a ubiquitous computing environment, in: Proceedings of the IEEE GLOBECOM'04, vol. 4, 2004, pp. 2158-2163.
[3]
M.K. Denko, T. Sun, I. Woungang, Deterministic trust management in pervasive computing, in: Journal of Mobile Multimedia, Rinto Press, vol. 5, No. 1, 2009, pp. 064-080.
[4]
M.K. Denko, T. Sun, Probabilistic trust management in pervasive computing, in: Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC'08), December 17-20, Shangai, China, 2008, pp. 610-615.
[5]
K. Ranganathan, Trustworthy pervasive computing: the hard security problem, in: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004, pp. 117-121.
[6]
D.H. McKnight, N.L. Chervany, The meanings of trust, in: The MISRC Working Paper Series, Technical Report 94-04, 1996.
[7]
Y.L. Sun, Z. Han, W. Yu, K.J.R. Liu, A trust evaluation framework in distributed networks: vulnerability analysis and defence against attacks, in: Proceedings of the INFOCOM 2006, 2006, pp. 1-13.
[8]
C.T. Nguyen, O. Camp, S. Loiseau, A Bayesian network-based trust model for improving collaboration in mobile ad hoc networks, in: IEEE International Conference on Research, Innovation & Vision for the Future, 2007, pp. 144-151.
[9]
Presti, S.L., Butler, M., Leuschel, M. and Booth, C., A trust analysis methodology for pervasive computing systems. LNCS. v3577. 129-143.
[10]
L. McNamara, C. Mascolo, L. Capra, trust and mobility aware service provision for pervasive computing, in: Proceedings of the First International Workshop on Requirements and Solutions for Pervasive Software Infrastructures, 2006, pp. 603-610.
[11]
Z. Liu, D. Xiu, Agent-based automated trust negotiation for pervasive computing, in: Proceedings of the Second International Conference on Embedded Software and Systems, 2005, pp. 300-309.
[12]
Kagal, L., Finin, T. and Joshi, A., Trust-based security in pervasive computing environments. IEEE Computer. v34 i12. 154-157.
[13]
S. Yin, I. Ray, I. Ray, A trust model for pervasive computing environments, in: Proceedings of CollaborateCom2006, 2006, pp. 1-6.
[14]
S.T. Wolfe, S.I. Ahamed, M. Zulkernine, A trust framework for pervasive computing environments, in: Proceedings of the IEEE International Conference on Computer Systems and Applications, 2006, pp. 312-319.
[15]
Quercia, D., Hailes, S. and Capra, L., B-Trust: Bayesian trust framework for pervasive computing. LNCS. v3986. 298-312.
[16]
Yuan, W., Guan, D., Lee, S. and Lee, Y., A dynamic trust model based on naive Bayes classifier for ubiquitous environments. LNCS. v4208. 562-571.
[17]
S. Buchegger, J. Le Boudec, The effect of rumor spreading in reputation systems for mobile ad hoc networks, in: Proceedings of the Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt'03), 2003.
[18]
W.T.L. Teacy, J. Patel, N.R. Jennings, M. Luck, Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model, in: Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, 2005, pp. 997-1004.
[19]
Whitby, A., Jøsang, A. and Indulska, J., Filtering out unfair ratings in Bayesian reputation systems. Icfain Journal of Management Research. v4 i2. 48-64.
[20]
B. Yu, M.P. Singh, Detecting deception in reputation management, in: Proceedings of AAMAS'03, 2003, pp. 73-80.
[21]
C. Dellarocas, Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior, in: Proceedings of the Second ACM Conference on Electronic Commerce, 2000, pp. 150-157.
[22]
A. Jøsang, R. Ismail, The beta reputation system, in: Proceedings of the 15th Bled Conference on Electronic Commerce, 2002.
[23]
D.J.C. MacKay, Bayesian inference and sampling theory, in: David J.C. MacKay (Eds), Information Theory, Inference, and Learning Algorithms, Cambridge University Press, Cambridge, ISBN-13: 9780521642989, September 2003, 640 pages (Chapter 37).
[24]
B. Fu, D. O'Sullivan, User centric trust-based access control management for ubiquitous computing environments, in: Proceedings of the Fifth International IEEE Workshop on Management of Ubiquitous Communications and Services (MUCS 2008), April 11, Salvador Bahia, Brazil, 2008.
[25]
P.R. Lakshmi Eswari, N.C. Raghuram, M.K. Chaithanya, B. Manjulatha, G. Jyostna, N. Sarat Chandra Babu, A comprehensive security, privacy and trust management framework for ubiquitous computing environment, in: Proceedings of the UbiComp 2008 Workshop, Hyderabad, India, 2008.
[26]
Narula, P., Dhurandher, S.K. and Misra, S., Security in mobile ad hoc networks using soft encryption and trust-based multi-path routing. Computer Communications. v31 i4. 760-769.
[27]
Z. Yan (Ed.), Trust Modeling and Management in Digital Environments: From Social Concept to System Development, IGI Global, 2009.
[28]
N. Razavi, A.M. Rahmani, M. Mohsenzadeh, A context-based trust management model for pervasive computing systems, in: International Journal of Computer Science and Information Security (IJCSIS), vol. 6, No. 1, October 2009, USA, pp. 137-142.
[29]
R. Neisse, M. Wegdam, M. van Sinderen, Trustworthiness and quality of context information, in: Proceedings of the 2008 International Smposium on Trusted Computing (TrustCom), Hunan, China, November 18-20, 2008.

