Trust-based authentication scheme with user rating for low-resource devices in smart environments

被引:5
|
作者
El Husseini, Anas [1 ,2 ]
M'Hamed, Abdallah [1 ]
El Hassan, Bachar [2 ]
Mokhtari, Mounir [1 ]
机构
[1] Telecom SudParis, Handicom Lab, Evry, France
[2] Lebanese Univ, Azm Ctr Sci Res, LaSTRe Lab, Tripoli, Lebanon
关键词
Smart environments; Privacy preservation; Trust evaluation; Authentication; Low-resource devices; MODEL;
D O I
10.1007/s00779-012-0548-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.
引用
收藏
页码:1013 / 1023
页数:11
相关论文
共 50 条
  • [1] Trust-based authentication scheme with user rating for low-resource devices in smart environments
    Anas El Husseini
    Abdallah M’Hamed
    Bachar El Hassan
    Mounir Mokhtari
    Personal and Ubiquitous Computing, 2013, 17 : 1013 - 1023
  • [2] Trust-Based Authentication for Smart Home Systems
    Mbarek, Bacem
    Ge, Mouzhi
    Pitner, Tomas
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (03) : 2157 - 2172
  • [3] Trust-Based Authentication for Smart Home Systems
    Bacem Mbarek
    Mouzhi Ge
    Tomás Pitner
    Wireless Personal Communications, 2021, 117 : 2157 - 2172
  • [4] Trust-based distributed authentication middleware in ubiquitous mobile environments
    Zhang, Mingwu
    Zhu, Shengmi
    Yang, Bo
    Zhang, Wenzheng
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 5, PROCEEDINGS, 2007, : 814 - +
  • [5] A Trust-based Usage Control Scheme for Resource Sharing
    Lu, Chen
    Zhang Li-Qiang
    Qing, Zhou
    Yun, Chen
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 550 - 556
  • [6] Calibrating Learning Parity with Noise Authentication for Low-Resource Devices
    Tan, Teik Guan
    Soh, De Wen
    Zhou, Jianying
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2022, 2022, 13407 : 19 - 36
  • [7] Trust-based decision-making for smart and adaptive environments
    Stephan Hammer
    Michael Wißner
    Elisabeth André
    User Modeling and User-Adapted Interaction, 2015, 25 : 267 - 293
  • [8] Trust-based decision-making for smart and adaptive environments
    Hammer, Stephan
    Wissner, Michael
    Andre, Elisabeth
    USER MODELING AND USER-ADAPTED INTERACTION, 2015, 25 (03) : 267 - 293
  • [9] A Trust-Based Provider Recommender for Mobile Devices in Semantic Environments
    Cebrian, Helena
    Higes, Alvaro
    Hermoso, Ramon
    Billhardt, Holger
    DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, 2010, 79 : 65 - 72
  • [10] Trust-Based Permissioned Blockchain Network for Identification and Authentication of Internet of Smart Devices: An E-Commerce Prospective
    Babu, Erukala Suresh
    Kavati, Ilaiah
    Cheruku, Ramalingaswamy
    Nayak, Soumya Ranjan
    Ghosh, Uttam
    JOURNAL OF INTERCONNECTION NETWORKS, 2022,