An integrated scheme based on service classification in pervasive mobile services

Internet of Things and broadband communication are promoting the pervasive mobile services with their advanced features. However, security problems baffled the development. This paper proposes a trust model to protect the user's security. The billing or trust operator works as an agent to provide a trust authentication for all the service providers. The services are classified by sensitive value calculation. With the combined location-aware and identity-aware information and authentication history, the user's trustiness for corresponding service can be obtained. For decision, three trust regions are divided and referred to three ranks as follows: high, medium and low. The trust region tells the customer which authentication methods should be used for access. Penalty coefficient is also involved for forbidding force-crack. Copyright © 2012 John Wiley & Sons, Ltd.

[1]  Shanshan Song,et al.  Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.

[2]  Sheng Zhong,et al.  An efficient identity‐based protocol for private matching , 2011, Int. J. Commun. Syst..

[3]  Thomas L. Saaty,et al.  Models, Methods, Concepts & Applications of the Analytic Hierarchy Process , 2012 .

[4]  Chun-I Fan,et al.  Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics , 2009, IEEE Transactions on Information Forensics and Security.

[5]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[6]  Gabriele Lenzini,et al.  Trust-enhanced Security in Location-based Adaptive Authentication , 2008, Electron. Notes Theor. Comput. Sci..

[7]  Marco Mamei,et al.  The Whereabouts Diary , 2007, LoCA.

[8]  Giorgos Zacharia,et al.  Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..

[9]  Munindar P. Singh,et al.  A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.

[10]  Gaurav S. Sukhatme,et al.  Connecting the Physical World with Pervasive Networks , 2002, IEEE Pervasive Comput..

[11]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[12]  Rui L. Aguiar,et al.  Virtual Identity Framework for Telecom Infrastructures , 2008, Wirel. Pers. Commun..

[13]  Franco Zambonelli,et al.  Supporting location-aware services for mobile users with the whereabouts diary , 2008 .

[14]  Ivan Ganchev,et al.  The creation of a ubiquitous consumer wireless world through strategic ITU-T standardization , 2010, IEEE Communications Magazine.

[15]  Rui L. Aguiar,et al.  Pervasiveness in a competitive multi-operator environment:the daidalos project , 2007, IEEE Communications Magazine.

[16]  Feng Xia,et al.  A Trust Model Based on Service Classification in Mobile Services , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[17]  Jia-Lun Tsai,et al.  New dynamic ID authentication scheme using smart cards , 2010, Int. J. Commun. Syst..

[18]  W. Keith Edwards,et al.  Intelligibility and Accountability: Human Considerations in Context-Aware Systems , 2001, Hum. Comput. Interact..

[19]  Jong Hyuk Park,et al.  User authentication schemes with pseudonymity for ubiquitous sensor network in NGN , 2010, Int. J. Commun. Syst..