Some computer science issues in ubiquitous computing
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Fundamental challenges in mobile computing
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
The right type of trust for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Context-Based Security Policies: A New Modeling Approach
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Context-Based Secure Resource Access in Pervasive Computing Environments
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Trustworthy Pervasive Computing: The Hard Security Problems
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
PrudentExposure: A Private and User-centric Service Discovery Protocol
PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
A Novel Cloud-Based Trust Model for Pervasive Computing
CIT '04 Proceedings of the The Fourth International Conference on Computer and Information Technology
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Developing a Model for Trust Management in Pervasive Devices
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
Healthcare Aide: Towards a Virtual Assistant for Doctors Using Pervasive Middleware
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
ITNG '06 Proceedings of the Third International Conference on Information Technology: New Generations
An Adaptive Lightweight Trust Reliant Secure Resource Discovery for Pervasive Computing Environments
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
The Web and Complex Adaptive Systems
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
Trust Based Risk Management for Distributed System Security - A New Approach
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 02
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 01
A Trust Framework for Pervasive Computing Environments
AICCSA '06 Proceedings of the IEEE International Conference on Computer Systems and Applications
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
Lightweight Distributed Trust Propagation
ICDM '07 Proceedings of the 2007 Seventh IEEE International Conference on Data Mining
TRULLO - local trust bootstrapping for ubiquitous devices
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
B-Trust: bayesian trust framework for pervasive computing
iTrust'06 Proceedings of the 4th international conference on Trust Management
A trust analysis methodology for pervasive computing systems
Trusting Agents for Trusting Electronic Societies
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Hi-index | 0.00 |
Collaborative effort to share resources is a significant feature of pervasive computing environments. To achieve secure service discovery and sharing, and to distinguish between malevolent and benevolent entities, trust models must be defined. It is critical to estimate a device's initial trust value because of the transient nature of pervasive smart space; however, most of the prior research work on trust models for pervasive applications used the notion of constant initial trust assignment. In this paper, we design and implement a trust model called DIRT. We categorize services in different security levels and depending on the service requester's context information, we calculate the initial trust value. Our trust value is assigned for each device and for each service. Our overall trust estimation for a service depends on the recommendations of the neighbouring devices, inference from other service-trust values for that device, and direct trust experience. We provide an extensive survey of related work, and we demonstrate the distinguishing features of our proposed model with respect to the existing models. We implement a healthcare-monitoring application and a location-based service prototype over DIRT. We also provide a performance analysis of the model with respect to some of its important characteristics tested in various scenarios.