Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 12:00 PM ET (12:00 - 16:00 UTC). We apologize for the inconvenience.
By Topic

A Distributed Trust Management Scheme in the Pervasive Computing Environment

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Tao Sun ; Guelph Univ., Guelph ; Denko, M.K.

Pervasive computing allows a seamless interaction among users, devices, and applications, anytime and anywhere. Yet portable devices in pervasive computing are mainly powered by batteries and have limited computational and communication capability. Thus the open and dynamic environment in pervasive computing raises challenges in security and trust management. Without trust, pervasive devices cannot cooperate effectively, and the deployment of pervasive computing systems will be restricted to specific application scenarios. The traditional centralized security management schemes are not directly applicable in pervasive computing environments. Moreover, existing user authentication and access control schemes are inadequate to ensure security in pervasive computing. To overcome the limitation of centralized schemes, we need a distributed solution. In this paper, we propose a distributed trust management scheme to ensure security in pervasive computing environments. The main contributions of this paper are: (1) the employment of a simple, distributed trust computation and maintenance mechanism to reduce communication and computational overhead without compromising security; (2) the building of an aggregate trust metric that is based on direct observation and indirect observations obtained from neighbors' recommendations. The scheme gives more weight to direct observations and less weight to indirect observations. Every device computes and updates the trust value periodically in a distributed fashion. However, the exchange of trust information is carried out on demand to reduce communication overhead. The operation of the proposed scheme with varying parameter settings is illustrated, using an analytical approach.

Published in:

Electrical and Computer Engineering, 2007. CCECE 2007. Canadian Conference on

Date of Conference:

22-26 April 2007