Connecting the Physical World with Pervasive Networks
IEEE Pervasive Computing
A Social Mechanism of Reputation Management in Electronic Communities
CIA '00 Proceedings of the 4th International Workshop on Cooperative Information Agents IV, The Future of Information Agents in Cyberspace
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Trusted P2P Transactions with Fuzzy Reputation Aggregation
IEEE Internet Computing
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Trust-enhanced Security in Location-based Adaptive Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
Supporting location-aware services for mobile users with the whereabouts diary
Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications
Virtual Identity Framework for Telecom Infrastructures
Wireless Personal Communications: An International Journal
Intelligibility and accountability: human considerations in context-aware systems
Human-Computer Interaction
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
LoCA'07 Proceedings of the 3rd international conference on Location-and context-awareness
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
International Journal of Communication Systems - Part 2: Next Generation Networks (NGNs)
The creation of a ubiquitous consumer wireless world through strategic ITU-T standardization
IEEE Communications Magazine
New dynamic ID authentication scheme using smart cards
International Journal of Communication Systems
A Trust Model Based on Service Classification in Mobile Services
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
An efficient identity-based protocol for private matching
International Journal of Communication Systems
Pervasiveness in a competitive multi-operator environment: the daidalos project
IEEE Communications Magazine
Hi-index | 0.00 |
Internet of Things and broadband communication are promoting the pervasive mobile services with their advanced features. However, security problems baffled the development. This paper proposes a trust model to protect the user's security. The billing or trust operator works as an agent to provide a trust authentication for all the service providers. The services are classified by sensitive value calculation. With the combined location-aware and identity-aware information and authentication history, the user's trustiness for corresponding service can be obtained. For decision, three trust regions are divided and referred to three ranks as follows: high, medium and low. The trust region tells the customer which authentication methods should be used for access. Penalty coefficient is also involved for forbidding force-crack. Copyright © 2012 John Wiley & Sons, Ltd.