Survey on Trust Calculation Methods in Internet of Things

被引:22
作者
Najib, Warsun [1 ]
Sulistyo, Selo [1 ]
Widyawan [1 ]
机构
[1] Univ Gadjah Mada, Dept Elect & Informat Engn, Yogyakarta, Indonesia
来源
FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE | 2019年 / 161卷
关键词
trust calculation; trust evaluation; trust classification; intemet of things; IoT; MANAGEMENT; IOT; SECURITY; MODEL;
D O I
10.1016/j.procs.2019.11.245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is widely affecting our daily lives in many different activities and applications. IoT devices are ranging from a tiny wearable device to large industrial applications. Wide variety of IoT applications have been developed and deployed involving many devices and produced huge data. In IoT applications, privacy, security, and trust play an important role in the success of IoT implementation. Trust can be defined as a key property to establish trustworthy and connectivity among devices to ensure secure services and applications. This paper addresses a survey of trust calculation models for IoT systems, i.e., what are available models or methods used by researcher to compute trust in IoT system. In addition, classification is also developed to categorize trust calculation model using five parameters including trust metric, trust source, trust algorithm, trust architecture, and trust propagation. Furthermore, some research challenges and directions are identified within the topic of trust-based security in IoT. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1300 / 1307
页数:8
相关论文
共 35 条
[21]   A Comprehensive Study of Security of Internet-of-Things [J].
Mosenia, Arsalan ;
Jha, Niraj K. .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (04) :586-602
[22]  
Namal S. H., 2016, P 2015 ITU KAL TRUST
[23]   Trustworthiness Management in the Social Internet of Things [J].
Nitti, Michele ;
Girau, Roberto ;
Atzori, Luigi .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (05) :1253-1266
[24]  
Nitti M, 2012, 2012 IEEE 23RD INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), P18, DOI 10.1109/PIMRC.2012.6362662
[25]  
Pranata I., 2012, International Journal of Computer and Information Technology, V1, P44
[26]   Securing the Internet of Things [J].
Roman, Rodrigo ;
Najera, Pablo ;
Lopez, Javier .
COMPUTER, 2011, 44 (09) :51-58
[27]  
SAIED YB, 2014, COMPUT NETW, V64, P273, DOI DOI 10.1016/j.comnet.2014.02.001
[28]   Security, privacy and trust in Internet of Things: The road ahead [J].
Sicari, S. ;
Rizzardi, A. ;
Grieco, L. A. ;
Coen-Porisini, A. .
COMPUTER NETWORKS, 2015, 76 :146-164
[29]   D-S Evidence Theory Based Trust Ant Colony Routing in WSN [J].
Sun, Ziwen ;
Zhang, Zhiwei ;
Xiao, Cheng ;
Qu, Gang .
CHINA COMMUNICATIONS, 2018, 15 (03) :27-41
[30]  
Suryani Vera, 2016, Internatismal Journal of Electrical and Computer Engineering, V6, P2396, DOI [10.11591/ijece.v6i5.9678, DOI 10.11591/IJECE.V6I5.9678]