A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing

To address the challenges posed by device capacity and capability, and also the nature of ad-hoc network of pervasive computing, a resource discovery model is needed that can resolve security and privacy issues with simple solutions. The use of complex algorithms and powerful fixed infrastructure is infeasible due to the volatile nature of pervasive environment and tiny pervasive devices. In this paper, we present a risk- aware trust based secure resource discovery model, RTSRD (risk-aware trust based secure resource discovery) for a truly pervasive environment. Our model is an adaptive hybrid one that allows both secure and non-secure discovery of services on adaptive trust. RTSRD also incorporates a risk model for sharing resources with unknown devices. Hence, the two contributions of this paper are: adaptive trust, and risk model for resource discovery in pervasive computing environments.

[1]  Timothy W. Finin,et al.  Communications - Trust-Based Security in Pervasive Computing Environments , 2001, Computer.

[2]  Celeste Campo,et al.  SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks , 2003 .

[3]  T. Nixon,et al.  Home networking with Universal Plug and Play , 2001 .

[4]  Michael Nidd,et al.  Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..

[5]  Andrés Marín López,et al.  Developing a model for trust management in pervasive devices , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[6]  Frank Stajano,et al.  The Resurrecting Duckling: security issues for ubiquitous computing , 2002, S&P 2002.

[7]  Mark Weiser The computer for the 21st century , 1991 .

[8]  Uwe Hansmann,et al.  Pervasive Computing , 2003 .

[9]  Hari Balakrishnan,et al.  The design and implementation of an intentional naming system , 1999, SOSP.

[10]  Mahadev Satyanarayanan,et al.  Fundamental challenges in mobile computing , 1996, PODC '96.

[11]  Matt W. Mutka,et al.  Classification of Service Discovery in Pervasive Computing Environments , 2003 .

[12]  Jin Nakazawa,et al.  Improving security for ubiquitous campus applications , 2004, 2004 International Symposium on Applications and the Internet Workshops. 2004 Workshops..

[13]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[14]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[15]  Lionel M. Ni,et al.  PrudentExposure: a private and user-centric service discovery protocol , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[16]  R. Want,et al.  System challenges for ubiquitous & pervasive computing , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..

[17]  Vinny Cahill,et al.  A General Risk Assessment of Security in Pervasive Computing , 2003 .

[18]  Philip Zimmermann,et al.  PGP source code and internals , 1995 .

[19]  Sheikh Iqbal Ahamed,et al.  ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications , 2007, Int. J. Netw. Secur..

[20]  Sheikh Iqbal Ahamed,et al.  PerAd-Service: A Middleware Service for Pervasive Advertisement in M-Business , 2005, COMPSAC.

[21]  Lionel M. Ni,et al.  Expose or not? A progressive exposure approach for service discovery in pervasive computing environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[22]  Sheikh Iqbal Ahamed,et al.  MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[23]  Haifeng Li,et al.  SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).

[24]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[25]  Sheikh Iqbal Ahamed,et al.  Knowledge Usability and its Characteristics for Pervasive Computing , 2005, PSC.

[26]  Mark Weiser,et al.  Some Computer Science Problems in Ubiquitous Computing , 1993 .

[27]  Celeste Campo,et al.  PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .

[28]  Djamshid Tavangarian,et al.  Security architecture for service-based mobile environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[29]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.

[30]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[31]  Jianping Hu,et al.  A novel cloud-based trust model for pervasive computing , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[32]  Timothy W. Finin,et al.  Moving from Security to Distributed Trust in Ubiquitous Computing Environments , 2001 .

[33]  Armando Fox,et al.  System Software for Ubiquitous Computing , 2022 .

[34]  Philip Robinson,et al.  Some Research Challenges in Pervasive Computing , 2005 .

[35]  Lionel M. Ni,et al.  Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[36]  Sheikh Iqbal Ahamed,et al.  SAFE-RD (secure, adaptive, fault tolerant, and efficient resource discovery) in pervasive computing environments , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[37]  Sheikh Iqbal Ahamed,et al.  An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[38]  David R. Karger,et al.  INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery , 2002, Pervasive.