Trust management in ubiquitous computing: A Bayesian approach

被引:61
作者
Denko, Mieso K. [1 ]
Sun, Tao [1 ]
Woungang, Isaac [2 ]
机构
[1] Univ Guelph, Dept Comp & Informat Sci, Guelph, ON N1G 2W1, Canada
[2] Ryerson Univ, Dept Comp Sci, Toronto, ON, Canada
关键词
Pervasive computing; Probabilistic trust management; Security; Ubiquitous computing; Bayesian approach; FRAMEWORK; SECURITY;
D O I
10.1016/j.comcom.2010.01.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Designing a trust management scheme that can effectively evaluate the relationships among devices in pervasive computing environments is a challenging task. This paper continues the investigation of our recently proposed probabilistic trust management scheme for pervasive computing environments. We argue that in addition to allowing a device to find other appropriate devices with which to interact, while detecting those that are malicious, our trust management scheme is also capable of (1) allowing a device to judge the trustworthiness of another device it interacts with, while making a better use of the received recommendations and (2) behaving as expected when a device has little or enough experience of interactions with other devices and changes dynamically occur in the proportion of malicious devices. Simulation experiments are provided to assess the achievement of the stated goals, using some representative performance metrics. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:398 / 406
页数:9
相关论文
共 29 条
[21]  
Ranganathan K, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P117
[22]  
Sun Y. L., 2006, P INFOCOM 2006, P1
[23]  
Teacy W., 2005, P 4 INT JOINT C AUTO, P997
[24]   THE COMPUTER FOR THE 21ST-CENTURY [J].
WEISER, M .
SCIENTIFIC AMERICAN, 1991, 265 (03) :94-&
[25]  
WHITBY A., 2005, The ICFAIAN Journal of Management Research, V4, P48
[26]   A trust framework for pervasive computing environments [J].
Wolfe, Steven T. ;
Ahamed, Sheikh I. ;
Zulkernine, Mohammad .
2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2006, :312-+
[27]  
Yin S., 2006, P INT C COLLABORATIV, P1, DOI DOI 10.1109/ICR.2006.343207
[28]  
YU B, 2003, P 2 INT JOINT C AUT, P73
[29]  
Yuan W, 2006, LECT NOTES COMPUT SC, V4208, P562