Hybrid scheme for trust management in pervasive computing

Trust management in pervasive computing becomes increasingly important and obtained high attention a few years ago. Different methodologies have been proposed to improve trust management. These approaches can be classified into three groups as follows: the first group used Bayesian statistics and its derivation such as Dempster-Shaffer theory of evidence. The second group used game theory, and the third group depends on algebraic ordinary set operation and fuzzy logic. Despite the previous work in this area, a comprehensive security model to support trust management has yet been accomplished. The critical security threats in this environment necessitate a comprehensive trust and privacy models which require integration of different concepts to evaluate precisely the trustworthiness of entities. In this paper, we propose a trust management scheme by implementing a fusion of the support vector machine (SVM) and fuzzy logic system. The main motivation of the proposed scheme in using the support vector machine is to predict the optimal trust values for approximation purpose, and then those approximated values relate the fuzzy basis functions.

[1]  J. Valarmathi,et al.  A Novel Trust Management Scheme Using Fuzzy Logic for a Pervasive Environment , 2010 .

[2]  Sanjeev Sharma,et al.  New trust based security approach for ad-hoc networks , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[3]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[4]  Isaac Woungang,et al.  Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..

[5]  Andrés Marín López,et al.  Trust management for multimedia P2P applications in autonomic networking , 2011, Ad Hoc Networks.

[6]  Tao Sun,et al.  Probabilistic Trust Management in Pervasive Computing , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[7]  Yang Xin,et al.  Trust model based on dynamic policy similarity for pervasive computing environments , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[8]  Denis Trcek,et al.  Trust Management in the Pervasive Computing Era , 2011, IEEE Security & Privacy.

[9]  Azzedine Boukerche,et al.  A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..

[10]  Xu Wu,et al.  A Stable Group-based Trust Management Scheme for Mobile P2P Networks , 2011 .

[11]  Walt Yao,et al.  Trust management for widely distributed systems , 2003 .

[12]  Natarajan Meghanathan,et al.  Recent Trends in Networks and Communications , 2010 .

[13]  Punam Bedi,et al.  Trust based prioritization of Quality Attributes , 2008, Int. Arab J. Inf. Technol..

[14]  Yunwei Xin,et al.  A Trust Framework for Pervasive Computing Environments , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.