IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Trust Models for Ubiquitous Mobile Systems

Trust Models for Ubiquitous Mobile Systems
View Sample PDF
Author(s): Mike Burmester (Florida State University, USA)
Copyright: 2009
Pages: 7
Source title: Selected Readings on Telecommunications and Networking
Source Author(s)/Editor(s): Jairo Gutierrez (University of Auckland, NZ)
DOI: 10.4018/978-1-60566-094-3.ch026

Purchase

View Trust Models for Ubiquitous Mobile Systems on the publisher's website for pricing and purchasing information.

Abstract

This chapter introduces the notion of trust as a means to establish security in ubiquitous mobile network systems. It argues that trust is an essential requirement to enable security in any open network environments, and in particular, in wireless ad hoc environments where there is no network topology. In such environments, communication can only be achieved via routes that have to be trusted. In general it may be hard, or even impossible, to establish, recall, and maintain trust relationships. It is therefore important to understand the limitations of such environments and to find mechanisms that may support trust either explicitly or implicitly. We consider several models that can be used to enable trust in such environments, based on economic, insurance, information flow, and evolutionary paradigms.

Related Content

Aditi Nag. © 2025. 38 pages.
Kapil Sharma, Nikhil Singh. © 2025. 26 pages.
Kapil Sharma, Rachna Kathuria. © 2025. 14 pages.
Sorabh Gupta, Mitu Sehgal, Rashmi Makkar, Alla Poorna Chandra Reddy, Habib Khan. © 2025. 34 pages.
Yogeshwar Prajapati, Krupali Gosai, Omprakash Suthar, Sushil Kumar Singh, Muhammad Talha Usman, Habib Khan. © 2025. 24 pages.
Aditi Nag, Anurag Singh Rathore. © 2025. 38 pages.
Vishal Jain, Archan Mitra. © 2025. 24 pages.
Body Bottom