Trust-based authentication scheme with user rating for low-resource devices in smart environments. El Husseini, A., M'Hamed, A., El Hassan, B., & Mokhtari, M. Personal and Ubiquitous Computing, 17(5):1-11, Springer, 5, 2012. Website abstract bibtex In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.
@article{
title = {Trust-based authentication scheme with user rating for low-resource devices in smart environments},
type = {article},
year = {2012},
identifiers = {[object Object]},
keywords = {authentication,privacy,security,trust},
pages = {1-11},
volume = {17},
websites = {http://dx.doi.org/10.1007/s00779-012-0548-8},
month = {5},
publisher = {Springer},
id = {1b5678f5-9c7a-39c2-8a3f-b123e1a1feba},
created = {2018-07-12T21:31:07.696Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:31:07.696Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {husseini:trust},
source_type = {article},
private_publication = {false},
abstract = {In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.},
bibtype = {article},
author = {El Husseini, Anas and M'Hamed, Abdallah and El Hassan, Bachar and Mokhtari, Mounir},
journal = {Personal and Ubiquitous Computing},
number = {5}
}
Downloads: 0
{"_id":"qG97vjBDPfjoqKS7f","bibbaseid":"elhusseini-mhamed-elhassan-mokhtari-trustbasedauthenticationschemewithuserratingforlowresourcedevicesinsmartenvironments-2012","downloads":0,"creationDate":"2019-02-15T15:14:58.263Z","title":"Trust-based authentication scheme with user rating for low-resource devices in smart environments","author_short":["El Husseini, A.","M'Hamed, A.","El Hassan, B.","Mokhtari, M."],"year":2012,"bibtype":"article","biburl":null,"bibdata":{"title":"Trust-based authentication scheme with user rating for low-resource devices in smart environments","type":"article","year":"2012","identifiers":"[object Object]","keywords":"authentication,privacy,security,trust","pages":"1-11","volume":"17","websites":"http://dx.doi.org/10.1007/s00779-012-0548-8","month":"5","publisher":"Springer","id":"1b5678f5-9c7a-39c2-8a3f-b123e1a1feba","created":"2018-07-12T21:31:07.696Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:31:07.696Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"husseini:trust","source_type":"article","private_publication":false,"abstract":"In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.","bibtype":"article","author":"El Husseini, Anas and M'Hamed, Abdallah and El Hassan, Bachar and Mokhtari, Mounir","journal":"Personal and Ubiquitous Computing","number":"5","bibtex":"@article{\n title = {Trust-based authentication scheme with user rating for low-resource devices in smart environments},\n type = {article},\n year = {2012},\n identifiers = {[object Object]},\n keywords = {authentication,privacy,security,trust},\n pages = {1-11},\n volume = {17},\n websites = {http://dx.doi.org/10.1007/s00779-012-0548-8},\n month = {5},\n publisher = {Springer},\n id = {1b5678f5-9c7a-39c2-8a3f-b123e1a1feba},\n created = {2018-07-12T21:31:07.696Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:31:07.696Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {husseini:trust},\n source_type = {article},\n private_publication = {false},\n abstract = {In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.},\n bibtype = {article},\n author = {El Husseini, Anas and M'Hamed, Abdallah and El Hassan, Bachar and Mokhtari, Mounir},\n journal = {Personal and Ubiquitous Computing},\n number = {5}\n}","author_short":["El Husseini, A.","M'Hamed, A.","El Hassan, B.","Mokhtari, M."],"urls":{"Website":"http://dx.doi.org/10.1007/s00779-012-0548-8"},"bibbaseid":"elhusseini-mhamed-elhassan-mokhtari-trustbasedauthenticationschemewithuserratingforlowresourcedevicesinsmartenvironments-2012","role":"author","keyword":["authentication","privacy","security","trust"],"downloads":0},"search_terms":["trust","based","authentication","scheme","user","rating","low","resource","devices","smart","environments","el husseini","m'hamed","el hassan","mokhtari"],"keywords":["authentication","privacy","security","trust"],"authorIDs":[]}