Trust-based authentication scheme with user rating for low-resource devices in smart environments
详细信息    查看全文
  • 作者:Anas El Husseini (1) (2)
    Abdallah M’Hamed (1)
    Bachar El Hassan (2)
    Mounir Mokhtari (1)
  • 关键词:Smart environments ; Privacy preservation ; Trust evaluation ; Authentication ; Low ; resource devices
  • 刊名:Personal and Ubiquitous Computing
  • 出版年:2013
  • 出版时间:June 2013
  • 年:2013
  • 卷:17
  • 期:5
  • 页码:1013-1023
  • 全文大小:515KB
  • 参考文献:1. Langheinrich M (2001) Privacy by design-principles of privacy-aware ubiquitous systems. In: Proceeding of the 3rd international conference on ubiquitous computing (UbiComp 2001), Springer LNCS 2201. pp 273-91
    2. Stajano F (2002) Security for ubiquitous computing. Halsted Press, New York
    3. Modahl M, Agarwalla B, Saponas TS, Abowd G, Ramachandran U (2006) UbiqStack: a taxonomy for a ubiquitous computing software stack. Personal Ubiquitous Comput J 10(1):21-7 CrossRef
    4. English C, Terzis S, Nixon P (2005) Towards self-protecting ubiquitous systems: monitoring trust-based interactions. Personal Ubiquitous Comput J 10(1):50-4 CrossRef
    5. Yin S, Ray I (2006) A trust model for pervasive computing environments. In: International conference on collaborative computing: networking, applications and worksharing
    6. Taherian M, Jalili R, Amini M (2008) PTO: a trust ontology for pervasive environments. In: 22nd international conference on advanced information networking and applications—workshops, IEEE
    7. Cheng HS, Zhang D, Tan JG (2005) Protection of privacy in pervasive computing environments. In: Proceedings of the international conference on information technology: coding and computing (ITCC-5)
    8. Campbell R, Al-Muhtadi J (2002) Towards security and privacy for pervasive computing. In: Proceedings of ISSS, Tokyo, Japan, 2002, pp 1-5
    9. Tentori M, Favela J (2005) Supporting quality of privacy (QOP) in pervasive computing. In: Proceeding of the sixth Mexican international conference on computer science. ACM Press, pp 58-7
    10. Mihaela I, Andrea D, Hristo K, Luigi T (2007) A peer-to-peer multidimensional trust model for digital ecosystems. Computer Science Department, University of Malaga, Spain
    11. Sun YL, Yu W, Han Z, Liu KJR (2004) Information theoretic framework of trust modeling and evaluation for ad hoc networks
    12. Ren Y , Boukerche A (2008) Modeling and managing the trust for wireless and mobile ad hoc networks. In: ICC 2008 proceedings
    13. Luo J, Liu X, Fan M (2009) A trust model based on fuzzy recommendation for mobile ad-hoc networks. Comput Netw 53:2396-407 CrossRef
    14. Masthoff J (2007) Computationally modelling trust: an exploration. University of Aberdeen, Aberdeen, Scotland, UK
    15. Felix Gomez M, Martinez Perez G (2009) Security threats scenarios in trust and reputation models for distributed systems. Comput Security 28:545-56 CrossRef
    16. Abi-Char P, Mhamed A., El Hassan B (2007) A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: The international conference on next generation mobile applications, services and technologies (NGMAST 2007)
    17. Moloney M, Weber S (2005) A context-aware trust-based security system for ad hoc networks. In: Workshop of the 1st international conference on security and privacy for emerging areas in communication networks, 2005
    18. Surie A, Perrig A, Farber David J (2007) Rapid trust establishment for pervasive personal computing. IEEE Pervasive Comput 6(4):24-0 CrossRef
    19. Lagesse B, Kumar M, Paluska JM, Wright M (2009) DTT: a distributed trust toolkit for pervasive systems. In: IEEE conferences, 2009
    20. Ahamed SI, Sharmin M, Ahmed S (2008) A risk-aware trust based secure resource discovery (RTSRD) model for pervasive computing. In: Sixth annual IEEE international conference on pervasive computing and communications. IEEE, 2008
    21. Ghorbel M, Mhamed A, Mokhtari M (2009) Secured and trusted service provision in pervasive environment. In: IEEE international conference on wireless and mobile computing, networking and communications, 2009
    22. Godoy D , Amandi A (2011) Enabling topic-level trust for collaborative information sharing. Personal Ubiquitous Comput J, OnlineFirst, 6 Aug 2011
    23. El Husseini A, Mhamed A, El Hassan B, Mokhtari M (2011) A novel trust-based authentication scheme for low-resource devices in smart environments. In: The second international conference on ambient systems, networks and technologies (ANT-2011)
    24. Borzymek P, Sydow M, Wierzbicki A (2009) Enriching trust prediction model in social network with user rating similarity. In: International conference on computational aspects of social networks, 2009. CASON -9, pp 40-7
    25. Yamasaki S (2011) A trust rating method for information providers over the social web service: a pragmatic protocol for trust among information explorers and information providers. In: 11th international symposium on applications and the internet (SAINT), 2011 IEEE/IPSJ, pp 578-82
  • 作者单位:Anas El Husseini (1) (2)
    Abdallah M’Hamed (1)
    Bachar El Hassan (2)
    Mounir Mokhtari (1)

    1. Telecom SudParis, Handicom Lab, Evry, France
    2. LaSTRe Lab, Azm Center for Scientific Research, Lebanese University, Tripoli, Lebanon
文摘
In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700