Open Access Open Access  Restricted Access Subscription Access

Computing Appraisal of Trust Management Techniques in the Internet of Things

Bello Abdulazeez Omeiza, Constance Izuchukwu Amannah

Abstract


Trust management is an alarming problem when it comes to interconnections and communication of objects online; Internet of Things (IoT). For ten years now, IoTs has become so popular because of its significance effect to human activities and its innovative services to many application domains. Nevertheless, IoTs is confronted with many security issues such as trust management. In spite of the huge jobs of trust the board methods in IoTs, there is still pintsized complete concentrate in this field to resolve the issue. Trust is a firm belief in integrity, reliability, strength, truth, and ability among objects base on direct observations and previous experiences that can be used to decide on the succeeding connections. The existing solutions to the trust issues in the IoTs is not comprehensive enough thus this research has evaluated and organized the various trust management techniques in a very systematic manner for addressing trust issues in the IoTs. This study helped in surveying and discussing the state of art trust management system in a well-organized manner by categorizing trust management techniques into four main group with applicable lines for future research. The paper was designed to review the available techniques in a systematic way. This study reviewed over thirty techniques which are classified into four main classes which was discussed and juxtaposed base on some trust parameters such as privacy, integrity, reliability, adaptability, availability, heterogeneity, accuracy, and scalability. The survey was structured to the following measuring metric; recommendation-based techniques (ReTs), prediction-based techniques (PrTs), policy-based techniques (PoTs), and reputation-based techniques (RepTs). The ReTs attempted to improve scalability and adaptability. The PrTs attempted to improve accuracy. The PoTs attempted to improve accuracy. The RepTs attempted to provide an enhanced scalability of the system. Generally, all the techniques have been able to improve security in one trust metrics or the other but they all have their own limitations.

Keywords


Internet of Things, trust, trust management, techniques

Full Text:

PDF

References


Glowacka J, Krygier J, Amanowicz J. A trust-based situation awareness system for military applications of the internet of things; 1973. doi: 10.1109/WF-IoT.2015.7389103.

Jayasinghe U, Lee GM, Um T, Shi Q. Machine Learning based Trust Computational Model for IoT Services. IEEE Trans Sustain Comput. 1974;4(1):39–52. doi: 10.1109/TSUSC.2018.2839623.

Chen J, Tian Z, XYin L, Wang X. 1975 Trust architecture and reputation evaluation for the internet of things. J Ambient Intell Hum Comput. doi: 10.1007/s12652–018–0887-z.

Li J, Bai Y, Zaman N, Leung VCM. A decentralized trustworthy context and QoS-aware service discovery framework for the Internet of things. IEEE Access. 1976;5:19154–66. doi: 10.1109/ACCESS.2017.2756446.

Kouicem DE, Bouabdallah A, Lakhlef H. Internet of things security: A top-down survey. Comput Netw. 2018;141:199–221. doi: 10.1016/j.comnet.2018.03.012, Google Scholar.

Abderrahim B, Rachedi A. A secure and resistant architecture against attacks for mobile ad hoc networks; 1979. Available from: https://www.researchgate.net/publication/47363501_A_secure_and_resistant_architecture_against_attacks_for_mobile_ad_hoc_networks.

Jayasinghe U, Otebolaku A, Um T, Lee G. Data centric trust evaluation and prediction framework for IoT; 1957. doi: 10.23919/ITU-WT.2017.8246999.

Abderrahim B, Chaimaa B, Abdellatif K. Trust management in the industrial Internet of things. 1980. doi: 10.1109/TIFS.2020.2997179.

Lize G, Jingpei W, Bin S. Trust management mechanism for the Internet of things. 1951. doi: 10.1109/CC.2014.6821746.

Al-Hamadi H, Chen IR. Trust-based decision making for health IoT systems. IEEE Internet Things J. 1983;4(5):1408–19. doi: 10.1109/JIOT.2017.2736446.

Chen J. Embedding the MRC and SC schemes into the trust management algorithm applied to IoT security protection. 1984. doi: 10.1007/s11277–017–5120–4.

Li X, Zhao B, Li J, Zou J, Liu Y. An area-context-based credibility detection for big data in IoT. 1985. doi: 10.1155/2020/5068731.

Chen D, Chang G, Sun D, Li J, Jia J, Wang X. TRM-IoT: a trust management model based on a fuzzy reputation for ”internet of things”. Comput Sci Inf Syst. 2012;8(4):1207–28.

Nitti M, Girau R, Atzori L, Iera A, Morabito G. A subjective model for trustworthiness evaluation in the Social Internet of things; 1990. doi: 10.1109/PIMRC.2012.6362662.

Xiao H, Sidhu N, Christianson B. Guarantor and reputation based trust model for Social Internet of Things; 1991. doi: 10.1109/IWCMC.2015.7289151.

Varghese R, Chithralekha T, Kharkongor C. Self-organized cluster based energy efficient meta trust model for internet of things; 1992. doi: 10.1109/ICETECH.2016.7569281.

Luhach AK, Isha B. Analysis of lightweight cryptographic solutions for internet of things. Indian J Sci Technol. 2016;9(28).

Luhach AK, Luhach R. Research and implementation of security framework for small and medium sized e-commerce based on SOA. J Theor Appl Inf Technol. 2015;82(3):395.

Luhach AK, Isha B, Kumar S. Layer based security in Internet of things: current mechanisms, prospective attacks, and future orientation. In: International Conference on Smart Trends for Information Technology and Computer Communications. Singapore: Springer; 2016, August. p. 896–903.

Ben Saied YB, Olivereau A, Zeghlache D, Laurent M. Trust management system design for the Internet of Things: A context-aware and multi-service approach. Comput Sec. 2013;39:351–65:Article e259118055. doi: 10.1016/j.cose.2013.09.001.

Yassine M, Abdellah E, Mustapha B. Security and privacy in smart sensor networks: advances in information security, privacy and ethics. IGI Global; 2018. Available from: https://www.igi-global.com/book/security-privacy-smart-sensor-networks/192029.

Seeber S, Sehgal A, Stelte B, Rodosek GD, Schonwalder J. Towards a trust computing architecture for RPL in Cyber Physical Systems. Proceedings of the 2013 9th international conference on Network and Service Management. Vols. 134–137, 14–18 October, 2013. Switzerland: Institute of Electrical and Electronics EngineersXplore; 2013, October. doi: 10.1109/CNS M.2013.6727823.




DOI: https://doi.org/10.37591/joces.v11i2.838

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Journal of Communication Engineering & Systems