Loading…

m-LPN: an approach towards a dependable trust model for pervasive computing applications

Trust, the fundamental basis of `cooperation' - one of the most important characteristics for the performance of pervasive ad hoc network - is under serious threat with the emergence of counterfeiting and malicious activity. Several constraints exist in the pervasive computing environment such...

Full description

Saved in:
Bibliographic Details
Main Authors: Haque, M.M., Ahamed, S.I.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 195
container_issue
container_start_page 7 pp.
container_title
container_volume
creator Haque, M.M.
Ahamed, S.I.
description Trust, the fundamental basis of `cooperation' - one of the most important characteristics for the performance of pervasive ad hoc network - is under serious threat with the emergence of counterfeiting and malicious activity. Several constraints exist in the pervasive computing environment such as a device's memory, battery power and computational capability. This results in a high degree of dependence on other devices within the network to provide services. Along with this is the lack of a secure communication medium which invites both active and passive eavesdroppers. In order to restrict the participation of malicious devices, we propose a trust model which is actually a modified form of the well known LPN (learning parity with noise) based Hopper-Blum (N. Hopper and M. Blum, 2000) protocol. Our new refined model has been named as m-LPN (modified learning parity with noise) which is presented in this paper along with an illustrative example
doi_str_mv 10.1109/ICPPW.2006.44
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1690701</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1690701</ieee_id><sourcerecordid>1690701</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-63da1ccf3f7861ed1038422457a747a9273f73a3a0ff8d24887e1a62762614403</originalsourceid><addsrcrecordid>eNotkLlOAzEUAC0OiRBSUtH4Bza8Z3t90KGII1IEKUDQRY-1F4z2kr0J4u8JgmqKkaYYxs4R5ojgLpeL9fplLgD0XKkDNhFSiqLUDg7ZzBkLRrtSaGncEZsAOiikQ3vCTnP-BBAgSzVhr22xWj9cceo4DUPqqfrgY_9FyWdO3IchdJ7emsDHtM0jb3sfGl73iQ8h7SjHXeBV3w7bMXbvv4UmVjTGvstn7LimJofZP6fs-fbmaXFfrB7vlovrVRHRlGOhpSesqlrWxmoMHkFaJYQqDRllyAmzN5IkQV1bL5S1JiBpYbTQqBTIKbv468YQwmZIsaX0vcH9BQMofwCE2lKH</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>m-LPN: an approach towards a dependable trust model for pervasive computing applications</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Haque, M.M. ; Ahamed, S.I.</creator><creatorcontrib>Haque, M.M. ; Ahamed, S.I.</creatorcontrib><description>Trust, the fundamental basis of `cooperation' - one of the most important characteristics for the performance of pervasive ad hoc network - is under serious threat with the emergence of counterfeiting and malicious activity. Several constraints exist in the pervasive computing environment such as a device's memory, battery power and computational capability. This results in a high degree of dependence on other devices within the network to provide services. Along with this is the lack of a secure communication medium which invites both active and passive eavesdroppers. In order to restrict the participation of malicious devices, we propose a trust model which is actually a modified form of the well known LPN (learning parity with noise) based Hopper-Blum (N. Hopper and M. Blum, 2000) protocol. Our new refined model has been named as m-LPN (modified learning parity with noise) which is presented in this paper along with an illustrative example</description><identifier>ISSN: 0190-3918</identifier><identifier>ISBN: 9780769526379</identifier><identifier>ISBN: 0769526373</identifier><identifier>EISSN: 2332-5690</identifier><identifier>DOI: 10.1109/ICPPW.2006.44</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; Authentication ; Availability ; Batteries ; Costs ; Counterfeiting ; Monitoring ; Personal digital assistants ; Pervasive computing ; Protocols</subject><ispartof>2006 International Conference on Parallel Processing Workshops (ICPPW'06), 2006, p.7 pp.-195</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1690701$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1690701$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Haque, M.M.</creatorcontrib><creatorcontrib>Ahamed, S.I.