IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Trust Management Model based on Fuzzy Approach for Ubiquitous Computing

Trust Management Model based on Fuzzy Approach for Ubiquitous Computing
View Sample PDF
Author(s): Nalini A. Mhetre (Department of Computer Engineering, SKN College of Engineering, Pune, India), Arvind V. Deshpande (Department of Computer Engineering, SKN College of Engineering, Pune, India)and Parikshit Narendra Mahalle (Department of Computer Engineering, SKN College of Engineering, Pune, India)
Copyright: 2016
Volume: 7
Issue: 2
Pages: 14
Source title: International Journal of Ambient Computing and Intelligence (IJACI)
Editor(s)-in-Chief: Nilanjan Dey (JIS University, Kolkata, India)
DOI: 10.4018/IJACI.2016070102

Purchase

View Trust Management Model based on Fuzzy Approach for Ubiquitous Computing on the publisher's website for pricing and purchasing information.

Abstract

The current state of ubiquitous computing has been greatly influenced by emerging networking developments like Internet of Things (IoT), Future Internet etc. Adequate trust management is crucial to provide security. The entities involved in communication must be trusted for specific purposes depending on their role. Using trust model, devices can run trust computations and guide their behaviors. To this effect, a method is needed to evaluate the level of trust between devices. Trust models investigated so far discusses that devices face problems when communicating as transforming trust relationships from real to virtual world requires the negotiation of trust based on the security properties of devices. However, these models are developed in limited devices. This paper proposes a distributed trust model for device-to-device communication in ubiquitous computing. Mathematical model based on fuzzy rules to establish trust is presented. Fuzzy simulation of the model is presented to validate the findings. Simulation results show that proposed model calculates fuzzy trust values reliably.

Related Content

Shuqin Zhang, Peiyu Shi, Tianhui Du, Xinyu Su, Yunfei Han. © 2024. 27 pages.
Li Liao. © 2024. 16 pages.
Jinming Zhou, Yuanyuan Zhan, Sibo Chen. © 2024. 29 pages.
Huaping Luo. © 2024. 16 pages.
Julan Chen, Wengao Qian. © 2024. 15 pages.
G. Manikandan, Reuel Samuel Sam, Steven Frederick Gilbert, Karthik Srikanth. © 2024. 16 pages.
Liangqun Yang. © 2024. 17 pages.
Body Bottom