Cited By

View all
  • (2023)Trust‐aware task load balancing in multi‐access edge computing based on blockchain and a zero trust security capability frameworkTransactions on Emerging Telecommunications Technologies10.1002/ett.484534:12Online publication date: 10-Dec-2023
  • (2022)An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of ThingsCluster Computing10.1007/s10586-021-03473-325:3(1779-1789)Online publication date: 1-Jun-2022
  • (2020)Self-observation and recommendation based trust model with defense scheme for wireless ad hoc networkJournal of High Speed Networks10.3233/JHS-20062926:1(41-54)Online publication date: 1-Jan-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Computer Communications
Computer Communications  Volume 34, Issue 3
March, 2011
302 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 March 2011

Author Tags

  1. Bayesian approach
  2. Pervasive computing
  3. Probabilistic trust management
  4. Security
  5. Ubiquitous computing

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Trust‐aware task load balancing in multi‐access edge computing based on blockchain and a zero trust security capability frameworkTransactions on Emerging Telecommunications Technologies10.1002/ett.484534:12Online publication date: 10-Dec-2023
  • (2022)An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of ThingsCluster Computing10.1007/s10586-021-03473-325:3(1779-1789)Online publication date: 1-Jun-2022
  • (2020)Self-observation and recommendation based trust model with defense scheme for wireless ad hoc networkJournal of High Speed Networks10.3233/JHS-20062926:1(41-54)Online publication date: 1-Jan-2020
  • (2020)A Survey on Trust Modeling from a Bayesian PerspectiveWireless Personal Communications: An International Journal10.1007/s11277-020-07097-5112:2(1205-1227)Online publication date: 1-May-2020
  • (2019)Dynamic trust evaluation model based on bidding and multi-attributes for social networksInternational Journal of High Performance Computing and Networking10.5555/3337625.333763313:4(436-454)Online publication date: 1-Jan-2019
  • (2019)Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networksEURASIP Journal on Wireless Communications and Networking10.1186/s13638-019-1524-z2019:1(1-10)Online publication date: 1-Dec-2019
  • (2018)Comprehensive three-layer trust management model for public cloud environmentInternational Journal of Business Information Systems10.1504/IJBIS.2018.09253128:3(371-391)Online publication date: 1-Jan-2018
  • (2018)A novel trust management scheme based on Dempster---Shafer evidence theory for malicious nodes detection in wireless sensor networksThe Journal of Supercomputing10.1007/s11227-017-2150-374:4(1779-1801)Online publication date: 1-Apr-2018
  • (2017)A trustworthy web service composition method for ubiquitous computingInternational Journal of Ad Hoc and Ubiquitous Computing10.1504/IJAHUC.2017.08571926:1(44-55)Online publication date: 1-Jan-2017
  • (2017)An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of ThingsWireless Personal Communications: An International Journal10.1007/s11277-016-3802-y93:2(571-587)Online publication date: 1-Mar-2017
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media