I.J. Computer Network and Information Security, 2014, 10, 64-71
Published Online September 2014 in MECS (http://www.mecs-press.org/)
DOI: 10.5815/ijcnis.2014.10.08
Copyright © 2014 MECS I.J. Computer Network and Information Security, 2014, 10, 64-71
Trust Metric based Soft Security in Mobile
Pervasive Environment
Madhu Sharma Gaur
Ph.D. Scholar GEU, Dehradun, Asst. Prof., G. L. Bajaj Inst. of Tech & Mgmt. Greater Noida,
madhu14nov@gmail.com
Dr. Bhaskar Pant
Asst. Prof, Deptt of IT, GEU Dehradun,
pantbhaskar2@gmail.com
Abstract—In the decentralized and highly dynamic
environment like Mobile Pervasive Environments (MPE)
trust and security measurement are two major
challenging issues for community researchers. So far
primarily many of architectural frameworks and models
developed and being used. In the vision of pervasive
computing where mobile applications are growing
immensely with the potential of low cost, high
performance, and user centric solutions. This paradigm is
highly dynamic and heterogeneous and brings along trust
and security challenges regarding vulnerabilities and
threats due to inherent open connectivity. Despite
advances in the technology, there is still a lack of
methods to measure the security and level of trust and
framework for the assessment and calculation of the
degree of the trustworthiness. In this paper, we explore
security and trust metrics concerns requirement and
challenges to decide the trust computations metric
parameters for a self-adaptive self-monitoring trust based
security assurance in mobile pervasive environment. The
objective is to identify the trust parameters while routing
and determine the node behavior for soft security trust
metric. In winding up, we put our efforts to set up
security assurance model to deal with attacks and
vulnerabilities requirements of system under exploration.
Index Terms—Metrics, Mobile Pervasive Environment
(MPE), Security Assurance, Trust Metrics.
I. INTRODUCTION
In the decentralized and highly dynamic environment
like Mobile Pervasive Environments (MPE) trust and
security measurement are two major challenging issues
where small, powerful and resource-restricted devices are
communicating seamlessly. Such environment does not
have fixed infrastructure and centralized access control
thus needs to be self-adaptive and self-organizing. There
are mobile hosts which can link to the network on the air
and can be deployed rapidly with the potential option for
dynamic security. Furthermore, the self-adaptive self-
organizing communication can survive better in critical
situation like war, terrorism or natural disaster scenarios
compared to fixed infrastructures. Our approach focus on
trust based soft security with the assumption that strength
of security assurance can be enhanced by identifying
strong and weak trust parameters as trust metric. In this
paper, we explore security and trust metrics concerns
requirement and challenges to decide the trust
computations. The objective is to identify the trust
parameters while routing and determine the node
behavior. In winding up, we put our efforts to set up
general security assurance model based on trust and
security vulnerabilities requirements, behavior modeling
evidence collection, and the assessment security level of
the system under exploration. The major contributions of
this work are:
Recognizing security concerns and requirements,
Trust management.
Identification of sophisticated information security
metric for Mobile pervasive environment,
Defining trust based soft security assurance metric
Performance Evaluation
The rest of the paper is organized as Section II
Literature Review and section III describes the MPE
security concerns, requirements and metrics. In the
section IV Trust Definition and Trust Management V.
metrics VI- Proposes Approach and finally in section VII
Conclusion and future scope.
II. LITRATURE REVIEW
The security objective typically consists of security
requirements like integrity, privacy, confidentiality,
availability as per specifications or standards. The
probability of quantify security and developing security
metrics, one has to be aware about the facts that the
metric simplifies a complex socio-technical situation.
Security metrics are. Pioneering work on trust
management [1] had as its goal separation of security and
trust [3]. The benefit of the separation is allowing
individual systems to have different trust policies,
separate from the common, global authentication and
security system. Rasmusson and Janssen [11] identified
two approaches to security: hard security and soft
security. Hard security is used to traditional security