Browse > Article
http://dx.doi.org/10.3837/tiis.2013.07.003

A Unified Trust Model for Pervasive Environments - Simulation and Analysis  

Khiabani, Hamed (Advanced Informatics School, University Technology Malaysia)
Idris, Norbik Bashah (Advanced Informatics School, University Technology Malaysia)
Manan, Jamalul-Lail Ab (Strategic Advanced Research Cluster, MIMOS Berhad)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.7, no.7, 2013 , pp. 1569-1584 More about this Journal
Abstract
Ubiquitous interaction in a pervasive environment is the main attribute of smart spaces. Pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by known and even unknown parties. Huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors like context, recommendation, and history to calculate the trust level of each party precisely. Trusted computing enables effective solutions to verify the trustworthiness of computing platforms. In this paper, we elaborate Unified Trust Model (UTM) which calculates entity's trustworthiness based on history, recommendation, context and platform integrity measurement, and formally use these factors in trustworthiness calculation. We evaluate UTM behaviour by simulating in different scenario experiments using a Trust and Reputation Models Simulator for Wireless Sensor Networks. We show that UTM offers responsive behaviour and can be used effectively in the low interaction environments.
Keywords
Unified Trust Model; Smart Spaces; Remote Attestation; Pervasive Computing; Wireless Sensor Network; Trusted Platform Module;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. Alemdar and C. Ersoy, "Wireless sensor networks for healthcare: A survey," Computer Networks, vol. 54, no. 15, pp. 2688-2710, Oct. 2010.   DOI   ScienceOn
2 M. Weiser, "The computer for the 21st century," Scientific American, vol. 265, no. 3, pp. 75-66, 1991.
3 T. Sun and M. K. Denko, "Performance Evaluation of Trust Management in Pervasive Computing," in Proc. of the 22nd International Conference on Advanced Information Networking and Applications, 2008, pp. 386-394.
4 L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments," Computer, vol. 34, no. 12, pp. 154-157, 2001.   DOI   ScienceOn
5 S. Lahlou, M. Langheinrich, and C. Rocker, "Privacy and trust issues with invisible computers," Communications of the ACM, vol. 48, no. 3, pp. 59-60, 2005.
6 M. Langheinrich, "Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems," in Proc. of the 3rd international conference on Ubiquitous Computing, Atlanta, Georgia, USA, 2001, pp. 273-291.
7 Z. Yan and S. Holtmanns, "Trust Modeling and Management: from Social Trust to Digital Trust," in Proc. of Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions, IGI Global, 2008, pp. 290-323.
8 C. T. Nguyen, O. Camp, and S. Loiseau, "A Bayesian network based trust model for improving collaboration in mobile ad hoc networks," in Proc. of the 2007 IEEE International Conference on Research, Innovation and Vision for the Future, 2007, pp. 144-151.
9 C. T. Nguyen and O. Camp, "Using Context Information to Improve Computation of Trust in Ad Hoc Networks," in Proc. of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, 2008, pp. 619-624.
10 K. Sarkio and S. Holtmanns, "Tailored trustworthiness estimations in Peer-to-Peer networks," International Journal of Internet Technology and Secured Transactions, vol. 1, no. 1/2, pp. 95-107, 2007.   DOI
11 TCG, "Trusted Computing Group - Mobile Trusted Module," 2011. [Online]. Available: http://www.trustedcomputinggroup.org/developers/mobile. [Accessed: 07-Dec-2011].
12 R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a TCG-based integrity measurement architecture," in Proc. of the 13th conference on USENIX Security Symposium - Volume 13, Berkeley, CA, USA, 2004, pp. 16-16.
13 A.-R. Sadeghi and C. Stüble, "Property-based attestation for computing platforms: caring about properties, not mechanisms," in Proc. of the 2004 workshop on New security paradigms, New York, NY, USA, 2004, pp. 67-77. Article
14 S. Holtmanns and Z. Yan, "Context-Aware Adaptive Trust," Developing Ambient Intelligence, Springer Paris, 2006, pp. 137-146.
15 Z. Liu, A. W. Joy, and R. A. Thompson, "A Dynamic Trust Model for Mobile Ad Hoc Networks," in Proc. of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems FTDCS 2004, 2004, pp. 80-85.
16 Y. Wang and V. Varadharajan, "Trust2: Developing Trust in Peer-to-Peer Environments," in Proc. of the 2005 IEEE International Conference on Services Computing - Volume 01, 2005, pp. 24-34.
17 H. Khiabani, J. Ab Manan, and Z. M. Sidek, "A Study of Trust & Privacy Models in Pervasive Computing," in Proc. of International Conference for Technical Postgraduates (TECHPOS 2009), Kuala Lumpur, 2009.
18 K. Ranganathan, "Trustworthy Pervasive Computing: The Hard Security Problems," in Proc. of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004, pp. 117-121.
19 TCG, "Trusted Computing Group - Trusted Platform Module," 2011. [Online]. Available: http://www.trustedcomputinggroup.org/developers/trusted_platform_module. [Accessed: 07-Dec-2011].
20 F. Gomez Marmol and G. Martinez Perez, "Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems," Computer Standards & Interfaces, vol. 32, no. 4, pp. 185-196, Jun. 2010.
21 C. Krauß, F. Stumpf, and C. Eckert, "Detecting node compromise in hybrid wireless sensor networks using attestation techniques," in Proc. of the 4th European conference on Security and privacy in ad-hoc and sensor networks, Berlin, Heidelberg, 2007, pp. 203-217.
22 Y. Yang, J. Zhou, R. H. Deng, and F. Bao, "Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks," Security and Communication Networks, vol. 4, no. 1, pp. 11-22, 2011.   DOI
23 H. Khiabani, Z. M. Sidek, and J. Ab Manan, "Towards a Unified Trust Model in Pervasive Systems," in Proc. of 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, Perth-Australia, 2010, pp. 831-835.
24 TCG, "Trusted Computing Group," 2011. [Online]. Available: http://www.trustedcomputinggroup.org/. [Accessed: 07-Dec-2011].
25 F. Gomez Marmol, "TRMSim-WSN - Trust and Reputation Models Simulator for Wireless Sensor Networks," 2012. [Online]. Available: http://ants.dif.um.es/-felixgm/research/trmsim-wsn/. [Accessed: 21-Jan-2012].
26 L. Chen, H. Löhr, M. Manulis, and A.-R. Sadeghi, "Property-Based Attestation without a Trusted Third Party," Information Security, vol. 5222, T.-C. Wu, C.-L. Lei, V. Rijmen, and D.-T. Lee, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, pp. 31-46. Article
27 F. Gomez Marmol and G. Martinez Perez, "TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks," in Proc. of IEEE International Conference on Communications ( ICC '09), 2009, pp. 1-5. Article