A Bio-inspired trusted clustering for mobile pervasive environment

MS Gaur, B Pant - Proceedings of the Third International Conference on …, 2014 - Springer
Proceedings of the Third International Conference on Soft Computing for …, 2014Springer
Pervasive systems are usually highly dynamic, heterogeneous, and resource-restricted
where small and powerful dissimilar devices have to establish independent network
unknown by the user. There is no fixed infrastructure and centralized access control. The set
of connections relies on the convergence of wireless technologies, advanced electronics
and the Internet to communicate seamlessly with other devices as tiny sensors. Trusted and
Security-critical communication is the key concern in such decentralized and unpredictable …
Abstract
Pervasive systems are usually highly dynamic, heterogeneous, and resource-restricted where small and powerful dissimilar devices have to establish independent network unknown by the user. There is no fixed infrastructure and centralized access control. The set of connections relies on the convergence of wireless technologies, advanced electronics and the Internet to communicate seamlessly with other devices as tiny sensors. Trusted and Security-critical communication is the key concern in such decentralized and unpredictable environment. Bio-Inspired systems are increasing significant adaptation, reliability and strength in the dynamic and heterogeneous networks where information is ubiquitous. Some specific characteristics of swarms, like their lightweight, transient nature and indirect communication, make this adaptation more demanding. In this paper we explore bio-Inspired systems to look at the trust computation factors and opportunities in autonomic computing environments like mobile pervasive environment and evaluate their trustworthiness. We use standard clustering technique and propose a trust metric in which we observe the node behavior through various trust parameters. In winding up, we put our efforts to represent the cluster formation with honey bee mating to set up general vulnerabilities requirements for compromised node behavior to the system under exploration.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果