</creatorcontrib><title>m-LPN: an approach towards a dependable trust model for pervasive computing applications</title><title>2006 International Conference on Parallel Processing Workshops (ICPPW'06)</title><addtitle>ICPPW</addtitle><description>Trust, the fundamental basis of `cooperation' - one of the most important characteristics for the performance of pervasive ad hoc network - is under serious threat with the emergence of counterfeiting and malicious activity. Several constraints exist in the pervasive computing environment such as a device's memory, battery power and computational capability. This results in a high degree of dependence on other devices within the network to provide services. Along with this is the lack of a secure communication medium which invites both active and passive eavesdroppers. In order to restrict the participation of malicious devices, we propose a trust model which is actually a modified form of the well known LPN (learning parity with noise) based Hopper-Blum (N. Hopper and M. Blum, 2000) protocol. Our new refined model has been named as m-LPN (modified learning parity with noise) which is presented in this paper along with an illustrative example</description><subject>Ad hoc networks</subject><subject>Authentication</subject><subject>Availability</subject><subject>Batteries</subject><subject>Costs</subject><subject>Counterfeiting</subject><subject>Monitoring</subject><subject>Personal digital assistants</subject><subject>Pervasive computing</subject><subject>Protocols</subject><issn>0190-3918</issn><issn>2332-5690</issn><isbn>9780769526379</isbn><isbn>0769526373</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkLlOAzEUAC0OiRBSUtH4Bza8Z3t90KGII1IEKUDQRY-1F4z2kr0J4u8JgmqKkaYYxs4R5ojgLpeL9fplLgD0XKkDNhFSiqLUDg7ZzBkLRrtSaGncEZsAOiikQ3vCTnP-BBAgSzVhr22xWj9cceo4DUPqqfrgY_9FyWdO3IchdJ7emsDHtM0jb3sfGl73iQ8h7SjHXeBV3w7bMXbvv4UmVjTGvstn7LimJofZP6fs-fbmaXFfrB7vlovrVRHRlGOhpSesqlrWxmoMHkFaJYQqDRllyAmzN5IkQV1bL5S1JiBpYbTQqBTIKbv468YQwmZIsaX0vcH9BQMofwCE2lKH</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Haque, M.M.</creator><creator>Ahamed, S.I.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2006</creationdate><title>m-LPN: an approach towards a dependable trust model for pervasive computing applications</title><author>Haque, M.M. ; Ahamed, S.I.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-63da1ccf3f7861ed1038422457a747a9273f73a3a0ff8d24887e1a62762614403</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Ad hoc networks</topic><topic>Authentication</topic><topic>Availability</topic><topic>Batteries</topic><topic>Costs</topic><topic>Counterfeiting</topic><topic>Monitoring</topic><topic>Personal digital assistants</topic><topic>Pervasive computing</topic><topic>Protocols</topic><toplevel>online_resources</toplevel><creatorcontrib>Haque, M.M.</creatorcontrib><creatorcontrib>Ahamed, S.I.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Haque, M.M.</au><au>Ahamed, S.I.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>m-LPN: an approach towards a dependable trust model for pervasive computing applications</atitle><btitle>2006 International Conference on Parallel Processing Workshops (ICPPW'06)</btitle><stitle>ICPPW</stitle><date>2006</date><risdate>2006</risdate><spage>7 pp.</spage><epage>195</epage><pages>7 pp.-195</pages><issn>0190-3918</issn><eissn>2332-5690</eissn><isbn>9780769526379</isbn><isbn>0769526373</isbn><abstract>Trust, the fundamental basis of `cooperation' - one of the most important characteristics for the performance of pervasive ad hoc network - is under serious threat with the emergence of counterfeiting and malicious activity. Several constraints exist in the pervasive computing environment such as a device's memory, battery power and computational capability. This results in a high degree of dependence on other devices within the network to provide services. Along with this is the lack of a secure communication medium which invites both active and passive eavesdroppers. In order to restrict the participation of malicious devices, we propose a trust model which is actually a modified form of the well known LPN (learning parity with noise) based Hopper-Blum (N. Hopper and M. Blum, 2000) protocol. Our new refined model has been named as m-LPN (modified learning parity with noise) which is presented in this paper along with an illustrative example</abstract><pub>IEEE</pub><doi>10.1109/ICPPW.2006.44</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0190-3918
ispartof 2006 International Conference on Parallel Processing Workshops (ICPPW'06), 2006, p.7 pp.-195
issn 0190-3918
2332-5690
language eng
recordid cdi_ieee_primary_1690701
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Ad hoc networks
Authentication
Availability
Batteries
Costs
Counterfeiting
Monitoring
Personal digital assistants
Pervasive computing
Protocols
title m-LPN: an approach towards a dependable trust model for pervasive computing applications
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T20%3A16%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=m-LPN:%20an%20approach%20towards%20a%20dependable%20trust%20model%20for%20pervasive%20computing%20applications&rft.btitle=2006%20International%20Conference%20on%20Parallel%20Processing%20Workshops%20(ICPPW'06)&rft.au=Haque,%20M.M.&rft.date=2006&rft.spage=7%20pp.&rft.epage=195&rft.pages=7%20pp.-195&rft.issn=0190-3918&rft.eissn=2332-5690&rft.isbn=9780769526379&rft.isbn_list=0769526373&rft_id=info:doi/10.1109/ICPPW.2006.44&rft_dat=%3Cieee_6IE%3E1690701%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-63da1ccf3f7861ed1038422457a747a9273f73a3a0ff8d24887e1a62762614403%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1690701&rfr_iscdi=true