Managing Ad-Hoc Trust Relationships in Pervasive Computing Environments

Trust is considered as a fundamental aspect for inter-domain relationships in dynamic open environments. In this paper, we have reviewed existing trust models and their drawbacks when they are applied to pervasive computing. We present PTM, a new automatised decentralised trust management model for pervasive computing environments. PTM overcomes the challenges posed by dynamic open environments, making use of the autonomy and cooperable behaviour of the entities. Our model facilitates ad-hoc trust relationships, captures entities dynamic behaviour along time, and allows trust information exchange through a recommendation protocol. PTM has been validated according to the variable parameters.

[1]  David W. Chadwick,et al.  Merging and extending the PGP and PEM trust models-the ICE-TEL trust model , 1997, IEEE Netw..

[2]  Timothy W. Finin,et al.  Trust-Based Security in Pervasive Computing Environments , 2022 .

[3]  Laurent Bussard,et al.  Trust and Authorization in Pervasive B2E Scenarios , 2003, ISC.

[4]  Diego Gambetta Trust : making and breaking cooperative relations , 1992 .

[5]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[6]  Thomas Beth,et al.  Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[7]  John Linn,et al.  Privacy enhancement for Internet electronic mail: Part II - certificate-based key management , 1987, RFC.

[8]  Michael Koch,et al.  Ubiquitous Computing , 2001, CSCW-Kompendium.

[9]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[10]  Celeste Campo,et al.  SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks , 2003 .

[11]  Diego Gambetta Can We Trust Trust , 2000 .

[12]  Svein J. Knapskog,et al.  A metric for trusted systems , 1998 .

[13]  Paddy Nixon,et al.  Security models for trusting network appliances , 2002, Proceedings 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications.

[14]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[15]  Christian Damsgaard Jensen,et al.  Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications , 2002 .

[16]  Audun Jøsang,et al.  The consensus operator for combining beliefs , 2002, Artif. Intell..

[17]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[18]  Timothy W. Finin,et al.  Vigil: Enforcing Security in Ubiquitous Environments , 2002 .

[19]  P. Vannoorenberghe,et al.  Strategies for combining conflicting dogmatic beliefs , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[20]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[21]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[22]  Audun Jøsang,et al.  An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.

[23]  Andreas Matheus,et al.  How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[24]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[25]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.