Enforcing Trust in Pervasive Computing with Trusted Computing Technology

  • Shiqun Li
  • Shane Balfe
  • Jianying Zhou
  • Kefei Chen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4347)


Pervasive computing as a concept holds the promise of simplifying daily life by integrating mobile devices and digital infrastructures into our physical world. These devices in a pervasive environment would establish dynamic ad-hoc networks to provide ubiquitous services. The open and dynamic characteristics of pervasive environments necessitate the requirement for some form of trust assumptions to be made. Trust in this context not only includes authentication, confidentiality and privacy but also includes the belief that the devices and smart environment behave as expected. In this paper, we propose a trust enforced pervasive computing environment using the primitives provided by a TPM (Trusted Platform Module). The application scenario shows how critical information infrastructure such as services and data can be protected. In this smart environment, a person carrying a device authenticates to the environment in order to utilize its services. In this context the device and the smart environment can also test and check each other’s behaviors to better perform trust negotiation.


Pervasive Computing Trust Platform Module Smart Environment Trust Computing Smart Space 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: NSPW 1997: Proceedings of the 1997 Workshop on New Security Paradigms, pp. 48–60. ACM Press, New York (1997)CrossRefGoogle Scholar
  2. 2.
    Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: HICSS 2000: Proceedings of the 33rd Hawaii International Conference on System Sciences, Washington, DC, USA, vol. 6, p. 6007. IEEE Computer Society, Los Alamitos (2000)Google Scholar
  3. 3.
    Abele-Wigert, I., Dunn, M.: International CIIP Handbook 2006, vol. II. Center for Security Studies, ETH Zurich (2006)Google Scholar
  4. 4.
    Almenßrez, F., Marn, A., Campo, C., Garcia, C.: Ptm: A pervasive trust management model for dynamic open environments. In: PSPT 2004: Proceedings of the 1st Workshop on Pervasive Security, Privacy and Trust in conjuntion with Mobiquitous 2004 (2004)Google Scholar
  5. 5.
    Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J., Rutenbar, P.: Device-enabled authorization in the grey system. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 431–445. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 3–18. Springer, Heidelberg (1994)Google Scholar
  7. 7.
    Blaze, M., Feigenbaum, J., Ioannidisand, J., Keromytis, A.D.: The keynote trust-management system, version 2 (1999)Google Scholar
  8. 8.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: SP 1996: Proceedings of the 1996 IEEE Symposium on Security and Privacy, p. 164. IEEE Computer Society, Los Alamitos (1996)CrossRefGoogle Scholar
  9. 9.
    Blaze, M., Feigenbaum, J., Keromytis, A.D.: Keynote: Trust management for public-key infrastructures (position paper). In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 59–63. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  10. 10.
    Gray, E., O’Connell, P., Jensen, C., Weber, S., Seigneur, J., Yong, C.: Towards a framework for assessing trust-based admission control in collaborative ad hoc applications (2002)Google Scholar
  11. 11.
    Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: A virtual machine directed approach to trusted computing. In: USENIX Virtual Machine Research and Technology Symposium (May 2004)Google Scholar
  12. 12.
    IETF. Simple public key infrastructure (SPKI) (February 2001)Google Scholar
  13. 13.
    Jøsang, A.: The right type of trust for distributed systems. In: NSPW 1996: Proceedings of the 1996 Workshop on New Security Paradigms, pp. 119–131. ACM Press, New York (1996)CrossRefGoogle Scholar
  14. 14.
    Jøsang, A.: An algebra for assessing trust in certification chains. In: NDSS 1999: Proceedings of the Network and Distributed Systems Security (1999)Google Scholar
  15. 15.
    Jøsang, A., Knapskog, S.: A metric for trusted systems. In: Proceedings of the 21st National Security Conference, pp. 16–29 (1998)Google Scholar
  16. 16.
    Klein, B., Yahalom, R., Beth, T.: Trust relationships in secure systems - a distributed authentication perspective. In: RSP: IEEE Computer Society Symposium on Research in Security and Privacy (1993)Google Scholar
  17. 17.
    Marsh, S.: Formalising trust as a computational concept (1994)Google Scholar
  18. 18.
    Harrison McKnight, D., Chervany, N.L.: Trust and distrust definitions: One bite at a time. In: Trust in Cyber-societites, Integrating the Human and Artificial Perspectives, London, UK, pp. 27–54. Springer, Heidelberg (2000)Google Scholar
  19. 19.
    Neumann, P.G.: Architectures and formal representations for secure systems. Technical report (June 1996)Google Scholar
  20. 20.
    Sadeghi, A.-R., Christian, S.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: NSPW 2004: Proceedings of the 2004 Workshop on New Security Paradigms, pp. 67–77. ACM Press, New York (2004)Google Scholar
  21. 21.
    Samarati, P., De Capitani di Vimercati, S.: Access control: Policies, models, and mechanisms. In: FOSAD 2000: Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design, London, UK, pp. 137–196. Springer, Heidelberg (2000)Google Scholar
  22. 22.
    Shand, B., Dimmock, N., Bacon, J.: Trust for ubiquitous, transparent collaboration. Wirel. Netw. 10(6), 711–721 (2004)CrossRefGoogle Scholar
  23. 23.
    Trusted Computing Group. TCG Infrastructure Workgroup Subject Key Attestation Evidence Extension, 1st edn. (June 2005)Google Scholar
  24. 24.
    Trusted Computing Group. TPM Main: Part 1 Design Principles, 1.2 edn. (2005)Google Scholar
  25. 25.
    Trusted Computing Group. TPM Main: Part 3 Commands (2005)Google Scholar
  26. 26.
    Zimmermann, P.: PGP source code and internals. MIT Press, Cambridge (1995)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Shiqun Li
    • 1
    • 2
  • Shane Balfe
    • 2
    • 3
  • Jianying Zhou
    • 2
  • Kefei Chen
    • 1
  1. 1.Dept. of Computer Science and EngineeringShanghai Jiaotong UniversityShanghaiChina
  2. 2.Institute for Infocomm ResearchSingapore
  3. 3.Royal HollowayUniversity of LondonEgham, SurreyUnited Kingdom

Personalised recommendations