A trust framework for pervasive computing environments

被引:11
作者
Wolfe, Steven T. [1 ]
Ahamed, Sheikh I. [1 ]
Zulkernine, Mohammad [2 ]
机构
[1] Marquette Univ, Milwaukee, WI 53233 USA
[2] Queens Univ, Kingston, ON K7L 3N6, Canada
来源
2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3 | 2006年
关键词
trust framework; pervasive computing environments; trust framework for ad hoc networks; and pervasive security;
D O I
10.1109/AICCSA.2006.205107
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a flexible, manageable, and configurable trust scheme for the security of pervasive computing applications. Our intention is to develop a trust framework capable of recognizing the difference between "pure" and "managed" ad hoc network structure, and capable of operating in either situation or a combination of both. Our trust framework will minimize the effects of malicious recommendations related to trust from other devices and have the capability to transfer security functionality from devices with limited computing resources to other secure and powerful devices. The presented framework allows administrators to customize trust-related settings in an effort to create a more secure and functional network. Within our framework, wireless devices are broken down into different categories based upon available resources and desired security functionalities. A device's categorization determines its security functionalities and interactions with neighboring devices. By using this flexible framework, administrators can customize devices based upon the network's environment.
引用
收藏
页码:312 / +
页数:2
相关论文
共 14 条
[1]  
Abdul-Raham A., 1998, PROC 1997 WORKSHOP N, P48
[2]  
Abowd G. D., 2000, ACM Transactions on Computer-Human Interaction, V7, P29, DOI 10.1145/344949.344988
[3]  
[Anonymous], 2004, P 27 AUSTRALASIAN C
[4]  
[Anonymous], P 7 INT WORKSH SEC P
[5]   An overview of pervasive computing [J].
Gupta, SKS ;
Lee, WC ;
Purakayastha, A ;
Srimani, PK .
IEEE PERSONAL COMMUNICATIONS, 2001, 8 (04) :8-9
[6]   Towards an intrusion detection system for pervasive computing environments [J].
Kannadiga, P ;
Zulkernine, M ;
Ahamed, SI .
ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, :277-282
[7]  
Kong JJ, 2001, NETWORK PROTOCOLS, P251, DOI 10.1109/ICNP.2001.992905
[8]   Self-securing ad hoc wireless networks [J].
Luo, HY ;
Zerfos, P ;
Kong, HJ ;
Lu, SW ;
Zhang, LX .
ISCC 2002: SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2002, :567-574
[9]  
SUN H, 2004, P IEEE CAN C COMP EL
[10]  
WEISE J, 2001, SUN BLUEPRINTS O AUG