Abstract
Mobile systems interact with many autonomous entities and multiple services that provide a ubiquitous environment for societies. In this environment, trust to security is a challenging issue. Entities and services have unpredictable behaviors therefore conventional trust models have limited accuracy for security related computations due to static nature of the models. Adaptive trust computations are needed to make accurate trust decisions. In this paper, we propose an adaptive approach to compute trust for mobile security. We evaluate the approach with different scenarios and comparisons to show the adaptive property.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bahtiyar, Ş., Çağlayan, M.U.: Extracting trust information from security system of a service. J. Netw. Comput. Appl. 35(1), 480–490 (2012)
Conti, M., Das, S.K., Bisdikian, C., Kumar, M., Ni, L.M., Passarella, A., Roussos, G., Tröster, G., Tsudik, G., Zambonelli, F.: Looking ahead in pervasive computing: challenges and opportunities in the era of cyber-physical convergence. Pervasive Mobile Comput. 8(1), 2–21 (2012)
Govindan, K., Mohapatra, P.: Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Commun. Surv. Tutor. 14(2), 1–20 (2012)
Gür, G., Bahtiyar, Ş., Alagöz, F.: Security analysis of computer networks: key concepts and methodologies. In: Obaidat, M.S., Zarai, F., Nicopolitidis, P. (eds.) Modeling and Simulation of Computer Networks, pp. 861–898. Elsevier, Amsterdam (2015)
Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. Auton. Agent. Multi-Agent Syst. 13(2), 119–154 (2006)
Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cyber security. J. Comput. Syst. Sci. 80, 973–993 (2014)
Kagal, L., Finin, T., Joshi, A.: Trust-based security in pervasive computing environments. IEEE Comput. 34, 154–157 (2001)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM, Budapest, Hungary (2003)
Kaufman, L.M.: Can a trusted environment provide security? IEEE Secur. Priv. 8(1), 50–52 (2010)
Mármol, F.G., Pérez, G.M.: Security threats scenarios in trust and reputation models for distributed systems. Comput. Secur. 28(7), 545–556 (2009)
Massa, P.: A survey of trust use and modeling in real online systems. In: Song, R., Korba, L., Yee, G. (eds.) Trust in E-services: Technologies, Practices and Challenges, pp. 51–83. Idea Group Inc., Calgary (2007)
Norton: 2012 norton cybercrime report. Technical report, Symantec (2012)
Polla, M.L., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Commun. Surv. Tutor. 15(1), 446–471 (2013)
Squicciarini, A.C., Bertino, E., Ferrari, E., Ray, I.: Achieving privacy in trust negotiations with an ontology-based approach. IEEE Trans. Dependable Secure Comput. 3(1), 13–30 (2006)
Trustwave’s SpiderLabs: Global Security Report (2013). https://www2.trustwave.com/2013GSR.html
Xia, H., Jia, Z., Li, X., Ju, L., Sha, E.H.M.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096–2114 (2013)
Xiong, L., Liu, L.: Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16, 843–857 (2004)
Acknowledgments
This work is supported by the Turkish State Planning Organization (DPT) under the TAM Project, number 2007K120610.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Bahtiyar, Ş., Ermiş, O., Çağlayan, M.U. (2016). Adaptive Trust Scenarios for Mobile Security. In: Younas, M., Awan, I., Kryvinska, N., Strauss, C., Thanh, D. (eds) Mobile Web and Intelligent Information Systems. MobiWIS 2016. Lecture Notes in Computer Science(), vol 9847. Springer, Cham. https://doi.org/10.1007/978-3-319-44215-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-44215-0_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44214-3
Online ISBN: 978-3-319-44215-0
eBook Packages: Computer ScienceComputer Science (R0)