A Comprehensive Overview on Impact of Trust Models in Internet of Things

Author(s):  
G. Edwin Prem Kumar ◽  
M. Lydia
Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1598
Author(s):  
Sigurd Frej Joel Jørgensen Ankergård ◽  
Edlira Dushku ◽  
Nicola Dragoni

The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internet-connected devices which are revolutionizing many domains, such as healthcare, transportation, smart cities, to mention only a few. Along with the unprecedented new opportunities, the IoT revolution is creating an enormous attack surface for potential sophisticated cyber attacks. In this context, Remote Attestation (RA) has gained wide interest as an important security technique to remotely detect adversarial presence and assure the legitimate state of an IoT device. While many RA approaches proposed in the literature make different assumptions regarding the architecture of IoT devices and adversary capabilities, most typical RA schemes rely on minimal Root of Trust by leveraging hardware that guarantees code and memory isolation. However, the presence of a specialized hardware is not always a realistic assumption, for instance, in the context of legacy IoT devices and resource-constrained IoT devices. In this paper, we survey and analyze existing software-based RA schemes (i.e., RA schemes not relying on specialized hardware components) through the lens of IoT. In particular, we provide a comprehensive overview of their design characteristics and security capabilities, analyzing their advantages and disadvantages. Finally, we discuss the opportunities that these RA schemes bring in attesting legacy and resource-constrained IoT devices, along with open research issues.


Sensors ◽  
2019 ◽  
Vol 19 (11) ◽  
pp. 2613 ◽  
Author(s):  
Collins Burton Mwakwata ◽  
Hassan Malik ◽  
Muhammad Mahtab Alam ◽  
Yannick Le Moullec ◽  
Sven Parand ◽  
...  

Narrowband internet of things (NB-IoT) is a recent cellular radio access technology based on Long-Term Evolution (LTE) introduced by Third-Generation Partnership Project (3GPP) for Low-Power Wide-Area Networks (LPWAN). The main aim of NB-IoT is to support massive machine-type communication (mMTC) and enable low-power, low-cost, and low-data-rate communication. NB-IoT is based on LTE design with some changes to meet the mMTC requirements. For example, in the physical (PHY) layer only single-antenna and low-order modulations are supported, and in the Medium Access Control (MAC) layers only one physical resource block is allocated for resource scheduling. The aim of this survey is to provide a comprehensive overview of the design changes brought in the NB-IoT standardization along with the detailed research developments from the perspectives of Physical and MAC layers. The survey also includes an overview of Evolved Packet Core (EPC) changes to support the Service Capability Exposure Function (SCEF) to manage both IP and non-IP data packets through Control Plane (CP) and User Plane (UP), the possible deployment scenarios of NB-IoT in future Heterogeneous Wireless Networks (HetNet). Finally, existing and emerging research challenges in this direction are presented to motivate future research activities.


2019 ◽  
Vol 15 (1) ◽  
pp. 155014771982582 ◽  
Author(s):  
Razi Iqbal ◽  
Talal Ashraf Butt ◽  
Muhammad Afzaal ◽  
Khaled Salah

The Internet of things is the next stage in the evolution of the Internet that is being materialized with the integration of billions of smart objects. The state-of-the-art communication technologies have enabled the previously isolated devices to become an active part of the Internet. This constant connectivity opens new avenues for novel applications such as the realization of social Internet of things and its subdomain the social Internet of vehicles. Socializing requires sharing of information that entails trust, especially in an open and broad social environment. This article highlights the key factors involved in conceptualizing an efficient trust model for social Internet of vehicles. Furthermore, it focuses on the unique challenges involved in designing the trust models for social Internet of vehicles. Several trust models exist in literature; however, most of the existing trust models are specific to their domains, for example, Internet of things, social Internet of things, or general vehicular networks. This article presents a brief review of the trust models that have the potential to be implemented in Social Internet of vehicles. Finally, the authors present an overview of how trending concepts and emerging technologies like blockchain and fog computing can assist in developing a trust-based social Internet of vehicles model for high-efficiency, decentralized architecture and dynamic nature of vehicular networks.


2020 ◽  
Vol 10 (1) ◽  
pp. 74-85 ◽  
Author(s):  
Oldřich Kodym ◽  
Lukáš Kubáč ◽  
Libor Kavka

AbstractCurrently we are saying that we are at the dawn of the fourth revolution, which is marked by using cyberphysical systems and the Internet of Things. This is marked as Industry 4.0 (I4.0). With Industry 4.0 is also closely linked concept Logistics 4.0. The highly dynamic and uncertain logistic markets and huge logistic networks require new methods, products and services. The concept of the Internet of Things and Services (IoT&S), Big Data/ Data Mining (DM), cloud computing, 3D printing, Blockchain and cyber physical system (CPS) etc. seem to be the probable technical solution for that. However, associated risks hamper its implementation and lack a comprehensive overview. In response, the paper proposes a framework of risks in the context of Logistics 4.0. They are here economic risks, that are associated e.g. with high or false investments. From a social perspective, risks the job losses, are considered too. Additionally, risks can be associated with technical risks, e.g. technical integration, information technology (IT)-related risks such as data security, and legal and political risks, such as for instance unsolved legal clarity in terms of data possession. It is therefore necessary to know the potential risks in the implementation process.


