The Handbook of Mobile Middleware

Trust in Pervasive Computing

, , , , and

Pervasive environments are comprised of resource-constrained mobile devices “limited” in their connectivity to other devices or networks due to the inherent dynamic nature of the environment. Limited connectivity to the Internet precludes the use of conventional security mechanisms like Certifying Authorities and other forms of server-centric authentication. Under these circumstances peer-to-peer interactions are well-suited for information interchange. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust, and determining reliability and accuracy of peer-provided data in such interactions are still lacking. Our research is directed towards providing stronger assurances of reliability and trustworthiness of information and services with practical implementation considerations for pervasive environments.


  • 528661 bytes

intrusion detection, pervasive, security, trust

Article

CRC Press

21

http://www.crcpress.com/product/isbn/9780849338335

Downloads: 2067 downloads

Google Scholar Citations: 1 citation

UMBC ebiquity

Bibtex Entry:

@Article{Trust_in_Pervasive_Computing,
	author = "Jim Parker, Anand Patwardhan, Filip Perich, Anupam Joshi, and Tim Finin",
	title = "{Trust in Pervasive Computing}",
	month = "February",
	year = "2006",
	chapter = "21",
	note = "http://www.crcpress.com/product/isbn/9780849338335",
	pages = "473-496",
	journal = "The Handbook of Mobile Middleware ",
	publisher = "CRC Press",
}