Enforcing trust in pervasive computing with trusted computing technology

  • Authors:
  • Shiqun Li;Shane Balfe;Jianying Zhou;Kefei Chen

  • Affiliations:
  • Dept. of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China;Institute for Infocomm Research, Singapore;Institute for Infocomm Research, Singapore;Dept. of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China

  • Venue:
  • CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Pervasive computing as a concept holds the promise of simplifying daily life by integrating mobile devices and digital infrastructures into our physical world. These devices in a pervasive environment would establish dynamic ad-hoc networks to provide ubiquitous services. The open and dynamic characteristics of pervasive environments necessitate the requirement for some form of trust assumptions to be made. Trust in this context not only includes authentication, confidentiality and privacy but also includes the belief that the devices and smart environment behave as expected. In this paper, we propose a trust enforced pervasive computing environment using the primitives provided by a TPM (Trusted Platform Module). The application scenario shows how critical information infrastructure such as services and data can be protected. In this smart environment, a person carrying a device authenticates to the environment in order to utilize its services. In this context the device and the smart environment can also test and check each other's behaviors to better perform trust negotiation.