Trust and Mobility Aware Service Provision for Pervasive Computing

نویسندگان

  • Liam McNamara
  • Cecilia Mascolo
  • Licia Capra
چکیده

Successful provision of services in pervasive networks represents a major challenge. The requester of a service or resource should be able to decide whom to rely on, not only depending on the apparent QoS that various providers offer, but also on the trustworthiness of the providers, as well as their mobility patterns. Existing approaches offer a rather simplistic solution to the problem: either resources and services are discovered and selected purely based on their name/category, or, at most, by looking at the QoS promised by the various providers. In this paper we present a service provision framework that reasons about mobility and trust to enable effective service selection in mobile ad-hoc networks. We illustrate our ideas through a scenario of service sharing on public transport where passengers are able to select other passengers’ devices for information transfer, based on a novel combination of quality attributes (e.g., network connectivity), trust and mobility.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

Vertical handovers as adaptation methods in pervasive systems

Pervasive systems need to be context aware and need to adapt to context changes, including network disconnections and changes in network Quality of Service (QoS). Vertical handover (handover between heterogeneous networks) is one of possible adaptation methods. It allows users to roam freely between heterogeneous networks while maintaining continuity of their applications. This paper proposes a...

متن کامل

Context-driven migration and diffusion of pervasive services on the OSGi framework

The ubiquity of wireless ad hoc networks and the benefits of loosely coupled services have fostered a growing interest in service-oriented architectures for pervasive computing. Context-aware services and runtime adaptation are key to expedite human interaction with dynamic pervasive computing environments. We explore two types of live service mobility to avoid service disruptions in mobile ad ...

متن کامل

A Context-Aware Entity Recognition Scheme for Pervasive Computing

In the future world filled with pervasive computing, almost all entities can be mobile, which means not only service requesters but also service providers are always dynamic and unpredictable. This raises two security problems. For service providers, how can they keep their security capability when they move here and there? And for service requesters, how can they be trusted by various service ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006