scholarly journals 4. Security issues and trust management schemes in Internet of things

2019 ◽  
pp. 73-94
Author(s):  
Riaz Ahmed Shaikh ◽  
Brian J. dAuriol ◽  
Heejo Lee ◽  
Sungyoung Lee

Until recently, researchers have focused on the cryptographic-based security issues more intensively than the privacy and trust issues. However, without the incorporation of trust and privacy features, cryptographic-based security mechanisms are not capable of singlehandedly providing robustness, reliability and completeness in a security solution. In this chapter, we present generic and flexible taxonomies of privacy and trust. We also give detailed critical analyses of the state-of-the-art research, in the field of privacy and trust that is currently not available in the literature. This chapter also highlights the challenging issues and problems.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Fengyin Li ◽  
Dongfeng Wang ◽  
Yilei Wang ◽  
Xiaomei Yu ◽  
Nan Wu ◽  
...  

The development of Internet of Things (IoT) and Mobile Edge Computing (MEC) has led to close cooperation between electronic devices. It requires strong reliability and trustworthiness of the devices involved in the communication. However, current trust mechanisms have the following issues: (1) heavily relying on a trusted third party, which may incur severe security issues if it is corrupted, and (2) malicious evaluations on the involved devices which may bias the trustrank of the devices. By introducing the concepts of risk management and blockchain into the trust mechanism, we here propose a blockchain-based trust mechanism for distributed IoT devices in this paper. In the proposed trust mechanism, trustrank is quantified by normative trust and risk measures, and a new storage structure is designed for the domain administration manager to identify and delete the malicious evaluations of the devices. Evidence shows that the proposed trust mechanism can ensure data sharing and integrity, in addition to its resistance against malicious attacks to the IoT devices.


2021 ◽  
Vol 11 (4) ◽  
pp. 4750-4763
Author(s):  
Madhura Apte ◽  
Supriya Kelkar ◽  
Aishwarya Dorge ◽  
Shilpa Deshpande ◽  
Pooja Bomble ◽  
...  

Internet of Things (IoT) a growing phenomenon, refers to the seamless integration of things into the information network. The security in IoT is tampered because of the various attacks which happen due to resource constrained nature of the devices in the network. Thus, although IoT is evolving as an attractive next generation networking paradigm, it can be adopted only when the security issues are resolved. This implies that, in a dynamic and collaborative IoT environment, the devices need to be trustworthy. This paper proposes a gateway based trust management system and an algorithm for computation of trust for the devices. The system focuses on making the computations on the devices lightweight and the network robust. The proposed system is tested against various IoT attacks and results demonstrate that it can clearly identify the malicious device if any, in the IoT network.


2020 ◽  
Vol 17 (5) ◽  
pp. 2181-2186 ◽  
Author(s):  
Feslin Anish Mon Solomon ◽  
Godfrey Winster Sathianesan

Internet of things is a current exploding area of research now in which the number of devices is expected to reach 20 billion in 2050. Devices are becoming intelligent and are being used for many applications which support day to day living of humans. Since the information gathered are being used by human users in most of the cases, trust of the information provider is to be questioned. Lack of trust obstructs the acceptance of these devices and technologies to be implemented. As the technology advances, the IoT network architecture must establish trust between the devices to increase its adaptability among the potential users. In this paper, we propose a Fog level trust establishment technique has been proposed for IoT devices using Node feedback mechanism. Since the trust factors are decided in the fog level, the nodes will know the trust of the other node which they need to communicate only and thereby avoiding bad-mouthing attacks. Considering the node capability in IoT environment, we adopt a mechanism for the calculating the trust of the node which keeps the overhead of the trust computing device to be low. This makes our implementation capable of expanding to handle large scale IoT networks. Information Entropy theory has been adopted to gather the feedback about a node in the fog level which breaks the barriers of subjective trust calculation in the traditional trust management schemes. Results shows an improvement in the efficiency compared to the existing methods.


Author(s):  
Nabil Djedjig ◽  
Djamel Tandjaoui ◽  
Imed Romdhani ◽  
Faiza Medjek

The internet of things (IoT) is a new paradigm where users, objects, and any things are interconnected using wired and wireless technology such as RFID, ZigBee, WSN, NFC, Bluetooth, GPRS, and LTE. In this last decade, the IoT concept has attracted significant attention from both industrial and research communities. Many application domains may have significant benefits with IoT systems. These domains range from home automation, environmental monitoring, healthcare, to logistic and smart grid. Nevertheless, the IoT is facing many security issues such as authentication, key management, identification, availability, privacy, and trust management. Indeed, establishing trust relationships between nodes in IoT represents a primary security milestone to have reliable systems that exclude malicious nodes. However, trust management in an IoT constrained and ubiquitous environment represents a real challenge. This chapter presents an overview of trust management in IoT. This overview explains and demonstrates the usefulness of trust management and how it should be exploited in IoT.


Author(s):  
Uppuluri Sirisha ◽  
G. Lakshme Eswari

This paper briefly introduces Internet of Things(IOT) as a intellectual connectivity among the physical objects or devices which are gaining massive increase in the fields like efficiency, quality of life and business growth. IOT is a global network which is interconnecting around 46 million smart meters in U.S. alone with 1.1 billion data points per day[1]. The total installation base of IOT connecting devices would increase to 75.44 billion globally by 2025 with a increase in growth in business, productivity, government efficiency, lifestyle, etc., This paper familiarizes the serious concern such as effective security and privacy to ensure exact and accurate confidentiality, integrity, authentication access control among the devices.


Author(s):  
Wazir Zada Khan ◽  
Qurat-ul-Ain Arshad ◽  
Saqib Hakak ◽  
Muhammad Khurram Khan ◽  
Saeed-Ur-Rehman

Sign in / Sign up

Export Citation Format

Share Document