Authors: Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
Addresses: Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200030, PR China; Institute for Infocomm Research, 21 Heng Mui Keng Terrace, Singapore 119613. ' Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK. ' Institute for Infocomm Research, 21 Heng Mui Keng Terrace, Singapore 119613. ' Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200030, PR China
Abstract: Pervasive computing, as a concept, holds the promise of simplifying daily life by integrating mobile devices and digital infrastructures into our physical world. Computers would invisibly integrate themselves into background environments, providing useful services to users, as well as contextual information as to their surroundings. Devices would be able to establish dynamic ad hoc networks to provide ubiquitous services. However, the open and dynamic characteristics of pervasive computing environments necessitate the requirements for some form of trust assumptions to be made. Trusted Computing as a component of devices that themselves hold the promise of ubiquity may be used as a means of bootstrapping such trust assumptions. In this paper, we propose a trust enforced pervasive computing environment using the primitives provided by a TPM. We present an application scenario that shows how services and data of critical information infrastructure can be protected.
Keywords: pervasive computing; trusted computing; trust management; critical information infrastructures; critical infrastructures.
International Journal of System of Systems Engineering, 2008 Vol.1 No.1/2, pp.96 - 110
Published online: 02 May 2008 *Full-text access for editors Access for subscribers Purchase this article Comment on this article