z-logo
Premium
An integrated scheme based on service classification in pervasive mobile services
Author(s) -
Liu Yang,
Chen Zhikui,
Xia Feng,
Lv Xiaoning,
Bu Fanyu
Publication year - 2012
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.2330
Subject(s) - computer science , computer security , authentication (law) , service (business) , service provider , the internet , internet privacy , scheme (mathematics) , computer network , world wide web , business , mathematical analysis , mathematics , marketing
SUMMARY Internet of Things and broadband communication are promoting the pervasive mobile services with their advanced features. However, security problems baffled the development. This paper proposes a trust model to protect the user's security. The billing or trust operator works as an agent to provide a trust authentication for all the service providers. The services are classified by sensitive value calculation. With the combined location‐aware and identity‐aware information and authentication history, the user's trustiness for corresponding service can be obtained. For decision, three trust regions are divided and referred to three ranks as follows: high, medium and low. The trust region tells the customer which authentication methods should be used for access. Penalty coefficient is also involved for forbidding force‐crack. Copyright © 2012 John Wiley & Sons, Ltd.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here