DOI QR코드

DOI QR Code

A Unified Trust Model for Pervasive Environments - Simulation and Analysis

  • Received : 2013.01.10
  • Accepted : 2013.07.05
  • Published : 2013.07.31

Abstract

Ubiquitous interaction in a pervasive environment is the main attribute of smart spaces. Pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by known and even unknown parties. Huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors like context, recommendation, and history to calculate the trust level of each party precisely. Trusted computing enables effective solutions to verify the trustworthiness of computing platforms. In this paper, we elaborate Unified Trust Model (UTM) which calculates entity's trustworthiness based on history, recommendation, context and platform integrity measurement, and formally use these factors in trustworthiness calculation. We evaluate UTM behaviour by simulating in different scenario experiments using a Trust and Reputation Models Simulator for Wireless Sensor Networks. We show that UTM offers responsive behaviour and can be used effectively in the low interaction environments.

Keywords

References

  1. M. Weiser, "The computer for the 21st century," Scientific American, vol. 265, no. 3, pp. 75-66, 1991.
  2. T. Sun and M. K. Denko, "Performance Evaluation of Trust Management in Pervasive Computing," in Proc. of the 22nd International Conference on Advanced Information Networking and Applications, 2008, pp. 386-394.
  3. L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments," Computer, vol. 34, no. 12, pp. 154-157, 2001. https://doi.org/10.1109/2.970591
  4. S. Lahlou, M. Langheinrich, and C. Rocker, "Privacy and trust issues with invisible computers," Communications of the ACM, vol. 48, no. 3, pp. 59-60, 2005.
  5. M. Langheinrich, "Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems," in Proc. of the 3rd international conference on Ubiquitous Computing, Atlanta, Georgia, USA, 2001, pp. 273-291.
  6. H. Alemdar and C. Ersoy, "Wireless sensor networks for healthcare: A survey," Computer Networks, vol. 54, no. 15, pp. 2688-2710, Oct. 2010. https://doi.org/10.1016/j.comnet.2010.05.003
  7. Z. Yan and S. Holtmanns, "Trust Modeling and Management: from Social Trust to Digital Trust," in Proc. of Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions, IGI Global, 2008, pp. 290-323.
  8. C. T. Nguyen, O. Camp, and S. Loiseau, "A Bayesian network based trust model for improving collaboration in mobile ad hoc networks," in Proc. of the 2007 IEEE International Conference on Research, Innovation and Vision for the Future, 2007, pp. 144-151.
  9. C. T. Nguyen and O. Camp, "Using Context Information to Improve Computation of Trust in Ad Hoc Networks," in Proc. of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, 2008, pp. 619-624.
  10. K. Sarkio and S. Holtmanns, "Tailored trustworthiness estimations in Peer-to-Peer networks," International Journal of Internet Technology and Secured Transactions, vol. 1, no. 1/2, pp. 95-107, 2007. https://doi.org/10.1504/IJITST.2007.014836
  11. S. Holtmanns and Z. Yan, "Context-Aware Adaptive Trust," Developing Ambient Intelligence, Springer Paris, 2006, pp. 137-146.
  12. Z. Liu, A. W. Joy, and R. A. Thompson, "A Dynamic Trust Model for Mobile Ad Hoc Networks," in Proc. of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems FTDCS 2004, 2004, pp. 80-85.
  13. Y. Wang and V. Varadharajan, "Trust2: Developing Trust in Peer-to-Peer Environments," in Proc. of the 2005 IEEE International Conference on Services Computing - Volume 01, 2005, pp. 24-34.
  14. K. Ranganathan, "Trustworthy Pervasive Computing: The Hard Security Problems," in Proc. of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004, pp. 117-121.
  15. TCG, "Trusted Computing Group - Trusted Platform Module," 2011. [Online]. Available: http://www.trustedcomputinggroup.org/developers/trusted_platform_module. [Accessed: 07-Dec-2011].
  16. F. Gomez Marmol and G. Martinez Perez, "Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems," Computer Standards & Interfaces, vol. 32, no. 4, pp. 185-196, Jun. 2010.
  17. H. Khiabani, J. Ab Manan, and Z. M. Sidek, "A Study of Trust & Privacy Models in Pervasive Computing," in Proc. of International Conference for Technical Postgraduates (TECHPOS 2009), Kuala Lumpur, 2009.
  18. C. Krauß, F. Stumpf, and C. Eckert, "Detecting node compromise in hybrid wireless sensor networks using attestation techniques," in Proc. of the 4th European conference on Security and privacy in ad-hoc and sensor networks, Berlin, Heidelberg, 2007, pp. 203-217.
  19. Y. Yang, J. Zhou, R. H. Deng, and F. Bao, "Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks," Security and Communication Networks, vol. 4, no. 1, pp. 11-22, 2011. https://doi.org/10.1002/sec.179
  20. H. Khiabani, Z. M. Sidek, and J. Ab Manan, "Towards a Unified Trust Model in Pervasive Systems," in Proc. of 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, Perth-Australia, 2010, pp. 831-835.
  21. TCG, "Trusted Computing Group," 2011. [Online]. Available: http://www.trustedcomputinggroup.org/. [Accessed: 07-Dec-2011].
  22. TCG, "Trusted Computing Group - Mobile Trusted Module," 2011. [Online]. Available: http://www.trustedcomputinggroup.org/developers/mobile. [Accessed: 07-Dec-2011].
  23. R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a TCG-based integrity measurement architecture," in Proc. of the 13th conference on USENIX Security Symposium - Volume 13, Berkeley, CA, USA, 2004, pp. 16-16.
  24. A.-R. Sadeghi and C. Stüble, "Property-based attestation for computing platforms: caring about properties, not mechanisms," in Proc. of the 2004 workshop on New security paradigms, New York, NY, USA, 2004, pp. 67-77. Article
  25. L. Chen, H. Löhr, M. Manulis, and A.-R. Sadeghi, "Property-Based Attestation without a Trusted Third Party," Information Security, vol. 5222, T.-C. Wu, C.-L. Lei, V. Rijmen, and D.-T. Lee, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, pp. 31-46. Article
  26. F. Gomez Marmol and G. Martinez Perez, "TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks," in Proc. of IEEE International Conference on Communications ( ICC '09), 2009, pp. 1-5. Article
  27. F. Gomez Marmol, "TRMSim-WSN - Trust and Reputation Models Simulator for Wireless Sensor Networks," 2012. [Online]. Available: http://ants.dif.um.es/-felixgm/research/trmsim-wsn/. [Accessed: 21-Jan-2012].

Cited by

  1. Research on Trust Prediction from a Sociological Perspective vol.30, pp.4, 2013, https://doi.org/10.1007/s11390-015-1564-8