Madhu Sharma Gaur

Work place: G. L. Bajaj Inst. of Tech & Mgmt. Greater Noida

E-mail: madhu14nov@gmail.com

Website:

Research Interests: Computing Platform, Mathematics of Computing

Biography

Mrs. Madhu S. Gaur is MCA, M.Tech. and Persuing P.hD. from Graphic Era University, Dehradun, Uttranchal, India and working as Associate prof. at G.L. Bajaj Intitute of Technology & Management, Greater Noida, UP India. She is serving IT industry as trainer academician and researcher from last 16+ years. Her areas of interest include Object Oriented Systems, .Net Technology and Trust Management and security in mobile computing environment.

Author Articles
Trust Metric based Soft Security in Mobile Pervasive Environment

By Madhu Sharma Gaur Bhaskar Pant

DOI: https://doi.org/10.5815/ijcnis.2014.10.08, Pub. Date: 8 Sep. 2014

In the decentralized and highly dynamic environment like Mobile Pervasive Environments (MPE) trust and security measurement are two major challenging issues for community researchers. So far primarily many of architectural frameworks and models developed and being used. In the vision of pervasive computing where mobile applications are growing immensely with the potential of low cost, high performance, and user centric solutions. This paradigm is highly dynamic and heterogeneous and brings along trust and security challenges regarding vulnerabilities and threats due to inherent open connectivity. Despite advances in the technology, there is still a lack of methods to measure the security and level of trust and framework for the assessment and calculation of the degree of the trustworthiness. In this paper, we explore security and trust metrics concerns requirement and challenges to decide the trust computations metric parameters for a self-adaptive self-monitoring trust based security assurance in mobile pervasive environment. The objective is to identify the trust parameters while routing and determine the node behavior for soft security trust metric. In winding up, we put our efforts to set up security assurance model to deal with attacks and vulnerabilities requirements of system under exploration.

[...] Read more.
Other Articles