The Handbook of Mobile Middleware

Trust in Pervasive Computing

, , , , and

Pervasive environments are comprised of resource-constrained mobile devices “limited” in their connectivity to other devices or networks due to the inherent dynamic nature of the environment. Limited connectivity to the Internet precludes the use of conventional security mechanisms like Certifying Authorities and other forms of server-centric authentication. Under these circumstances peer-to-peer interactions are well-suited for information interchange. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust, and determining reliability and accuracy of peer-provided data in such interactions are still lacking. Our research is directed towards providing stronger assurances of reliability and trustworthiness of information and services with practical implementation considerations for pervasive environments.

  • 528661 bytes

intrusion detection, pervasive, security, trust


CRC Press


Downloads: 1982 downloads

Google Scholar Citations: 1 citation

UMBC ebiquity