Skip to main content

Adaptive Trust Scenarios for Mobile Security

  • Conference paper
  • First Online:
Mobile Web and Intelligent Information Systems (MobiWIS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9847))

Included in the following conference series:

  • 1189 Accesses

Abstract

Mobile systems interact with many autonomous entities and multiple services that provide a ubiquitous environment for societies. In this environment, trust to security is a challenging issue. Entities and services have unpredictable behaviors therefore conventional trust models have limited accuracy for security related computations due to static nature of the models. Adaptive trust computations are needed to make accurate trust decisions. In this paper, we propose an adaptive approach to compute trust for mobile security. We evaluate the approach with different scenarios and comparisons to show the adaptive property.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bahtiyar, Ş., Çağlayan, M.U.: Extracting trust information from security system of a service. J. Netw. Comput. Appl. 35(1), 480–490 (2012)

    Article  Google Scholar 

  2. Conti, M., Das, S.K., Bisdikian, C., Kumar, M., Ni, L.M., Passarella, A., Roussos, G., Tröster, G., Tsudik, G., Zambonelli, F.: Looking ahead in pervasive computing: challenges and opportunities in the era of cyber-physical convergence. Pervasive Mobile Comput. 8(1), 2–21 (2012)

    Article  Google Scholar 

  3. Govindan, K., Mohapatra, P.: Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Commun. Surv. Tutor. 14(2), 1–20 (2012)

    Article  Google Scholar 

  4. Gür, G., Bahtiyar, Ş., Alagöz, F.: Security analysis of computer networks: key concepts and methodologies. In: Obaidat, M.S., Zarai, F., Nicopolitidis, P. (eds.) Modeling and Simulation of Computer Networks, pp. 861–898. Elsevier, Amsterdam (2015)

    Chapter  Google Scholar 

  5. Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. Auton. Agent. Multi-Agent Syst. 13(2), 119–154 (2006)

    Article  Google Scholar 

  6. Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cyber security. J. Comput. Syst. Sci. 80, 973–993 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  7. Kagal, L., Finin, T., Joshi, A.: Trust-based security in pervasive computing environments. IEEE Comput. 34, 154–157 (2001)

    Article  Google Scholar 

  8. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM, Budapest, Hungary (2003)

    Google Scholar 

  9. Kaufman, L.M.: Can a trusted environment provide security? IEEE Secur. Priv. 8(1), 50–52 (2010)

    Article  Google Scholar 

  10. Mármol, F.G., Pérez, G.M.: Security threats scenarios in trust and reputation models for distributed systems. Comput. Secur. 28(7), 545–556 (2009)

    Article  Google Scholar 

  11. Massa, P.: A survey of trust use and modeling in real online systems. In: Song, R., Korba, L., Yee, G. (eds.) Trust in E-services: Technologies, Practices and Challenges, pp. 51–83. Idea Group Inc., Calgary (2007)

    Chapter  Google Scholar 

  12. Norton: 2012 norton cybercrime report. Technical report, Symantec (2012)

    Google Scholar 

  13. Polla, M.L., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Commun. Surv. Tutor. 15(1), 446–471 (2013)

    Article  Google Scholar 

  14. Squicciarini, A.C., Bertino, E., Ferrari, E., Ray, I.: Achieving privacy in trust negotiations with an ontology-based approach. IEEE Trans. Dependable Secure Comput. 3(1), 13–30 (2006)

    Article  Google Scholar 

  15. Trustwave’s SpiderLabs: Global Security Report (2013). https://www2.trustwave.com/2013GSR.html

  16. Xia, H., Jia, Z., Li, X., Ju, L., Sha, E.H.M.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096–2114 (2013)

    Article  Google Scholar 

  17. Xiong, L., Liu, L.: Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16, 843–857 (2004)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the Turkish State Planning Organization (DPT) under the TAM Project, number 2007K120610.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Şerif Bahtiyar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Bahtiyar, Ş., Ermiş, O., Çağlayan, M.U. (2016). Adaptive Trust Scenarios for Mobile Security. In: Younas, M., Awan, I., Kryvinska, N., Strauss, C., Thanh, D. (eds) Mobile Web and Intelligent Information Systems. MobiWIS 2016. Lecture Notes in Computer Science(), vol 9847. Springer, Cham. https://doi.org/10.1007/978-3-319-44215-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44215-0_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44214-3

  • Online ISBN: 978-3-319-44215-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics