Context-Based Secure Resource Access in Pervasive Computing Environments
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Trustworthy Pervasive Computing: The Hard Security Problems
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Agent-based Automated Trust Negotiation for Pervasive Computing
ICESS '05 Proceedings of the Second International Conference on Embedded Software and Systems
A Trust Framework for Pervasive Computing Environments
AICCSA '06 Proceedings of the IEEE International Conference on Computer Systems and Applications
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
Probabilistic Trust Management in Pervasive Computing
EUC '08 Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Deterministic trust management in pervasive computing
Journal of Mobile Multimedia
B-Trust: bayesian trust framework for pervasive computing
iTrust'06 Proceedings of the 4th international conference on Trust Management
Hi-index | 0.00 |
In a pervasive wireless network, malicious nodes can initiate attacks to well-behaved nodes. This paper argues that our recently proposed probabilistic trust management scheme for pervasive computing can be used in pervasive wireless networks to provide protection against few typical attacks usually targeted at such systems. Simulation experiments are provided to assess the achievement of the stated goal. The performance metric used is the average packet loss ratio, representing the ratio of packets lost to the total packets generated in a certain time period.