Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Trust Models for Ubiquitous Mobile Systems

Trust Models for Ubiquitous Mobile Systems
View Sample PDF
Author(s): Mike Burmester (Florida State University, USA)
Copyright: 2009
Pages: 6
Source title: Mobile Computing: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): David Taniar (Monash University, Australia)
DOI: 10.4018/978-1-60566-054-7.ch213


View Trust Models for Ubiquitous Mobile Systems on the publisher's website for pricing and purchasing information.


This chapter introduces the notion of trust as a means to establish security in ubiquitous mobile network systems. It argues that trust is an essential requirement to enable security in any open network environments, and in particular, in wireless ad hoc environments where there is no network topology. In such environments, communication can only be achieved via routes that have to be trusted. In general it may be hard, or even impossible, to establish, recall, and maintain trust relationships. It is therefore important to understand the limitations of such environments and to find mechanisms that may support trust either explicitly or implicitly. We consider several models that can be used to enable trust in such environments, based on economic, insurance, information flow, and evolutionary paradigms.

Related Content

Aysu AltaƟ. © 2022. 23 pages.
Anusha Thakur. © 2022. 20 pages.
Yigit Yurder, Mehmet Altug Sahin. © 2022. 28 pages.
Anusha Thakur. © 2022. 26 pages.
Ali Yuce. © 2022. 22 pages.
Khouloud Mouihbi, Nedra Bahri-Ammari, Daouda Coulibaly. © 2022. 25 pages.
Anusha Thakur. © 2022. 17 pages.
Body Bottom