Connecting the Physical World with Pervasive Networks
IEEE Pervasive Computing
A Social Mechanism of Reputation Management in Electronic Communities
CIA '00 Proceedings of the 4th International Workshop on Cooperative Information Agents IV, The Future of Information Agents in Cyberspace
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Trusted P2P Transactions with Fuzzy Reputation Aggregation
IEEE Internet Computing
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Pervasiveness in a competitive multi-operator environment: the daidalos project
IEEE Communications Magazine
An integrated scheme based on service classification in pervasive mobile services
International Journal of Communication Systems
Hi-index | 0.00 |
Internet of Things (IoT) and B3G/4G communication are promoting the pervasive mobile services with its advanced features. However, security problems are also baffled the development. This paper proposes a trust model to protect the user's security. The billing or trust operator works as an agent to provide a trust authentication for all the service providers. The services are classified by sensitive value calculation. With the value, the user's trustiness for corresponding service can be obtained. For decision, three trust regions are divided, which is referred to three ranks: high, medium and low. The trust region tells the customer, with his calculated trust value, which rank he has got and which authentication methods should be used for access. Authentication history and penalty are also involved with reasons.