Developing a model for trust management in pervasive devices

Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. Trust is fundamental to establish communication with other users, because the identity is often uncertain and on one's own does not provide trust information, for instance, could an unknown user be trustworthy? Nowadays, these devices have a so limited security support. So, we propose a simple trust management model to enhance such support, allowing them interact in ad hoc networks and peer-to-peer applications in a secure way. In this paper, our main contribution is a mathematical and a probabilistic model, as well as demonstrating the model feasibility, since it has been assessed through the prototype implementation, which has been tested in a Pocket PC

[1]  Donald E. Eastlake,et al.  Domain Name System Security Extensions , 1997, RFC.

[2]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[3]  Audun Jøsang,et al.  An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.

[4]  Celeste Campo,et al.  PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .

[5]  Andrés Marín López,et al.  Secure Ad-Hoc mBusiness: EnhancingWindowsCE Security , 2004, TrustBus.

[6]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[7]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[8]  R. Chen,et al.  Poblano A Distributed Trust Model for Peer-to-Peer Networks , 2001 .

[9]  Audun J sang,et al.  An Algebra for Assessing Trust in Certi cation Chains , 1998 .

[10]  Bruno O. Shubert,et al.  Random variables and stochastic processes , 1979 .

[11]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[12]  Sarvapali D. Ramchurn,et al.  Trust evaluation through relationship analysis , 2005, AAMAS '05.

[13]  Robert H. Deng,et al.  Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.

[14]  Ueli Maurer,et al.  Modelling a Public-Key Infrastructure , 1996, ESORICS.

[15]  P. Vannoorenberghe,et al.  Strategies for combining conflicting dogmatic beliefs , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[16]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[17]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.