scholarly journals TRUST MANAGEMENT OF COMMUNICATION ARCHITECTURES OF INTERNET OF THINGS

Author(s):  
Dr. Wang Haoxiang

The Internet of things is the basic paradigm with the cluster of techniques that ensure innovations in the service rendered in various applications. It aims to develop a seamless connection between the tangible objects around and the information network in turn to provide a well-structured servicing to its users. Though the IOT service seems to be promising, the risks still prevail in the form of privacy and the security in user acceptance in utilizing the internet of things services, and its application. This makes the trust management very important for the internet of things. So the paper puts forth the distributed block chain involved trust system to manage the conveyance infrastructures of the internet of things paradigm. The evaluation of the proposed model evinces the enhanced security provided for the nodes of the IOT as well as its information exchange.

Author(s):  
Anshu Kumar Dwivedi ◽  
A. K. Sharma ◽  
Rakesh Kumar

The endeavor of this observational examination is to build up another exploration structure that clarifies the consumer mentality toward the Internet of Things (IoT) benefit through the Wireless Sensor Network (WSN). WSN should be associated with the Internet because of its assortment of uses as well as their significance. There are a few difficulties along with the issues inside coordinating WSN and IoT. Since a wide-reaching WSN is to be fully migrating into the Internet as an important part of IoT, it is important to think about different safety questions that come with IoT, such as the observation of bad attacks. Sensors or sensor fix things may organization straight to exchange between each other using various protocol. A have trust is making out as an important part to put forward arguments for a complex made distribution sensor networks in IoT against bad net-work point attacks, since trust setup mechanisms can bracing combination among distributed computing and communication entities, facilitate the detection of unprincipled entities, and assist the decision-making process of different protocols. In this paper, in view of inside and out comprehension of trust foundation process and quantitative examination among trust foundation techniques, we present trust and notoriety show TRM-IoT to authorize the participation between things in a system of IoT dependent on their practices. In this model the internet of thing (IOT) system to pledge with misbehaving nodes whose status are non deterministic. This paper also presents an overview of trust management model in IOT.The accuracy, robustness, and lightness of the proposed model is approved through a wide arrangement of recreations.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 545
Author(s):  
Risabh Mishra ◽  
M Safa ◽  
Aditya Anand

Recent advances in wireless communication technologies and automobile industry have triggered a significant research interest in the field of Internet of Vehicles over the past few years.The advanced period of the Internet of Things is guiding the development of conventional Vehicular Networks to the Internet of Vehicles.In the days of Internet connectivity there is need to be in safe and problem-free environment.The Internet of Vehicles (IoV) is normally a mixing of three networks: an inter-vehicleNetwork, an intra-vehicle network, and a vehicle to vehicle network.Based on  idea of three networks combining into one, we define  Internet of Vehicles as a large-scale distributed system to wireless communication and information exchange between vehicle2X (X: vehicle, road, human and internet).It is a combined   network for supporting intelligent traffic management, intelligent dynamic information service, and intelligent vehicle control, representation of an application of the Internet of Things (IoT) technology for intelligent transportation system (ITS).  


2020 ◽  
Vol 57 (6) ◽  
pp. 102308 ◽  
Author(s):  
Christian Esposito ◽  
Oscar Tamburis ◽  
Xin Su ◽  
Chang Choi

2013 ◽  
Vol 401-403 ◽  
pp. 1792-1795 ◽  
Author(s):  
Tao Liu ◽  
Ya Wen Guan ◽  
Yi Qun Yan ◽  
Li Liu ◽  
Qi Chao Deng

Aimed to the security and privacy issues which restrict the construction and development of the Internet of Things, a WSN-oriented key agreement protocol in the Internet of Things ( IOT) has been proposed . Trust management was introduced the security mechanism of IOT, the use of bilinear pairing technology, the identity-based key agreement was realized. Using the protocol not only can effectively prevent attacks from outside the network and can recognize the abnormal nodes which were captured or lapsed efficacy. Thus it can reduce communication with abnormal nodes to improve network security, extending the lifetime of the network. The distributed self-organizing key negotiation process without credible third-party management can enhance the survivability of IOT, and the network has a good scalability.


Computing ◽  
2018 ◽  
Vol 101 (7) ◽  
pp. 791-818 ◽  
Author(s):  
Mohammad Dahman Alshehri ◽  
Farookh Khadeer Hussain

Author(s):  
Babak Esmaeilpour Ghouchani ◽  
Susan Jodaki ◽  
Maryam Joudaki ◽  
Alireza Balali ◽  
Lila Rajabion

Purpose Nowadays, the Internet of Things (IoT) offers new intelligent services and business model opportunities by extending the internet connectivity into physical devices and daily objects. Recently, this technology has had a deep impact on all the aspects of human societies from industry to management and business. Therefore, the purpose of this paper is to predict the impact of using IoT services on the development of electronic business (e-business). Design/methodology/approach For evaluating the model’s elements, a questionnaire was designed. It was revised by experts with significant experiences. For statistical analysis, SmartPLS 3.2 is used. Findings The findings have confirmed the validity of the proposed model. The results also have indicated that the quality of IoT services (scalability, availability, reliability and ease of use), security of IoT services (trust, reputation, privacy and encryption) and IT knowledge of users (usage skills, awareness, experience and accuracy) have a positive and significant impact on development of e-business. Furthermore, the obtained results have revealed that the operating cost of IoT services (transmission time, storage capacity, functionality and stability) is significantly influenced by the development of e-business. Research limitations/implications By capturing a number of important factors in the proposed model, this study can provide a significant theoretical influence for researchers in the related area of interest. In fact, this study provides a worthwhile direction by assessing e-business performance, which, so far, has not been well assessed in many developing countries. Practical implications From a practical perspective, the statistical results support the crucial role of the following factors: quality of IoT services, the security of IoT services, operating cost of IoT services and IT knowledge of users. Hence, aspects relating to these factors must be the focus of attention of any organization in their endeavor to development of e-business. Originality/value This study meaningfully contributes to the knowledge and literature by focusing more on development e-business and IoT as original technology for further understanding, investigating other important features and applying advanced statistical analyses technique. By doing so, this study was able to develop the current understanding regarding the main aspects of development e-business and IoT services.


Sign in / Sign up

Export Citation Format

Share Document