[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Trust-based authentication scheme with user rating for low-resource devices in smart environments

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Langheinrich M (2001) Privacy by design-principles of privacy-aware ubiquitous systems. In: Proceeding of the 3rd international conference on ubiquitous computing (UbiComp 2001), Springer LNCS 2201. pp 273–291

  2. Stajano F (2002) Security for ubiquitous computing. Halsted Press, New York

  3. Modahl M, Agarwalla B, Saponas TS, Abowd G, Ramachandran U (2006) UbiqStack: a taxonomy for a ubiquitous computing software stack. Personal Ubiquitous Comput J 10(1):21–27

    Article  Google Scholar 

  4. English C, Terzis S, Nixon P (2005) Towards self-protecting ubiquitous systems: monitoring trust-based interactions. Personal Ubiquitous Comput J 10(1):50–54

    Article  Google Scholar 

  5. Yin S, Ray I (2006) A trust model for pervasive computing environments. In: International conference on collaborative computing: networking, applications and worksharing

  6. Taherian M, Jalili R, Amini M (2008) PTO: a trust ontology for pervasive environments. In: 22nd international conference on advanced information networking and applications—workshops, IEEE

  7. Cheng HS, Zhang D, Tan JG (2005) Protection of privacy in pervasive computing environments. In: Proceedings of the international conference on information technology: coding and computing (ITCC’05)

  8. Campbell R, Al-Muhtadi J (2002) Towards security and privacy for pervasive computing. In: Proceedings of ISSS, Tokyo, Japan, 2002, pp 1–15

  9. Tentori M, Favela J (2005) Supporting quality of privacy (QOP) in pervasive computing. In: Proceeding of the sixth Mexican international conference on computer science. ACM Press, pp 58–67

  10. Mihaela I, Andrea D, Hristo K, Luigi T (2007) A peer-to-peer multidimensional trust model for digital ecosystems. Computer Science Department, University of Malaga, Spain

  11. Sun YL, Yu W, Han Z, Liu KJR (2004) Information theoretic framework of trust modeling and evaluation for ad hoc networks

  12. Ren Y , Boukerche A (2008) Modeling and managing the trust for wireless and mobile ad hoc networks. In: ICC 2008 proceedings

  13. Luo J, Liu X, Fan M (2009) A trust model based on fuzzy recommendation for mobile ad-hoc networks. Comput Netw 53:2396–2407

    Article  MATH  Google Scholar 

  14. Masthoff J (2007) Computationally modelling trust: an exploration. University of Aberdeen, Aberdeen, Scotland, UK

    Google Scholar 

  15. Felix Gomez M, Martinez Perez G (2009) Security threats scenarios in trust and reputation models for distributed systems. Comput Security 28:545–556

    Article  Google Scholar 

  16. Abi-Char P, Mhamed A., El Hassan B (2007) A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: The international conference on next generation mobile applications, services and technologies (NGMAST 2007)

  17. Moloney M, Weber S (2005) A context-aware trust-based security system for ad hoc networks. In: Workshop of the 1st international conference on security and privacy for emerging areas in communication networks, 2005

  18. Surie A, Perrig A, Farber David J (2007) Rapid trust establishment for pervasive personal computing. IEEE Pervasive Comput 6(4):24–30

    Article  Google Scholar 

  19. Lagesse B, Kumar M, Paluska JM, Wright M (2009) DTT: a distributed trust toolkit for pervasive systems. In: IEEE conferences, 2009

  20. Ahamed SI, Sharmin M, Ahmed S (2008) A risk-aware trust based secure resource discovery (RTSRD) model for pervasive computing. In: Sixth annual IEEE international conference on pervasive computing and communications. IEEE, 2008

  21. Ghorbel M, Mhamed A, Mokhtari M (2009) Secured and trusted service provision in pervasive environment. In: IEEE international conference on wireless and mobile computing, networking and communications, 2009

  22. Godoy D , Amandi A (2011) Enabling topic-level trust for collaborative information sharing. Personal Ubiquitous Comput J, OnlineFirst, 6 Aug 2011

  23. El Husseini A, Mhamed A, El Hassan B, Mokhtari M (2011) A novel trust-based authentication scheme for low-resource devices in smart environments. In: The second international conference on ambient systems, networks and technologies (ANT-2011)

  24. Borzymek P, Sydow M, Wierzbicki A (2009) Enriching trust prediction model in social network with user rating similarity. In: International conference on computational aspects of social networks, 2009. CASON ’09, pp 40–47

  25. Yamasaki S (2011) A trust rating method for information providers over the social web service: a pragmatic protocol for trust among information explorers and information providers. In: 11th international symposium on applications and the internet (SAINT), 2011 IEEE/IPSJ, pp 578–582

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anas El Husseini.

Rights and permissions

Reprints and permissions

About this article

Cite this article

El Husseini, A., M’Hamed, A., El Hassan, B. et al. Trust-based authentication scheme with user rating for low-resource devices in smart environments. Pers Ubiquit Comput 17, 1013–1023 (2013). https://doi.org/10.1007/s00779-012-0548-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-012-0548-8

Keywords

Navigation