IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Trust Models for Ubiquitous Mobile Systems

Trust Models for Ubiquitous Mobile Systems
View Sample PDF
Author(s): Mike Burmester (Florida State University, USA)
Copyright: 2009
Pages: 6
Source title: Mobile Computing: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): David Taniar (Monash University, Australia)
DOI: 10.4018/978-1-60566-054-7.ch213

Purchase

View Trust Models for Ubiquitous Mobile Systems on the publisher's website for pricing and purchasing information.

Abstract

This chapter introduces the notion of trust as a means to establish security in ubiquitous mobile network systems. It argues that trust is an essential requirement to enable security in any open network environments, and in particular, in wireless ad hoc environments where there is no network topology. In such environments, communication can only be achieved via routes that have to be trusted. In general it may be hard, or even impossible, to establish, recall, and maintain trust relationships. It is therefore important to understand the limitations of such environments and to find mechanisms that may support trust either explicitly or implicitly. We consider several models that can be used to enable trust in such environments, based on economic, insurance, information flow, and evolutionary paradigms.

Related Content

Tapan Kumar Behera. © 2023. 20 pages.
B. Narendra Kumar Rao. © 2023. 17 pages.
Blendi Rrustemi, Deti Baholli, Herolind Balaj. © 2023. 18 pages.
Alma Beluli. © 2023. 11 pages.
Jona Ndrecaj, Shkurte Berisha, Erita Çunaku. © 2023. 15 pages.
Yllka Totaj. © 2023. 12 pages.
Hla Myo Tun, Devasis Pradhan. © 2023. 31 pages.
Body Bottom