全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
Sensors  2012 

An Integrative Architecture for a Sensor-Supported Trust Management System

DOI: 10.3390/s120810774

Keywords: sensors, trust management, human agents, modeling and simulation, multidisciplinary research

Full-Text   Cite this paper   Add to My Lib

Abstract:

Trust plays a key role not only in e-worlds and emerging pervasive computing environments, but also already for millennia in human societies. Trust management solutions that have being around now for some fifteen years were primarily developed for the above mentioned cyber environments and they are typically focused on artificial agents, sensors, etc. However, this paper presents extensions of a new methodology together with architecture for trust management support that is focused on humans and human-like agents. With this methodology and architecture sensors play a crucial role. The architecture presents an already deployable tool for multi and interdisciplinary research in various areas where humans are involved. It provides new ways to obtain an insight into dynamics and evolution of such structures, not only in pervasive computing environments, but also in other important areas like management and decision making support.

References

[1]  Reding, V. The Need for A New Impetus to the European ICT R & I Agenda. Proceeding of International High Level Research Seminar on “Trust in the Net”, Vienna, Austria, March 2006.
[2]  NFC Forum. NFC Activity Specification, NFCForum-TS-Activity-1.0; Edgewater, CO, USA, 2010.
[3]  Philips. THE I2C-BUS SPECIFICATION. v 2.1, 2000. Available online: http://www.nxp.com/acrobat_download/literature/9398/39340011.pdf (accessed on 4 May 2011).
[4]  Motorola.. SPI Block Guide. V 3.06 2003. Available online: http://www.ee.nmt.edu/~teare/ee308l/datasheets/S12SPIV3.pdf (last accessed on 4 May 2012).
[5]  IEEE Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Data Rate Wireless Personal Area Networks (WPAN), IEEE Standard 802.15.4; IEEE: Piscataway, NJ, USA, 2006.
[6]  Rodrigues, J.J.P.C.; Neves, P.A.C.S. A survey on IP-based wireless sensor network solutions. Int. J. Commun. Syst. 2010, 23, 963–998.
[7]  Saleem, S.; Ullah, S.; Kyung, S.K. A study of IEEE 802.15.4 security framework for wireless body area networks. Sensors 2011, 11, 1383–1395.
[8]  Kumar, P.; Lee, K.J. Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors 2012, 12, 55–91.
[9]  Piaget, J. Judgment and Reasoning in the Child; Routledge: London, UK, 1999.
[10]  Tr?ek, D. Towards trust management standardization. Comput. Stand. Interfaces 2004, 26, 543–548.
[11]  Tr?ek, D. Trust Management Methodologies for the Web. Proceeding of the 7th International Conference on Reasoning Web, LNCS 6848, Galway, Ireland; 2011.
[12]  J?sang, A.; Ismail, R.; Boyd, C. A survey of trust and reputation systems for online service provision. Decis. Support. Syst. 2007, 43, 618–644.
[13]  J?sang, A. A logic for uncertain probabilities. IJUFKS 2001, 9, 279–311.
[14]  Tennenholtz, M. Game-Theoretic Recommendations: Some Progress in an Uphill Battle. Proceedings of the Seventh International Conference on Autonomous Agents and Multi Agent Systems, Estoril, Portugal, 12–16 May 2008; pp. 10–16.
[15]  Feng, R.; Xu, X.; Zhou, X.; Wan, J. A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory. Sensors 2011, 11, 1345–1360.
[16]  Momani, M.; Chala, S. Trust Management in Wireless Sensor Networks. Proceedings of the 5th ACM Conference on Embedded Networked Sensor Systems, Sydney, Australia, 6–9 November 2007.
[17]  Moya, J.M.; Vallejo, J.C.; Fraga, D.; Araujo, A.; Villanueva, D.; de Goyeneche, J-M. Using reputation systems and non-deterministic routing to secure wireless sensor networks. Sensors 2009, 9, 3958–3980.
[18]  Xu, X.; Gao, X.; Xiong, N. Trust index based fault tolerant multiple event localization algorithm for WSNs. Sensors 2011, 11, 6555–6574.
[19]  Pessoa, L. On the relationship between emotion and cognition. Nat. Rev. Neurosci. 2008, 9, 148–158.
[20]  Nunez, P.L.; Srinivasan, R. Electric Fields of the Brain: The Neurophysics of EEG; Oxford University Press: Oxford, UK, 1981.
[21]  Buxton, R.B. Introduction to Functional Magnetic Resonance Imaging: Principles and Techniques; Cambridge University Press: Cambridge, UK, 2002.
[22]  Madsen, P.L.; Secher, N.H. Near infrared oximetry of the brain. Progr. Neurobiol. 1999, 58, 541–560.
[23]  Abrams, S. The Complete Polygraph Handbook; Lexington Books: Lexington, KY, USA, 1989.
[24]  Federal Psycho-physiological Detection of Deception Examiner Handbook-Counterintelligence Field Activity Technical Manual; Department of Defense: Washington, DC, USA, 2006.
[25]  International Standards Organization. Information Processing Systems-Open Systems Interconnection-Basic Reference Model, Security Architecture, Part 2; ISO: Geneva, Switzerland, 1989; pp. 7498–2.
[26]  Kent, S. Security Architecture for the Internet Protocol. IETF RFC 1825 1998.
[27]  Dailey, M.N.; Cottrell, G.W.; Padgett, C.; Adolphs, R. EMPATH: A neural network that categorizes facial expressions. J. Cogn. Neurosci. 2002, 8, 1158–1173.
[28]  Hess, E.H. The role of pupil size in communication. Sci. Am. 1975, 5, 110–119.
[29]  Hess, E.H.; How, Your; Eyes, Tell. Hidden Thoughts. In The Tell-Tale Eye; van Nostrand Reinhold: New York, NY, USA, 1975.
[30]  Koch, R.; Dreo, G. Fast learning neural network intrusion detection system. Lect. Notes Comput. Sci. 2009, 5637, 187–190.
[31]  Marinho, J.; Monteiro, E. Cognitive radio: Survey on communication protocols, spectrum decision issues, and future research directions. Wirel. Netw. 2012, 18, 147–164.
[32]  Iacono, W.G. Forensic ‘Lie Detection’: Procedures without scientific basis. J. Forensic Psychol. Pract. 2001, 1, 75–86.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133