Security: for ubiquitous computing
Security: for ubiquitous computing
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Protection of Privacy in Pervasive Computing Environments
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
Personal and Ubiquitous Computing
UbiqStack: a taxonomy for a ubiquitous computing software stack
Personal and Ubiquitous Computing
Supporting Quality of Privacy (QoP) in Pervasive Computing
ENC '05 Proceedings of the Sixth Mexican International Conference on Computer Science
NGMAST '07 Proceedings of the The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies
Rapid Trust Establishment for Pervasive Personal Computing
IEEE Pervasive Computing
A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
PTO: A Trust Ontology for Pervasive Environments
AINAW '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops
A trust model based on fuzzy recommendation for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Enriching Trust Prediction Model in Social Network with User Rating Similarity
CASON '09 Proceedings of the 2009 International Conference on Computational Aspects of Social Networks
Secured and Trusted Service Provision in Pervasive Environment
WIMOB '09 Proceedings of the 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
SAINT '11 Proceedings of the 2011 IEEE/IPSJ International Symposium on Applications and the Internet
Enabling topic-level trust for collaborative information sharing
Personal and Ubiquitous Computing
Hi-index | 0.00 |
In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.