A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications

Trust has emerged as an important facet of inter-domain relationships. Trust management in fixed networks is not functional in ad hoc P2P networks, because these require an autonomous, user-centric and non-static trust management. The trust model is the basis of any security infrastructure. In this paper, we propose a trust-based middleware for secure digital content sharing between pervasive devices. Such middleware allows to enhance security support of pervasive devices. Likewise, we propose a suitable and efficient secure file exchange protocol, WSFEP, for content sharing. Both middleware and file sharing application have been successfuly integrated and tested on PDAs.

[1]  Audun Jøsang,et al.  An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.

[2]  Vana Kalogeraki,et al.  Decentralized trust management for ad-hoc peer-to-peer networks , 2006, MPAC '06.

[3]  Julita Vassileva,et al.  Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[4]  Liwen He A Novel Scheme on Building a Trusted IP Routing Infrastructure , 2006, International conference on Networking and Services (ICNS'06).

[5]  Yong Chen,et al.  Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..

[6]  Zheng Yan,et al.  Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .

[7]  Florina Almenárez,et al.  PDP: A lightweight discovery protocol for local-scope interactions in wireless ad hoc networks , 2006, Comput. Networks.

[8]  Celeste Campo,et al.  PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .

[9]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[10]  Andrés Marín López,et al.  Developing a model for trust management in pervasive devices , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[11]  Timothy W. Finin,et al.  Active collaborations for trustworthy data management in ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[12]  Tao Jiang,et al.  Cooperative games, phase transitions on graphs and distributed trust in MANET , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[13]  Stephen Perelson An Investigation Into Access Control For Mobile Devices , 2004, ISSA.

[14]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[15]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.