SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Building consumer trust online
Communications of the ACM
Trust (and mistrust) in secure applications
Communications of the ACM
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Trust based adaptive on demand ad hoc routing protocol
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Security Parallels between People and Pervasive Devices
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Towards an Intrusion Detection System for Pervasive Computing Environments
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
Group management for mobile Ad Hoc networks: design, implementation and experiment
Proceedings of the 6th international conference on Mobile data management
A framework for MAC protocol misbehavior detection in wireless networks
Proceedings of the 4th ACM workshop on Wireless security
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) - Volume 01
Privacy, Security and Trust in P2P environments: A Perspective
DEXA '06 Proceedings of the 17th International Conference on Database and Expert Systems Applications
A price-based reliable routing game in wireless networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Performance Evaluation - Performance modelling and evaluation of wireless ad hoc and sensor networks
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
Trust Propagation and Aggregation in Wireless Sensor Networks
FCST '07 Proceedings of the 2007 Japan-China Joint Workshop on Frontier of Computer Science and Technology
An adaptive computational trust model for mobile ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
A secure mobile healthcare system using trust-based multicast scheme
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
A trust management scheme for enhancing security in pervasive wireless networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Trust based security in MANET routing protocols: a survey
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India
Reputation modeling for wireless sensor networks
WASA'11 Proceedings of the 6th international conference on Wireless algorithms, systems, and applications
A distributed reputation and trust management scheme for mobile peer-to-peer networks
Computer Communications
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Journal of Network and Computer Applications
Analytical models for trust based routing protocols in wireless ad hoc networks
ACM SIGSOFT Software Engineering Notes
An integrated approach for trust management based on policy, community adherence and reputation
International Journal of Ad Hoc and Ubiquitous Computing
The Journal of Supercomputing
Hi-index | 0.26 |
Traditionally, authentication and access control based users are the main methods used to provide security for individual computers and small networks. However, now that pervasive computing is encompassing new technologies and attracting more interest, these strategies are inadequate for meeting the special characteristics of ubiquitous and pervasive computing environments because such distributed systems lack central control and have flexible topologies. Malicious nodes are a major threat during the construction of a reliable pervasive network. A reputation-based trust system can track the behavior of nodes and thereby proceed by rewarding well-behaved nodes and punishing misbehaving ones. In this paper, we propose a security system based on trust management that involves developing a trust model, assigning credentials to nodes, updating private keys, managing the trust value of each node, and making appropriate decisions about nodes' access rights. Through the presentation of a formal security analysis of the trust system, we verify that the stated goals are achieved and that malicious nodes can be effectively excluded from ubiquitous and pervasive computing environments.