Open Access. Powered by Scholars. Published by Universities.®

Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2008

Pervasive computing

Articles 1 - 3 of 3

Full-Text Articles in Mathematics

A Trust-Based Secure Service Discovery (Tssd) Model For Pervasive Computing, Sheikh Iqbal Ahamed, Moushumi Sharmin Dec 2008

A Trust-Based Secure Service Discovery (Tssd) Model For Pervasive Computing, Sheikh Iqbal Ahamed, Moushumi Sharmin

Mathematics, Statistics and Computer Science Faculty Research and Publications

To cope with the challenges posed by device capacity and capability, and also the nature of ad hoc networks, a Service discovery model is needed that can resolve security and privacy issues with simple solutions. The use of complex algorithms and powerful fixed infrastructure is infeasible due to the volatile nature of pervasive environment and tiny pervasive devices. In this paper, we present a trust-based secure Service discovery model, TSSD (trust-based secure service discovery) for a truly pervasive environment. Our model is a hybrid one that allows both secure and non-secure discovery of services. This model allows Service discovery and …


Architecture And Implementation Of A Trust Model For Pervasive Applications, Sheikh Iqbal Ahamed, Mohammad Zulkernine, Sailaja Bulusu, Mehrab Monjur Jun 2008

Architecture And Implementation Of A Trust Model For Pervasive Applications, Sheikh Iqbal Ahamed, Mohammad Zulkernine, Sailaja Bulusu, Mehrab Monjur

Mathematics, Statistics and Computer Science Faculty Research and Publications

Collaborative effort to share resources is a significant feature of pervasive computing environments. To achieve secure service discovery and sharing, and to distinguish between malevolent and benevolent entities, trust models must be defined. It is critical to estimate a device's initial trust value because of the transient nature of pervasive smart space; however, most of the prior research work on trust models for pervasive applications used the notion of constant initial trust assignment. In this paper, we design and implement a trust model called DIRT. We categorize services in different security levels and depending on the service requester's context information, …


An Impregnable Lightweight Device Discovery (Ildd) Model For The Pervasive Computing Environment Of Enterprise Applications, Munirul H. Haque, Sheikh Iqbal Ahamed Apr 2008

An Impregnable Lightweight Device Discovery (Ildd) Model For The Pervasive Computing Environment Of Enterprise Applications, Munirul H. Haque, Sheikh Iqbal Ahamed

Mathematics, Statistics and Computer Science Faculty Research and Publications

The worldwide use of handheld devices (personal digital assistants, cell phones, etc.) with wireless connectivity will reach 2.6 billion units this year and 4 billion by 2010. More specifically, these handheld devices have become an integral part of industrial applications. These devices form pervasive ad hoc wireless networks that aide in industry applications. However, pervasive computing is susceptible and vulnerable to malicious active and passive snoopers. This is due to the unavoidable interdevice dependency, as well as a common shared medium, very transitory connectivity, and the absence of a fixed trust infrastructure. In order to ensure security and privacy in …