International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.6, No.10, Sep. 2014

Trust Metric based Soft Security in Mobile Pervasive Environment

Full Text (PDF, 1198KB), PP.64-71

Views:96   Downloads:9


Madhu Sharma Gaur, Bhaskar Pant

Index Terms

Metrics;Mobile Pervasive Environment (MPE);Security Assurance;Trust Metrics


In the decentralized and highly dynamic environment like Mobile Pervasive Environments (MPE) trust and security measurement are two major challenging issues for community researchers. So far primarily many of architectural frameworks and models developed and being used. In the vision of pervasive computing where mobile applications are growing immensely with the potential of low cost, high performance, and user centric solutions. This paradigm is highly dynamic and heterogeneous and brings along trust and security challenges regarding vulnerabilities and threats due to inherent open connectivity. Despite advances in the technology, there is still a lack of methods to measure the security and level of trust and framework for the assessment and calculation of the degree of the trustworthiness. In this paper, we explore security and trust metrics concerns requirement and challenges to decide the trust computations metric parameters for a self-adaptive self-monitoring trust based security assurance in mobile pervasive environment. The objective is to identify the trust parameters while routing and determine the node behavior for soft security trust metric. In winding up, we put our efforts to set up security assurance model to deal with attacks and vulnerabilities requirements of system under exploration.

Cite This Paper

Madhu Sharma Gaur, Bhaskar Pant,"Trust Metric based Soft Security in Mobile Pervasive Environment", IJCNIS, vol.6, no.10, pp.64-71, 2014. DOI: 10.5815/ijcnis.2014.10.08


[1]Blaze, M., Feigenbaum, J., and Lacy, J. 1996. Decentralized Trust Management. In Proceedings of IEEE Symposium on Security and Privacy, (Oakland, CA, May 1996) Online at:

[2]Blaze, M., Feigenbaum, J. and Keromytis, A.D. 1998. KeyNote: Trust management for public-key infrastructures (position paper). In Proceedings of 6th International Workshop on Security Protocols (Cambridge, UK, Apr. 15-17, 1998). LNCS 1550, Springer-Verlag, 1998. 59–63.

[3]Cho, J.-H., and Swami, A. 2009. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks. In Proceedings of 14th International Command and Control Research and Technology Symposium (ICCRTS) (Washington, DC, June 2009). Online at:

[4]Chu, Y.H., Feigenbaum, J., LaMacchia, B., Resnick, P., and Strauss, M. 1997. REFEREE: Trust Management for WebApplications. Computer Networks and ISDN Systems 29, 8-13(Sep. 1997), 953–964. DOI=

[5]D. H. Mcknight and N. L. Chervany, “The meanings of trust: University of Minnesota, Technical reports.”, 1996].

[6]D. McCoy, D. Sicker and D. Grunwald, “A mechanism for detecting and responding to misbehaving nodes in wireless networks,” in 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON ’07, pp. 678–684, 2007.

[7]J?sang, A., Ismail, R., and Boyd, C. 2006. A Survey of Trustand Reputation Systems for Online Service Provision. Decision Support Systems 43, 2 (Mar 2007), 618-644DOI

[8]Morton Deutsch. Trust and suspicion. Conflict Resolution, 2(4):265–279, 1958.

[9]Payne, S. C.: A Guide to Security Metrics. SANS Institute InformationSecurity Reading Room, June (2006).

[10]Rasmusson, L., and Janssen, S. 1996. Simulated Social Control for Secure Internet Commerce. In Proceedings of New Security Paradigms Workshop (Lake Arrowhead, CA, Sep. 1996), 18- 25. DOI= ttp://

[11]S. Zheng and J. Baras, “Trust-assisted anomaly detection and localization in wireless sensor networks,” in Proc. IEEE Conf. on Sensor, Mesh and Ad Hoc Comm. and Netw (SECON), 2011, pp. 386–394.

[12]V. Balakrishnan, V. Varadharajan, P. Lucs, and U. K. Tupakula, “Trust enhanced secure mobile ad-hoc network routing,” in21st International Conference on Advanced Information Networking and Applications Workshops, AINAW ’07, pp. 27–33, 2007.

[13]X. Wang, L. Liu and J. Su, “Rlm: A general model for trust representation and aggregation,” IEEE Transactions on Services Computing, vol. 99, 2010.

[14]Xavier Titi1, Carlos Ballester Lafuente1, Jean-Marc Seigneur, Trust Management for Selecting Trustworthy Access Points, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011 ISSN (Online): 1694-0814.

[15]Y. Yu, K. Li, W. Zhou, and P. Li, “Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures,” J. Netw. Comput. Appl., vol. 35, no. 3, pp. 867–880, May 2012.