Sensors ◽  
2019 ◽  
Vol 19 (8) ◽  
pp. 1929 ◽  
Author(s):  
Farag Azzedin ◽  
Mustafa Ghaleb

The advent of Internet-of-Things (IoT) is creating an ecosystem of smart applications and services enabled by a multitude of sensors. The real value of these IoT smart applications comes from analyzing the information provided by these sensors. Information fusion improves information completeness/quality and, hence, enhances estimation about the state of things. Lack of trust and therefore, malicious activities renders the information fusion process and hence, IoT smart applications unreliable. Behavior-related issues associated with the data sources, such as trustworthiness, honesty, and accuracy, must be addressed before fully utilizing these smart applications. In this article, we argue that behavior trust modeling is indispensable to the success of information fusion and, hence, to smart applications. Unfortunately, the area is still in its infancy and needs further research to enhance information fusion. The aim of this article is to raise the awareness and the need of behavior trust modelling and its effect on information fusion. Moreover, this survey describes IoT architectures for modelling trust as well as classification of current IoT trust models. Finally, we discuss future directions towards trustworthy reliable fusion techniques.


Author(s):  
H. R. Vyawahare

Blockchain technology and distributed ledger has attracted massive attention and has triggered multiple projects in different industries. Blockchain is one of the most important technical invention in the recent years. It serves as an immutable ledger which allows transactions to take place in a decentralized manner. Blockchain based applications are springing up and are covering numerous fields including financial services, reputation system and Internet of Things (IoT), and so on. However, there are still many challenges of blockchain technology such as scalability and security problems waiting to be overcome. This paper presents a comprehensive overview on blockchain technology.


2021 ◽  
Author(s):  
Cody Lewis ◽  
Nan Li ◽  
Vijay Varadharajan

Trust models play an important role in Internet of Things (IoT) as it provides a means of finding whether a given device can provide a service to a satisfactory level as well as a means for identifying potentially malicious devices in the network. Context awareness in trust models allows a trustor to filter and aggregate evidence by their relevance to the current situation. Context awareness is important in the formulation of trust in IoT networks due to their heterogeneity and due to the dynamic changes in the capabilities of IoT devices. In this paper,we have proposed a new type of context-based attack on context aware trust models for IoT systems. An adversary is able to manipulate the context and impact a target group of IoT devices, while other devices in non-targeted groups are not even aware of the attack. We have demonstrated the effectiveness of this new type of attack on six previously proposed trust models. Through practical simulations and theoretical proofs, we show that the adversaries can launch such context-based attacks against a targeted group of IoT devices in the network. The paper also proposes a new trust management system that can mitigate such context-based attacks.


Energies ◽  
2022 ◽  
Vol 15 (2) ◽  
pp. 452
Author(s):  
Nour Alhuda Sulieman ◽  
Lorenzo Ricciardi Celsi ◽  
Wei Li ◽  
Albert Zomaya ◽  
Massimo Villari

Edge computing is a distributed computing paradigm such that client data are processed at the periphery of the network, as close as possible to the originating source. Since the 21st century has come to be known as the century of data due to the rapid increase in the quantity of exchanged data worldwide (especially in smart city applications such as autonomous vehicles), collecting and processing such data from sensors and Internet of Things devices operating in real time from remote locations and inhospitable operating environments almost anywhere in the world is a relevant emerging need. Indeed, edge computing is reshaping information technology and business computing. In this respect, the paper is aimed at providing a comprehensive overview of what edge computing is as well as the most relevant edge use cases, tradeoffs, and implementation considerations. In particular, this review article is focused on highlighting (i) the most recent trends relative to edge computing emerging in the research field and (ii) the main businesses that are taking operations at the edge as well as the most used edge computing platforms (both proprietary and open source). First, the paper summarizes the concept of edge computing and compares it with cloud computing. After that, we discuss the challenges of optimal server placement, data security in edge networks, hybrid edge-cloud computing, simulation platforms for edge computing, and state-of-the-art improved edge networks. Finally, we explain the edge computing applications to 5G/6G networks and industrial internet of things. Several studies review a set of attractive edge features, system architectures, and edge application platforms that impact different industry sectors. The experimental results achieved in the cited works are reported in order to prove how edge computing improves the efficiency of Internet of Things networks. On the other hand, the work highlights possible vulnerabilities and open issues emerging in the context of edge computing architectures, thus proposing future directions to be investigated.


Author(s):  
Meriem Aziez ◽  
Saber Benharzallah ◽  
Hammadi Bennoui

Purpose The purpose of this paper is to address the Internet of Things (IoT) service discovery problem and investigate the existing solutions to tackle this problem in many aspects. Design/methodology/approach This paper presents an overview of IoT services aiming at providing a clear understanding about their features because this term is still ambiguous for the IoT service discovery approaches. Besides, a full comparison study of the most representative service discovery approaches in the literature is presented over four perspectives: the IoT information model, the mechanism of IoT service discovery, the adopted architecture and the context awareness. These perspectives allow classifying, comparing and giving a deeper understanding of the existing IoT service discovery solutions. Findings This paper presents a new definition and a new classification of IoT services and citation of their features comparing with the traditional Web services. This paper discusses the existing solutions, as well as the main challenges, that face the service discovery issue in the IoT domain. Besides, two classifications of the approaches are adopted on the basis of their service description model and their mechanism of discovery, and a set of requirements that need to be considered when defining an IoT service are proposed. Originality/value There are few number works that survey the service discovery approaches in the IoT domain, but none of these surveys discuss the service description models in the IoT or the impact of the context awareness aspect in the service discovery solution. There are also few works that give a comprehensive overview of IoT services to understand their nature to facilitate their description and discovery. This paper fills this gap by performing a full comparison study of multi-category and recent approaches for service discovery in the IoT over many aspects and also by performing a comprehensive study of the IoT service features.


Sign in / Sign up

Export Citation Format

Share Document