Systematic analysis and review of trust management schemes for IoT security

被引:0
|
作者
Shankhpal S.V. [1 ]
Brahmananda S.H. [1 ]
机构
[1] Gitam School of Technology, Gitam (Deemed to be University), Karnataka, Bengaluru
来源
International Journal of Wireless and Mobile Computing | 2022年 / 23卷 / 01期
关键词
access control; authentication; IoT; security; trust management;
D O I
10.1504/IJWMC.2022.125534
中图分类号
学科分类号
摘要
The advancements in Internet of Things (IoT) gained a massive interest amongst researchers by providing interesting services when huge numbers of entities connect together to solve complicated scenarios. In addition, the IoT network connects all the devices using internet connectivity. However, the IoT network faces many issues and one of them is the trust management. Several algorithms had been devised for trust management in IoT, but the problems persist in enhancing the IoT network. This article reviews of 50 research papers in detail by providing the suggested trust-based IoT security methodologies. Also, a brief analysis and discussion for considering year of publication, employed methodology, evaluation metrics, trust parameters and the implementation tool are performed and the research gaps and issues of various trust-based IoT security schemes are presented for better contribution of significant trust-based IoT network. Copyright © 2022 Inderscience Enterprises Ltd.
引用
收藏
页码:33 / 45
页数:12
相关论文
共 50 条
  • [1] Authentication schemes for Internet of Things (IoT) networks: A systematic review and security assessment
    Yalli, Jameel Shehu
    Hasan, Mohd Hilmi
    Jung, Low Tan
    Al-Selwi, Safwan Mahmood
    INTERNET OF THINGS, 2025, 30
  • [2] IoT Trust Management as an SIoT Enabler Overcoming Security Issues
    Akli, Assiya
    Chougdali, Khalid
    ADVANCES IN CYBERSECURITY, CYBERCRIMES, AND SMART EMERGING TECHNOLOGIES, 2023, 4 : 123 - 133
  • [3] Analysis of Complex Network Security based on Trust Management Schemes
    Seo, Sunho
    Chung, Jong-Moon
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-ASIA (ICCE-ASIA), 2016,
  • [4] IoT security issues in the context of Edge Computing: A Systematic Review of Literature
    Torres-Carrion, Hernan
    Solano-Chamba, Cecivel
    Narvaez-Guillen, Cristian
    Cueva-Hurtado, Mario
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [5] Security in Vehicles With IoT by Prioritization Rules, Vehicle Certificates, and Trust Management
    Garcia-Magarino, Ivan
    Sendra, Sandra
    Lacuesta, Raquel
    Lloret, Jaime
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04): : 5927 - 5934
  • [6] Trust based Security schemes in Mobile Ad Hoc Networks - A Review
    Sivagurunathan, S.
    Prathapchandran, K.
    2014 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING APPLICATIONS (ICICA 2014), 2014, : 291 - 295
  • [7] Beyond proof-of-compliance: Security analysis in trust management
    Li, NH
    Mitchell, JC
    Winsborough, WH
    JOURNAL OF THE ACM, 2005, 52 (03) : 474 - 514
  • [8] Enabling Trust and Security TIPPSS for IoT
    Hudson, Florence D.
    Laplante, Phillip A.
    Amaba, Ben
    IT PROFESSIONAL, 2018, 20 (02) : 15 - 18
  • [9] A review of trust management, security and privacy policy languages
    De Coi, Juri Luca
    Olmedilla, Daniel
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 483 - 490
  • [10] A Review of Security Threats, Solutions and Trust Management in VANETs
    Premasudha, B. G.
    Ram, V. Ravi
    Miller, J.
    Suma, R.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2016, 7 (01): : 38 - 57