TY - GEN
T1 - Towards secure trust bootstrapping in pervasive computing environment
AU - Ahamed, Sheikh I.
AU - Hoque, Endadul
AU - Rahman, Farzana
AU - Zulkernine, Mohammad
PY - 2008
Y1 - 2008
N2 - The deployment of small handheld devices in a pervasive environment inevitably raises security concerns while sharing services. Trust models play a major role in guarding against privacy violations and security breaches. Though assignment of initial trust is an important issue, little work has been done in this area. Most of the prior research on trust models assume a constant level of the initial trust value. However, in a pervasive smart space, trust is context dependent. The need for security varies from context to context. In addition, some services, being shared in this environment, require high security while sharing. To ensure this, security levels should be incorporated in the initial trust calculation. In this paper, we propose a new initial trust model called ICSTB (Integration of Context Security in Trust Bootstrapping). The model categorizes services or contexts in different security levels based on their security needs, and these security needs are considered in trust bootstrapping.
AB - The deployment of small handheld devices in a pervasive environment inevitably raises security concerns while sharing services. Trust models play a major role in guarding against privacy violations and security breaches. Though assignment of initial trust is an important issue, little work has been done in this area. Most of the prior research on trust models assume a constant level of the initial trust value. However, in a pervasive smart space, trust is context dependent. The need for security varies from context to context. In addition, some services, being shared in this environment, require high security while sharing. To ensure this, security levels should be incorporated in the initial trust calculation. In this paper, we propose a new initial trust model called ICSTB (Integration of Context Security in Trust Bootstrapping). The model categorizes services or contexts in different security levels based on their security needs, and these security needs are considered in trust bootstrapping.
UR - http://www.scopus.com/inward/record.url?scp=58449108898&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=58449108898&partnerID=8YFLogxK
U2 - 10.1109/HASE.2008.21
DO - 10.1109/HASE.2008.21
M3 - Conference contribution
AN - SCOPUS:58449108898
SN - 9780769534824
T3 - Proceedings of IEEE International Symposium on High Assurance Systems Engineering
SP - 89
EP - 96
BT - Proceedings - 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008
T2 - 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008
Y2 - 3 December 2008 through 5 December 2008
ER -