A Participatory Verification Security Scheme for the Internet of Things

被引:0
|
作者
Chifor, Bogdan-Cosmin [1 ]
Bica, Ion [1 ]
Patriciu, Victor-Valeriu [1 ]
机构
[1] Mil Tech Acad, Dept Comp Sci, 81-83 George Cosbuc Blvd, Bucharest, Romania
来源
2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM 2016) | 2016年
关键词
Internet of Things; security; smart city; social network; reputation; trust; REPUTATION; TRUST;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things is becoming a critical subject nowadays and along with an increasing adoption of ubiquitous computing devices security becomes an issue which must be approached in different application contexts. One notion that gains traction along with the IoT (Internet of Things) paradigm is the social context of embedded devices. This paper proposes a participatory verification security solution where citizens use an Android application to verify the position of an IoT device when uploading a sensing report. The reputation of an IoT device is built using the verification feedback and the information delivered by the most trusted device in a certain category is published on a social network.
引用
收藏
页码:267 / 270
页数:4
相关论文
共 50 条
  • [41] Participant Selection Strategy With Privacy Protection for Internet of Things Search
    Yang, Peng
    Kang, Xuyuan
    Wu, Qiming
    Yang, Boran
    Zhang, Puning
    IEEE ACCESS, 2020, 8 : 40966 - 40976
  • [42] Study of the Different Security Threats on the Internet of Things and their Applications
    Sahmi, Imane
    Mazri, Tomader
    Hmina, Nabil
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,
  • [43] Cross-Domain Security and Interoperability in Internet of Things
    Zahra, Samman
    Gong, Wei
    Khattak, Hasan Ali
    Shah, Munam Ali
    Song, Houbing
    IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14) : 11993 - 12000
  • [44] Internet of Things: Evolution and technologies from a security perspective
    Ande, Ruth
    Adebisi, Bamidele
    Hammoudeh, Mohammad
    Saleem, Jibran
    SUSTAINABLE CITIES AND SOCIETY, 2020, 54
  • [45] Five Acts of Consumer Behavior: A Potential Security and Privacy Threat to Internet of Things
    Khan, Wazir Zada
    Aalsalem, Mohammed Y.
    Khan, Muhammad Khurram
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [46] Context-aware security in the internet of things: a survey
    Sylla, Tidiane
    Chalouf, Mohamed Aymen
    Krief, Francine
    Samake, Karim
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2021, 14 (03) : 231 - 262
  • [47] Data Transfusion: Pairing Wearable Devices and Its Implication on Security for Internet of Things
    Lee, Youngjoo
    Yang, Wonseok
    Kwon, Taekyoung
    IEEE ACCESS, 2018, 6 : 48994 - 49006
  • [48] Trustworthiness Management in the Social Internet of Things
    Nitti, Michele
    Girau, Roberto
    Atzori, Luigi
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (05) : 1253 - 1266
  • [49] An efficient group signcryption scheme supporting batch verification for securing transmitted data in the Internet of Things
    Alamer, Abdulrahman
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 14 (5) : 5885 - 5902
  • [50] Internet of things security
    Baskaran S.B.M.
    Journal of ICT Standardization, 2019, 7 (01): : 21 - 39