ORDAIN: An Ontology for Trust Management in the Internet of Things

Author(s):  
Kalliopi Kravari ◽  
Nick Bassiliades
Author(s):  
Dr. Wang Haoxiang

The Internet of things is the basic paradigm with the cluster of techniques that ensure innovations in the service rendered in various applications. It aims to develop a seamless connection between the tangible objects around and the information network in turn to provide a well-structured servicing to its users. Though the IOT service seems to be promising, the risks still prevail in the form of privacy and the security in user acceptance in utilizing the internet of things services, and its application. This makes the trust management very important for the internet of things. So the paper puts forth the distributed block chain involved trust system to manage the conveyance infrastructures of the internet of things paradigm. The evaluation of the proposed model evinces the enhanced security provided for the nodes of the IOT as well as its information exchange.


2020 ◽  
Vol 57 (6) ◽  
pp. 102308 ◽  
Author(s):  
Christian Esposito ◽  
Oscar Tamburis ◽  
Xin Su ◽  
Chang Choi

2013 ◽  
Vol 401-403 ◽  
pp. 1792-1795 ◽  
Author(s):  
Tao Liu ◽  
Ya Wen Guan ◽  
Yi Qun Yan ◽  
Li Liu ◽  
Qi Chao Deng

Aimed to the security and privacy issues which restrict the construction and development of the Internet of Things, a WSN-oriented key agreement protocol in the Internet of Things ( IOT) has been proposed . Trust management was introduced the security mechanism of IOT, the use of bilinear pairing technology, the identity-based key agreement was realized. Using the protocol not only can effectively prevent attacks from outside the network and can recognize the abnormal nodes which were captured or lapsed efficacy. Thus it can reduce communication with abnormal nodes to improve network security, extending the lifetime of the network. The distributed self-organizing key negotiation process without credible third-party management can enhance the survivability of IOT, and the network has a good scalability.


Computing ◽  
2018 ◽  
Vol 101 (7) ◽  
pp. 791-818 ◽  
Author(s):  
Mohammad Dahman Alshehri ◽  
Farookh Khadeer Hussain

2019 ◽  
Vol 8 (2S8) ◽  
pp. 1750-1753

More connected devices bring amazing benefits to people and enterprises. However, they also create more digital doorways. The risk in IoT is not just financial. IoT connecting medical devices, running city infrastructure and even the houses we sleep in. Connected gadgets and sensors in our homes and working environments known as the Internet of Things-offer gigantic potential for improving how internet live and move around. We can quantify wellbeing information, travel propensities and vitality use. In any case, as more gadgets become associated, vulnerable they are to complex digital security dangers. Connected devices and sensors in our homes and workplacesknown as the Internet of Things-offer huge potential for improving how we live and move around. We can measure health data, travel habits and energy use. But as more devices become connected, the more vulnerable they are to sophisticated cyber security threats. There exist a few application security issues; for example, data access and user authentication, data protection, decimate and track of information stream, IoT platform stability, middleware security, the executives stage, etc. An effective trust management model is to be used in each IoT framework to ensure the framework against malevolent assaults and consequently ensuring dependable and secure data transmission. To achieve this objective, various trust management models are used to enforce different security measures in a social IoT system. Two different trust management models namely dynamic model and machine learning based model are clarified and correlation of model are expressed and along these lines the benefit of one model over the other is comprehended.. Appropriately in this paper, a detailed study of each model is done with other pinpoints thus leading to a thorough study of two diverse trust management models.


Sign in / Sign up

Export Citation Format

Share Document