Towards secure trust bootstrapping in pervasive computing environment

Sheikh I. Ahamed, Endadul Hoque, Farzana Rahman, Mohammad Zulkernine

Research output: Chapter in Book/Entry/PoemConference contribution

5 Scopus citations

Abstract

The deployment of small handheld devices in a pervasive environment inevitably raises security concerns while sharing services. Trust models play a major role in guarding against privacy violations and security breaches. Though assignment of initial trust is an important issue, little work has been done in this area. Most of the prior research on trust models assume a constant level of the initial trust value. However, in a pervasive smart space, trust is context dependent. The need for security varies from context to context. In addition, some services, being shared in this environment, require high security while sharing. To ensure this, security levels should be incorporated in the initial trust calculation. In this paper, we propose a new initial trust model called ICSTB (Integration of Context Security in Trust Bootstrapping). The model categorizes services or contexts in different security levels based on their security needs, and these security needs are considered in trust bootstrapping.

Original languageEnglish (US)
Title of host publicationProceedings - 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008
Pages89-96
Number of pages8
DOIs
StatePublished - 2008
Externally publishedYes
Event11th IEEE High Assurance Systems Engineering Symposium, HASE 2008 - Nanjing, China
Duration: Dec 3 2008Dec 5 2008

Publication series

NameProceedings of IEEE International Symposium on High Assurance Systems Engineering
ISSN (Print)1530-2059

Conference

Conference11th IEEE High Assurance Systems Engineering Symposium, HASE 2008
Country/TerritoryChina
CityNanjing
Period12/3/0812/5/08

ASJC Scopus subject areas

  • Software
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Towards secure trust bootstrapping in pervasive computing environment'. Together they form a unique fingerprint.

Cite this