Author:
Gaur Madhu Sharma,Pant Bhaskar
Abstract
AbstractPervasive computing has the potential to offer low-cost, high performance, and user centric solutions to exchange the information and communicate seamlessly in highly dynamic, heterogeneous environment. Here small and influential dissimilar devices or nodes have to set up independent network unknown by the user. Communicating devices are resource-restricted and equipped with micro or bio-sensors to acknowledge the signals where traditional security systems based on cryptography and encryption are not enough for promising level of security assurance. In this paper we explore trust and security challenges and appraise the opportunities in autonomous mobile pervasive ad-hoc networks to improve security. Trust management models in human-centric applications can enhance the security assurance. Many researchers proposed various trust models for different scenarios. Inspiring from such models we propose a trust computation metric based on node’s impulsive behavior to become malicious node in dynamic scenario and breach the security. In winding up, we put our efforts to present energy efficient, secure and trusted clustering to enhance the security assurance and significant adaptation of trustworthy communication in user-centric m-healthcare applications where information is ubiquitous.
Publisher
Springer Science and Business Media LLC
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Helping Hand Platform for the Students to Provide Multiple Services: Using Web Development;2023 International Conference on Computer Science and Emerging Technologies (CSET);2023-10-10
2. Exploratory Data Analysis and Customer Churn Prediction for the Telecommunication Industry;2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS);2023-05-18
3. Education 4.0: Exploring the Potential of Disruptive Technologies in Transforming Learning;2023 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES);2023-04-28
4. Need of Trusted Security for Sustainability of IoT-BIG Data Application Deployments;2023 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES);2023-04-28
5. Security Risk Analysis and Design Reengineering for Smart Healthcare;Lecture Notes in Electrical Engineering;2022