Survey on Trust Calculation Methods in Internet of Things

被引:21
作者
Najib, Warsun [1 ]
Sulistyo, Selo [1 ]
Widyawan [1 ]
机构
[1] Univ Gadjah Mada, Dept Elect & Informat Engn, Yogyakarta, Indonesia
来源
FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE | 2019年 / 161卷
关键词
trust calculation; trust evaluation; trust classification; intemet of things; IoT; MANAGEMENT; IOT; SECURITY; MODEL;
D O I
10.1016/j.procs.2019.11.245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is widely affecting our daily lives in many different activities and applications. IoT devices are ranging from a tiny wearable device to large industrial applications. Wide variety of IoT applications have been developed and deployed involving many devices and produced huge data. In IoT applications, privacy, security, and trust play an important role in the success of IoT implementation. Trust can be defined as a key property to establish trustworthy and connectivity among devices to ensure secure services and applications. This paper addresses a survey of trust calculation models for IoT systems, i.e., what are available models or methods used by researcher to compute trust in IoT system. In addition, classification is also developed to categorize trust calculation model using five parameters including trust metric, trust source, trust algorithm, trust architecture, and trust propagation. Furthermore, some research challenges and directions are identified within the topic of trust-based security in IoT. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1300 / 1307
页数:8
相关论文
共 35 条
  • [1] Challenges and Solutions for Applications and Technologies in the Internet of Things
    Albishi, Saad
    Soh, Ben
    Ullah, Azmat
    Algarni, Fahad
    [J]. 4TH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE (ISICO 2017), 2017, 124 : 608 - 614
  • [2] Internet of Things: A survey on the security of IoT frameworks
    Ammar, Mahmoud
    Russello, Giovanni
    Crispo, Bruno
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 : 8 - 27
  • [3] [Anonymous], IEEE T SUSTAINABLE C
  • [4] [Anonymous], 2014, CISCO VISUAL NETWORK
  • [5] Bao F., 2013, 2013 IEEE eleventh international symposium on autonomous decentralized systems (ISADS), P1, DOI [10.1109/ISADS.2013.6513398, DOI 10.1109/ISADS.2013.6513398]
  • [6] Trust management system designs for the Internet of Things: A context-aware and multi-service approach
    Ben Saied, Yosra
    Olivereau, Alexis
    Zeghlache, Djamal
    Laurent, Maryline
    [J]. COMPUTERS & SECURITY, 2013, 39 : 351 - 365
  • [7] Bhargav A, 2018, APPLIED ELECTRONICS, P1
  • [8] Caminha J., 2018, 2018 IEEE INT C CONS, P1
  • [9] Chakraborty S, 2016, IEEE INT SYMP CIRC S, P181, DOI 10.1109/ISCAS.2016.7527200
  • [10] TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things
    Chen, Dong
    Chang, Guiran
    Sun, Dawei
    Li, Jiajia
    Jia, Jie
    Wang, Xingwei
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04) : 1207 - 1228