Abstract

AbstractPervasive computing has the potential to offer low-cost, high performance, and user centric solutions to exchange the information and communicate seamlessly in highly dynamic, heterogeneous environment. Here small and influential dissimilar devices or nodes have to set up independent network unknown by the user. Communicating devices are resource-restricted and equipped with micro or bio-sensors to acknowledge the signals where traditional security systems based on cryptography and encryption are not enough for promising level of security assurance. In this paper we explore trust and security challenges and appraise the opportunities in autonomous mobile pervasive ad-hoc networks to improve security. Trust management models in human-centric applications can enhance the security assurance. Many researchers proposed various trust models for different scenarios. Inspiring from such models we propose a trust computation metric based on node’s impulsive behavior to become malicious node in dynamic scenario and breach the security. In winding up, we put our efforts to present energy efficient, secure and trusted clustering to enhance the security assurance and significant adaptation of trustworthy communication in user-centric m-healthcare applications where information is ubiquitous.

Highlights

  • The vision of Pervasive computing has the potential to offer low-cost, high performance, and user centric solutions to exchange the information and communicate seamlessly in highly dynamic, heterogeneous environment where small and influential dissimilar devices or nodes have to set up independent network unknown by the user

  • The algorithm initially assumes that each sensor in the network may become a cluster head with probability 1 or 0 where nodes make autonomous decisions without any centralized control to measure the trustworthiness of the node, life time and extended security

  • Security extension pervasive m‐healthcare: a case study Security settings competes with node mobility and assigned corresponding fitness factors that may not be optimal for securing the packets due to battery conditions that activates until all objectives reach an acceptable convergence for cluster head node selection, path selection, energy and mobility estimation are the dynamic processes that repeats over the subjective search space

Read more

Summary

Introduction

The vision of Pervasive computing has the potential to offer low-cost, high performance, and user centric solutions to exchange the information and communicate seamlessly in highly dynamic, heterogeneous environment where small and influential dissimilar devices or nodes have to set up independent network unknown by the user. Inspiring from such models we propose a trust computation metric based on node’s impulsive behavior to become malicious node Trust in human notion used in the highly dynamic and heterogeneous networks like mobile pervasive where information is ubiquitous tiny of micro-sensor nodes can estimate, update, and store the trustworthiness of other nodes based on the trust model.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call