Match!

A survey on trust management for Internet of Things

Published on Jun 1, 2014in Journal of Network and Computer Applications5.27
· DOI :10.1016/j.jnca.2014.01.014
Zheng Yan19
Estimated H-index: 19
(Aalto University),
Peng Zhang1
Estimated H-index: 1
,
Athanasios V. Vasilakos76
Estimated H-index: 76
(Kuniv: Kuwait University)
Cite
Abstract
Internet of Things (IoT) is going to create a world where physical objects are seamlessly integrated into information networks in order to provide advanced and intelligent services for human-beings. Trust management plays an important role in IoT for reliable data fusion and mining, qualified services with context-awareness, and enhanced user privacy and information security. It helps people overcome perceptions of uncertainty and risk and engages in user acceptance and consumption on IoT services and applications. However, current literature still lacks a comprehensive study on trust management in IoT. In this paper, we investigate the properties of trust, propose objectives of IoT trust management, and provide a survey on the current literature advances towards trustworthy IoT. Furthermore, we discuss unsolved issues, specify research challenges and indicate future research trends by proposing a research model for holistic trust management in IoT.
  • References (144)
  • Citations (365)
Cite
References144
Newest
Published on Dec 1, 2013in IEEE Wireless Communications11.00
Zhengguo Sheng14
Estimated H-index: 14
,
Shusen Yang13
Estimated H-index: 13
(Imperial College London)
+ 3 AuthorsKin K. Leung40
Estimated H-index: 40
(Imperial College London)
Technologies to support the Internet of Things are becoming more important as the need to better understand our environments and make them smart increases. As a result it is predicted that intelligent devices and networks, such as WSNs, will not be isolated, but connected and integrated, composing computer networks. So far, the IP-based Internet is the largest network in the world; therefore, there are great strides to connect WSNs with the Internet. To this end, the IETF has developed a suite o...
Published on Nov 1, 2013 in ADHOCNETS (Ad Hoc Networks)
Thomas Kothmayr5
Estimated H-index: 5
(TUM: Technische Universität München),
Corinna Schmitt9
Estimated H-index: 9
(UZH: University of Zurich)
+ 2 AuthorsGeorg Carle25
Estimated H-index: 25
(TUM: Technische Universität München)
In this paper, we introduce the first fully implemented two-way authentication security scheme for the Internet of Things (IoT) based on existing Internet standards, specifically the Datagram Transport Layer Security (DTLS) protocol. By relying on an established standard, existing implementations, engineering techniques and security infrastructure can be reused, which enables easy security uptake. Our proposed security scheme is therefore based on RSA, the most widely used public key cryptograph...
Published on Nov 1, 2013 in ADHOCNETS (Ad Hoc Networks)
Shahid Raza14
Estimated H-index: 14
,
Linus Wallgren2
Estimated H-index: 2
,
Thiemo Voigt39
Estimated H-index: 39
(Uppsala University)
In the Internet of Things (IoT), resource-constrained things are connected to the unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are secured with encryption and authentication, these things are exposed both to wireless attacks from inside the 6LoWPAN network and from the Internet. Since these attacks may succeed, Intrusion Detection Systems (IDS) are necessary. Currently, there are no IDSs that meet the requirements of the IPv6-connected IoT since the available a...
Published on Oct 1, 2013in Computer Networks3.03
Sabrina Sicari14
Estimated H-index: 14
,
Alberto Coen-Porisini16
Estimated H-index: 16
,
Roberto Riggio15
Estimated H-index: 15
Abstract Typical wireless sensor networks (WSNs) applications are characterized by a certain number of different requirements such as: data accuracy, localization, reputation, security, and confidentiality. Moreover, being often battery powered, WSNs face the challenge of ensuring privacy and security despite power consumption limitations. When the application scenario allows their use, data aggregation techniques can significantly reduce the amount of data exchanged over the wireless link at th...
Published on Sep 1, 2013in Mathematical and Computer Modelling
Sergio Gusmeroli6
Estimated H-index: 6
(TXT e-solutions),
Salvatore Piccione4
Estimated H-index: 4
(TXT e-solutions),
Domenico Rotondi6
Estimated H-index: 6
(TXT e-solutions)
Abstract Resource and information protection plays a relevant role in distributed systems like the ones present in the Internet of Things (IoT). Authorization frameworks like RBAC and ABAC do not provide scalable, manageable, effective, and efficient mechanisms to support distributed systems with many interacting services and are not able to effectively support the dynamicity and scaling needs of IoT contexts that envisage a potentially unbound number of sensors, actuators and related resources,...
Published on Sep 1, 2013in Wireless Personal Communications0.93
Yan Ding3
Estimated H-index: 3
(USTB: University of Science and Technology Beijing),
Xianwei Zhou9
Estimated H-index: 9
(USTB: University of Science and Technology Beijing)
+ 1 AuthorsFuhong Lin6
Estimated H-index: 6
(USTB: University of Science and Technology Beijing)
A particular challenging problem in designing Internet of Things is that how to detect and prevent internal attacks, because all nodes try their best to save their limited network resource. So it is difficult to achieve optimal objectives simultaneously, game theory provides an appropriate tool. In this paper, we propose a non-cooperative differential game model, which allows all nodes to choose the optimal amount of network resource to invest in information security contingent upon the state of...
