资源描述:
《design, analysis, and deployment of omnipresent formal trust model (ftm) with trust bootstrapping for pervasive environments》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、TheJournalofSystemsandSoftware83(2010)253–270ContentslistsavailableatScienceDirectTheJournalofSystemsandSoftwarejournalhomepage:www.elsevier.com/locate/jssDesign,analysis,anddeploymentofomnipresentFormalTrustModel(FTM)withtrustbootstrappingforpervasiveenvironmentsSheik
2、hI.Ahamed*,MunirulM.Haque,Md.EndadulHoque,FarzanaRahman,NilothpalTalukderMarquetteUniversity,Milwaukee,WI53201,USAarticleinfoabstractArticlehistory:Therapiddecreaseinthesizeofmobiledevices,coupledwithanincreaseincapability,hasenabledaReceived2March2009swiftproliferatio
3、nofsmallandverycapabledevicesintoourdailylives.Withsuchaprevalenceofper-Receivedinrevisedform26July2009vasivecomputing,theinteractionamongportabledevicesneedstobecontinuousandinvisibletodeviceAccepted22September2009users.Asthesedevicesbecomebetterconnected,collaboratio
4、namongthemwillplayavitalroleinshar-Availableonline29September2009ingresourcesinanad-hocmanner.Thesharingofresourcesworksasafacilitatorforpervasivedevices.However,thisadhocinteractionamongdevicesprovidesthepotentialforsecuritybreaches.TrustcanKeywords:fightagainstsuchsec
5、urityviolationsbyrestrictingmaliciousnodesfromparticipatingininteractions.PervasivecomputingTherefore,weneedaunifiedtrustrelationshipmodelbetweenentities,whichcapturesboththeneedsTrustInitialtrustofthetraditionalcomputingworldandtheworldofpervasivecomputingwheretheconti
6、nuumoftrustMaliciousrecommendationisbasedonidentity,physicalcontextoracombinationofboth.Here,wepresentacontextspecificandreputation-basedtrustmodelalongwithabriefsurveyoftrustmodelssuitableforpeer-to-peerandad-hocenvironments.Thispaperpresentsamulti-hoprecommendationpro
7、tocolandaflexiblebehav-ioralmodeltohandleinteractions.Oneothercontributionofthispaperistheintegrationofaninitialtrustmodel;thismodelcategorizesservicesorcontextsindifferentsecuritylevelsbasedontheirsecurityneeds,andthesesecurityneedsareconsideredintrustbootstrapping.The
8、othermajorcontributionofthispaperisasimplemethodofhandlingmaliciousrecommendations.Thispaperalsoillustratestheimpleme