1st International ICST Workshop on Trusted Collaboration

Research Article

A Trust Model for Pervasive Computing Environments

  • @INPROCEEDINGS{10.1109/COLCOM.2006.361880,
        author={Shuxin Yin and Indrakshi Ray and Indrajit Ray},
        title={A Trust Model for Pervasive Computing Environments},
        proceedings={1st International ICST Workshop on Trusted Collaboration},
        publisher={IEEE},
        proceedings_a={TRUSTCOL},
        year={2007},
        month={5},
        keywords={Application software Communications technology Embedded system Information security Mobile computing Patient monitoring Pervasive computing Privacy Sensor systems Wireless sensor networks},
        doi={10.1109/COLCOM.2006.361880}
    }
    
  • Shuxin Yin
    Indrakshi Ray
    Indrajit Ray
    Year: 2007
    A Trust Model for Pervasive Computing Environments
    TRUSTCOL
    IEEE
    DOI: 10.1109/COLCOM.2006.361880
Shuxin Yin1,*, Indrakshi Ray1,*, Indrajit Ray1,*
  • 1: Department of Computer Science, Colorado State University, Fort Collins, CO 80523
*Contact email: yin@cs.colostate.edu, iray@cs.colostate.edu, indrajit@cs.colostate.edu

Abstract

With the growth of mobile and sensor devices, embedded systems, and communication technologies, we are moving towards an era of pervasive computing. Pervasive computing applications typically involve interactions between a large number of entities that span different organizations. Uncontrolled disclosure of information or unconstrained interaction among entities may have extremely grave consequences. Traditional security policies and mechanisms are inadequate for pervasive computing applications. Unlike traditional applications, pervasive computing applications have no definite security perimeters and are dynamic in nature. Pervasive computing applications may need to interact with entities that are not known a priori and therefore cannot be trusted. The traditional binary notion of trust where known entities are completely trusted and unknown entities are distrusted are not suitable for such applications. To fill this gap, we develop a trust model useful for pervasive computing applications and develop strategies for establishing trust between entities. The model must accommodate the notion of different degrees of trust, identify how to determine the trust value, and define how trust changes over time.