Published on Jul 1, 2013in Computer Networks3.03
Rodrigo Roman19
Estimated H-index: 19
,
Jianying Zhou38
Estimated H-index: 38
,
Javier E. López38
Estimated H-index: 38
(UMA: University of Málaga)
In the Internet of Things, services can be provisioned using centralized architectures, where central entities acquire, process, and provide information. Alternatively, distributed architectures, where entities at the edge of the network exchange information and collaborate with each other in a dynamic way, can also be used. In order to understand the applicability and viability of this distributed approach, it is necessary to know its advantages and disadvantages - not only in terms of features...
Published on May 1, 2013in IEEE Transactions on Wireless Communications6.39
Ming Li27
Estimated H-index: 27
(USU: Utah State University),
Shucheng Yu31
Estimated H-index: 31
(UALR: University of Arkansas at Little Rock)
+ 1 AuthorsWenjing Lou64
Estimated H-index: 64
(VT: Virginia Tech)
Making new connections according to personal preferences is a crucial service in mobile social networking, where an initiating user can find matching users within physical proximity of him/her. In existing systems for such services, usually all the users directly publish their complete profiles for others to search. However, in many applications, the users' personal profiles may contain sensitive information that they do not want to make public. In this paper, we propose FindU, a set of privacy-...
Published on Apr 1, 2013in IEEE Computer3.56
Huansheng Ning15
Estimated H-index: 15
(Beihang University),
Hong Liu14
Estimated H-index: 14
(Beihang University),
Laurence T. Yang32
Estimated H-index: 32
(HUST: Huazhong University of Science and Technology)
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.
Published on Mar 1, 2013 in ISADS (International Symposium on Autonomous Decentralized Systems)
Fenye Bao13
Estimated H-index: 13
(VT: Virginia Tech),
Ing-Ray Chen34
Estimated H-index: 34
(VT: Virginia Tech),
Jia Guo8
Estimated H-index: 8
(VT: Virginia Tech)
An Internet of Things (IoT) system connects a large amount of tags, sensors, and mobile devices to facilitate information sharing, enabling a variety of attractive applications. It challenges the design and evaluation of IoT systems to meet the scalability, compatibility, extendibility, dynamic adaptability and resiliency requirements. In this paper, we design and evaluate a scalable, adaptive and survivable trust management protocol in dynamic IoT environments. Recognizing that entities in an I...
Cited By365
Newest
Published on Jan 1, 2020
Moez Krichen1
Estimated H-index: 1
(Al Baha University),
Mariam Lahami4
Estimated H-index: 4
(University of Sfax)
+ 2 AuthorsAfef Jmal Maâlej4
Estimated H-index: 4
(University of Sfax)
This is a work in progress in which we are interested in testing security aspects of Internet of Things for smart cities. For this purpose we follow a model-based approach which consists in: modeling the system under investigation with an appropriate formalism; deriving test suites from the obtained model; applying some coverage criteria to select suitable tests; executing the obtained tests; and finally collecting verdicts and analyzing them in order to detect errors and repair them. The adopte...
Volkan Dedeoglu , Raja Jurdak26
Estimated H-index: 26
+ 4 AuthorsSalil S. Kanhere31
Estimated H-index: 31
Published on Jan 1, 2020
Aniruddha Bhattacharjya1
Estimated H-index: 1
,
Xiaofeng Zhong10
Estimated H-index: 10
+ 1 AuthorsXing Li1
Estimated H-index: 1
Venus Mohammadi (IAU: Islamic Azad University), Amir Masoud Rahmani20
Estimated H-index: 20
(IAU: Islamic Azad University)
+ 1 AuthorsAmir Sahafi4
Estimated H-index: 4
(IAU: Islamic Azad University)
Internet of Things (IoT) creates a world where smart objects and services interacting autonomously. Taking into account the dynamic-heterogeneous characteristic of interconnected devices in IoT, demand for a trust model to guarantee security, authentication, authorization, and confidentiality of connected things, regardless of their functionality, is imperative. However, as far as we know, against the centrality of trust-based recommendation mechanisms in the IoT environment, there is no ambient...
Published on Dec 1, 2019
Nasir N. Hurrah2
Estimated H-index: 2
(University of Kashmir),
Shabir A. Parah10
Estimated H-index: 10
(University of Kashmir)
+ 2 AuthorsKhan Muhammad17
Estimated H-index: 17
(Sejong University)
Abstract The large-scale data exchange envisioned to occur in distributed IoTs is prone to raise issues regarding privacy, confidentiality and authentication at the cyberspace level. This work focuses to preserve privacy and confidentiality of data in an insecure environment of multimedia exchange between two IoT hops. In order to thwart an adversary, and ensure data confidentiality, we propose a robust multi-level security approach based on information hiding and chaotic theory. Although, some ...
Published on Dec 1, 2019in Future Generation Computer Systems5.77
Kai Fan8
Estimated H-index: 8
,
Shili Sun + 3 AuthorsYintang Yang15
Estimated H-index: 15
Published on Nov 1, 2019in Expert Systems With Applications4.29
Jeretta Horn Nord11
Estimated H-index: 11
,
Alex Koohang17
Estimated H-index: 17
,
Joanna Paliszkiewicz7
Estimated H-index: 7
Abstract The Internet of Things (IoT) global arena is massive and growing exponentially. Those in the emerging digital world have recently witnessed the proliferation and impact of IoT-enabled devices. The IoT has provided new opportunities in the technology arena while bringing several challenges to an increased level of concern. This research has both practical and theoretical impetus since IoT is still in its infancy, and yet it is considered by many as the most important technology initiativ...
View next paperOn the features and challenges of security and privacy in distributed internet of things