I.J. Computer Network and Information Security, 2014, 10, 64-71 Published Online September 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2014.10.08 Copyright © 2014 MECS I.J. Computer Network and Information Security, 2014, 10, 64-71 Trust Metric based Soft Security in Mobile Pervasive Environment Madhu Sharma Gaur Ph.D. Scholar GEU, Dehradun, Asst. Prof., G. L. Bajaj Inst. of Tech & Mgmt. Greater Noida, madhu14nov@gmail.com Dr. Bhaskar Pant Asst. Prof, Deptt of IT, GEU Dehradun, pantbhaskar2@gmail.com AbstractIn the decentralized and highly dynamic environment like Mobile Pervasive Environments (MPE) trust and security measurement are two major challenging issues for community researchers. So far primarily many of architectural frameworks and models developed and being used. In the vision of pervasive computing where mobile applications are growing immensely with the potential of low cost, high performance, and user centric solutions. This paradigm is highly dynamic and heterogeneous and brings along trust and security challenges regarding vulnerabilities and threats due to inherent open connectivity. Despite advances in the technology, there is still a lack of methods to measure the security and level of trust and framework for the assessment and calculation of the degree of the trustworthiness. In this paper, we explore security and trust metrics concerns requirement and challenges to decide the trust computations metric parameters for a self-adaptive self-monitoring trust based security assurance in mobile pervasive environment. The objective is to identify the trust parameters while routing and determine the node behavior for soft security trust metric. In winding up, we put our efforts to set up security assurance model to deal with attacks and vulnerabilities requirements of system under exploration. Index TermsMetrics, Mobile Pervasive Environment (MPE), Security Assurance, Trust Metrics. I. INTRODUCTION In the decentralized and highly dynamic environment like Mobile Pervasive Environments (MPE) trust and security measurement are two major challenging issues where small, powerful and resource-restricted devices are communicating seamlessly. Such environment does not have fixed infrastructure and centralized access control thus needs to be self-adaptive and self-organizing. There are mobile hosts which can link to the network on the air and can be deployed rapidly with the potential option for dynamic security. Furthermore, the self-adaptive self- organizing communication can survive better in critical situation like war, terrorism or natural disaster scenarios compared to fixed infrastructures. Our approach focus on trust based soft security with the assumption that strength of security assurance can be enhanced by identifying strong and weak trust parameters as trust metric. In this paper, we explore security and trust metrics concerns requirement and challenges to decide the trust computations. The objective is to identify the trust parameters while routing and determine the node behavior. In winding up, we put our efforts to set up general security assurance model based on trust and security vulnerabilities requirements, behavior modeling evidence collection, and the assessment security level of the system under exploration. The major contributions of this work are: Recognizing security concerns and requirements, Trust management. Identification of sophisticated information security metric for Mobile pervasive environment, Defining trust based soft security assurance metric Performance Evaluation The rest of the paper is organized as Section II Literature Review and section III describes the MPE security concerns, requirements and metrics. In the section IV Trust Definition and Trust Management V. metrics VI- Proposes Approach and finally in section VII Conclusion and future scope. II. LITRATURE REVIEW The security objective typically consists of security requirements like integrity, privacy, confidentiality, availability as per specifications or standards. The probability of quantify security and developing security metrics, one has to be aware about the facts that the metric simplifies a complex socio-technical situation. Security metrics are. Pioneering work on trust management [1] had as its goal separation of security and trust [3]. The benefit of the separation is allowing individual systems to have different trust policies, separate from the common, global authentication and security system. Rasmusson and Janssen [11] identified two approaches to security: hard security and soft security. Hard security is used to traditional security