Capacity and Service (CapServ) Adaptive Trust Computation by Territory Formation in Ubiquitous Environment

Capacity and Service (CapServ) Adaptive Trust Computation by Territory Formation in Ubiquitous Environment

B. Adithya (Department of Computer Science & Engineering, Siddaganga Institute of Technology, Tumkur, India) and B. Sathish Babu (Department of Computer Science & Engineering, Siddaganga Institute of Technology, Tumkur, India)
DOI: 10.4018/japuc.2012100102
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Ubiquitous computing has been studied extensively as a post desktop model. Secure communication among various heterogeneous networks is been a challenge in service environment with location dynamism of the nodes. In this paper the authors proposed model for trust worthy communications among devices of various networks in a ubiquitous environment with varied service needs, security needs and computational-storage capacities. The model uses a novel approach for computing trust - adaptive to capacity and services.
Article Preview

Our survey would emphasize on the protocols proposed for privacy and security in a manner of describing the evolution in design of security protocols.

In Al-Muhtadi (2002) a framework for authentication was proposed to preserve privacy and prevent eavesdropping. An extension of Kerberos (Neumann & Ts’o, 1994) and utilizing the location privacy as provided by Mist (Al-Muhtadi, Campbell, Kapadia, Mickunas & Yi, 2002). Multiple levels of authentication were done to build the confidence level of a device which can be any of the smart wrist watches, a smart jewelry, and active badges and so on. Further in the same line many security models were proposed based on cryptographic techniques. Some of which include, Identity-Based Encryption (Hengartner & Steenkiste, 2003; Hengartner & Steenkiste, 2005), Trusted Platform Module (Balfe, Li, & Zhou, 2006), Interaction History model (Bussard, Roudier & Molva, 2004) and so on. The common issue with cryptographic techniques is the high usage of computing resources in a resource constraint environment. Security, privacy and authentication in smart environment using cryptographic techniques are complicated, as it relays on a central authority.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing