A Trust Model with Dynamic Decision Making for Ubiquitous Environments

This paper presents a novel role-based architecture for the trust model in ubiquitous environments. The role is dynamically assigned to the service requester according to the context. If the service requester requests a service that is not permitted for his role, Naive Bayes classifier is used to make decision based on the service: provider's own prior knowledge as well as the recommendations for the service requester. Our trust model can dynamically make decisions due to the changing context and each service provider's own judging standard. It is also scalable since the role-based architecture used in our trust model is potential for reducing the complexity in large network. In addition, our trust model is suitable to make decision with limited information, which is usually the case in a real scenario

[1]  Jianping Hu,et al.  A novel cloud-based trust model for pervasive computing , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[2]  Pradip Lamsal Requirements for Modeling Trust in Ubiquitous Computing and Ad Hoc Networks , 2002 .

[3]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[4]  Rino Falcone,et al.  Trust in information sources as a source for trust: a fuzzy approach , 2003, AAMAS '03.

[5]  Timothy W. Finin,et al.  Trust-Based Security in Pervasive Computing Environments , 2022 .

[6]  Sungyoung Lee,et al.  Developing Context-Aware Ubiquitous Computing Systems with a Unified Middleware Framework , 2004, EUC.

[7]  Antonio Lioy,et al.  Incremental trust: building trust from past experience , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[8]  Jean Bacon,et al.  Trust for Ubiquitous, Transparent Collaboration , 2004, Wirel. Networks.

[9]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[10]  Steffen Staab,et al.  The Pudding of Trust , 2004, IEEE Intell. Syst..

[11]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[12]  Audun Jøsang,et al.  The right type of trust for distributed systems , 1996, NSPW '96.

[13]  Kumar Ranganathan,et al.  Trustworthy pervasive computing: the hard security problems , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[14]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[15]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[16]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[17]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[18]  Paddy Nixon,et al.  Dynamic trust models for ubiquitous computing environments , 2002 .