UMBC ebiquity

Trust in Pervasive Computing

Authors: Jim Parker, Anand Patwardhan, Filip Perich, Anupam Joshi, and Tim Finin

Journal: The Handbook of Mobile Middleware

Date: February 02, 2006

Abstract: Pervasive environments are comprised of resource-constrained mobile devices “limited” in their connectivity to other devices or networks due to the inherent dynamic nature of the environment. Limited connectivity to the Internet precludes the use of conventional security mechanisms like Certifying Authorities and other forms of server-centric authentication. Under these circumstances peer-to-peer interactions are well-suited for information interchange. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust, and determining reliability and accuracy of peer-provided data in such interactions are still lacking. Our research is directed towards providing stronger assurances of reliability and trustworthiness of information and services with practical implementation considerations for pervasive environments.

Type: Article

Chapter: 21

Publisher: CRC Press


Pages: 473-496

Tags: pervasive, trust, security, intrusion detection

Google Scholar: f-GcCcR6yG0J

Number of Google Scholar citations: 1 [show citations]

Number of downloads: 1238


Available for download as

size: 528661 bytes

Related Projects:

Past Projects

 Distributed Trust Management in Mobile Ad Hoc Networks.
 MoGATU: Data Management in Pervasive Computing Environments.