scholarly journals A Binary Trust Game for the Internet of Things

IoT ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 50-70
Author(s):  
Claudio Marche ◽  
Michele Nitti

The IoT is transforming the ordinary physical objects around us into an ecosystem of information that will enrich our lives. The key to this ecosystem is the cooperation among the devices, where things look for other things to provide composite services for the benefit of human beings. However, cooperation among nodes can only arise when nodes trust the information received by any other peer in the system. Previous efforts on trust were concentrated on proposing models and algorithms to manage the level of trustworthiness. In this paper, we focus on modelling the interaction between trustor and trustee in the IoT and on proposing guidelines to efficiently design trust management models. Simulations show the impacts of the proposed guidelines on a simple trust model.

2019 ◽  
Vol 8 (2S8) ◽  
pp. 1750-1753

More connected devices bring amazing benefits to people and enterprises. However, they also create more digital doorways. The risk in IoT is not just financial. IoT connecting medical devices, running city infrastructure and even the houses we sleep in. Connected gadgets and sensors in our homes and working environments known as the Internet of Things-offer gigantic potential for improving how internet live and move around. We can quantify wellbeing information, travel propensities and vitality use. In any case, as more gadgets become associated, vulnerable they are to complex digital security dangers. Connected devices and sensors in our homes and workplacesknown as the Internet of Things-offer huge potential for improving how we live and move around. We can measure health data, travel habits and energy use. But as more devices become connected, the more vulnerable they are to sophisticated cyber security threats. There exist a few application security issues; for example, data access and user authentication, data protection, decimate and track of information stream, IoT platform stability, middleware security, the executives stage, etc. An effective trust management model is to be used in each IoT framework to ensure the framework against malevolent assaults and consequently ensuring dependable and secure data transmission. To achieve this objective, various trust management models are used to enforce different security measures in a social IoT system. Two different trust management models namely dynamic model and machine learning based model are clarified and correlation of model are expressed and along these lines the benefit of one model over the other is comprehended.. Appropriately in this paper, a detailed study of each model is done with other pinpoints thus leading to a thorough study of two diverse trust management models.


IoT ◽  
2021 ◽  
Vol 2 (3) ◽  
pp. 498-509
Author(s):  
Claudio Marche ◽  
Luigi Serreli ◽  
Michele Nitti

The Internet of Things (IoT) is transforming the world into an ecosystem of objects that communicate with each other to enrich our lives. The devices’ collaboration allows the creation of complex applications, where each object can provide one or more services needed for global benefit. The information moves to nodes in a peer-to-peer network, in which the concept of trustworthiness is essential. Trust and Reputation Models (TRMs) are developed with the goal of guaranteeing that actions taken by entities in a system reflect their trustworthiness values and to prevent these values from being manipulated by malicious entities. The cornerstone of any TRM is the ability to generate a coherent evaluation of the information received. Indeed, the feedback generated by the consumers of the services has a vital role as the source of any trust model. In this paper, we focus on the generation of the feedback and propose different metrics to evaluate it. Moreover, we illustrate a new collusive attack that influences the evaluation of the received services. Simulations with a real IoT dataset show the importance of feedback generation and the impact of the new proposed attack.


Author(s):  
Dr. Wang Haoxiang

The Internet of things is the basic paradigm with the cluster of techniques that ensure innovations in the service rendered in various applications. It aims to develop a seamless connection between the tangible objects around and the information network in turn to provide a well-structured servicing to its users. Though the IOT service seems to be promising, the risks still prevail in the form of privacy and the security in user acceptance in utilizing the internet of things services, and its application. This makes the trust management very important for the internet of things. So the paper puts forth the distributed block chain involved trust system to manage the conveyance infrastructures of the internet of things paradigm. The evaluation of the proposed model evinces the enhanced security provided for the nodes of the IOT as well as its information exchange.


Author(s):  
Varsha Sharma ◽  
Vivek Sharma ◽  
Nishchol Mishra

Recently, Internet of Things (IoT) has aroused great interest among the educational, scientific research, and industrial communities. Researchers affirm that IoT environments will make people's daily life easier and will lead to superior services, great savings as well as a nifty use of resources. Consequently, IoT merchandise and services will grow exponentially in the upcoming years. The basic idea of IoT is to connect physical objects to the Internet and use that connection to provide some kind of useful remote monitoring or control of those objects. The chapter presents the overall IoT vision, the technologies for achieving it, IoT challenges and its applications. This chapter also attempts to describe and analyze threat types for privacy, security and trust in IoT as well as shows how big data is an important factor in IoT. This chapter will expose the readers and researchers who are interested in exploring and implementing the IoT and related technologies to the progress towards the bright future of the Internet of Things


Author(s):  
Kijpokin Kasemsap

This article determines the overview of the Internet of Things (IoT) and the multifaceted applications of the IoT. The IoT is made up of hardware and software technologies. The IoT describes a world in which everyday objects are connected to a network so that data can be shared. The IoT refers to the networking of physical objects through the use of embedded sensors, actuators, and other devices that can collect and transmit information about the objects. The data amassed from these devices can be analyzed to optimize products, services, and operations. For the IoT to flourish, interoperability must apply across all parts of the system, including the transmission networks and the data being transmitted. The IoT enables the multifaceted applications ranging from the micro to the macro, and from the trivial to the critical perspectives.


2020 ◽  
Vol 57 (6) ◽  
pp. 102308 ◽  
Author(s):  
Christian Esposito ◽  
Oscar Tamburis ◽  
Xin Su ◽  
Chang Choi

2013 ◽  
Vol 401-403 ◽  
pp. 1792-1795 ◽  
Author(s):  
Tao Liu ◽  
Ya Wen Guan ◽  
Yi Qun Yan ◽  
Li Liu ◽  
Qi Chao Deng

Aimed to the security and privacy issues which restrict the construction and development of the Internet of Things, a WSN-oriented key agreement protocol in the Internet of Things ( IOT) has been proposed . Trust management was introduced the security mechanism of IOT, the use of bilinear pairing technology, the identity-based key agreement was realized. Using the protocol not only can effectively prevent attacks from outside the network and can recognize the abnormal nodes which were captured or lapsed efficacy. Thus it can reduce communication with abnormal nodes to improve network security, extending the lifetime of the network. The distributed self-organizing key negotiation process without credible third-party management can enhance the survivability of IOT, and the network has a good scalability.


Computing ◽  
2018 ◽  
Vol 101 (7) ◽  
pp. 791-818 ◽  
Author(s):  
Mohammad Dahman Alshehri ◽  
Farookh Khadeer Hussain

Sign in / Sign up

Export Citation Format

Share Document