DOI QR코드

DOI QR Code

Survey of Trust Management System in Internet of Things

  • Meghana P.Lokhande (Department of Computer Engineering, Pimpri Chinchwad College of Engineering, Pune, Research Scholar, Smt. Kashibai Navale College of Engineering) ;
  • Dipti Durgesh Patil (Department of Information Technology, MKSSS's Cummins College of Engineering for Women) ;
  • Sonali Tidke (Symbiosis Institute of Technology (SIT), Symbiosis International University)
  • Received : 2024.03.05
  • Published : 2024.03.30

Abstract

The Internet of Things (IoT) enables the connection of millions of disparate devices to the World Wide Web. To perform the task, a lot of smart gadgets must work together. The gadgets recognize other devices as part of their network service. Keeping participating devices safe is a crucial component of the internet of things. When gadgets communicate with one another, they require a promise of confidence. Trust provides certainty that the gadgets or objects will function as expected. Trust management is more difficult than security management. This review includes a thorough examination of trust management in a variety of situations.

Keywords

References

  1. Abdulrahman Aminu Ghali, Rohiza Ahmad and Hitham Alhussian 2021. A Framework for Mitigating DDoS and DOS Attacks in IoT Environment Using Hybrid Approach. Electronics, 10, 1282.
  2. Ammar, M., G. Russello, and B. Crispo 2018. Internet of Things: A survey on the security of IoT frameworks. J. Information Security Appl. 38: 8-27.
  3. Bahutair, M., Bouguettaya, A., & Neiat, A.G. 2021. Multi-Perspective Trust Management Framework for Crowd sourced IoT Services. ArXiv, abs/2101.04244.
  4. Caminha, Jean & Perkusich, Angelo & Perkusich, Mirko. 2018. A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things. Security and Communication Networks. 2018. 1-10. 10.1155/2018/6063456.
  5. Chen D, Chang G, Sun D, Li J, Jia J, Wang X. 2011. TRM-IoT: a trust management model based on fuzzy reputation for Internet of Things. Comput Sci Inf Syst; 8(4):1207e28.
  6. E. M. Daly, and M. Haahr 2009. Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs. IEEE Transactions on Mobile Computing, vol. 8, no. 5, pp. 606-621. https://doi.org/10.1109/TMC.2008.161
  7. Ganeriwal S, Srivastava M. B. 2004. Reputation-based framework for high integrity sensor networks. In: Proc. ACM security for adhoc and sensor networks. p. 66-7.
  8. Grandison, T., and M. Sloman. 2000. A Survey of Trust in Internet Applications." IEEE Communication Surveys Tutorials 3 (4): 2-16. https://doi.org/10.1109/COMST.2000.5340804
  9. Guo, J., & Chen, I. 2015. A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems. 2015 IEEE International Conference on Services Computing, 324-331
  10. Guo, Jia & Chen, Ing-Ray & Tsai, Jeffrey. 2016. A Survey of Trust Computation Models for Service Management in Internet of Things Systems. Computer Communications. 97. 10.1016/j.comcom.2016.10.012.
  11. H. Hellaoui, A. Bouabdallah, and M. Koudil 2016. TAS-IoT: Trust-Based Adaptive Security in the IoT," in Proceedings of the 41st IEEE Conference on Local Computer Networks (LCN '16), pp. 599-602.
  12. Lee, J.-Y., W.-C. Lin, and Y.H. Huang. 2014. A Lightweight Authentication Protocol for Internet of Things", in International Symposium on Next-Generation Electronics (ISNE).
  13. L. Atzori, A. Iera, and G. Morabito 2011. SIoT: Giving a Social Structure to the Internet of Things," IEEE Communication Letters, vol. 15, no. 11, pp. 1193-1195. https://doi.org/10.1109/LCOMM.2011.090911.111340
  14. M. Nitti, R. Girau, L. Atzori, and S. Member 2014. Trustworthiness Management in the Social Internet of Things," IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 5, pp. 1253-1266. https://doi.org/10.1109/TKDE.2013.105
  15. Mosenia, A., and N. K. Jha. 2016. A Comprehensive Study of Security of Internet-of-Things." IEEE Trans. Emerg. Top. Comput. 5 (4): 1- 1.
  16. Nitti, M., R. Girau, L. Atzori, A. Iera, and G. Morabito. 2012. A Subjective Model for Trustworthiness Evaluation in the Social Internet Of Things. IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Comm. - (PIMRC). pp. 18-23.
  17. Pranata, I., G. Skinner, and R. Athauda. 2012. A Holistic Review on Trust and Reputation Management Systems for Digital Environments. Int. J. Comput. Inf. Technol. 1 (1): 44-53.
  18. Q. Li, S. Zhu, and G. Cao 2010. Routing in Socially Selfish Delay Tolerant Networks. IEEE Conference on Computer Communications, San Diego, CA, pp. 1-9.
  19. Rathee, G., Saini, H., & Singh, G. 2018. Aspects of trusted routing communication in smart networks. Wireless Personal Communications, 98(2), 2367-2387. https://doi.org/10.1007/s11277-017-4978-5
  20. Rathee Geetanjali, Sandhu Rajinder, Saini Hemraj, Sivaram, M, Vigneswaran, Dhasarathan 2020. A trust computed framework for IoT devices and fog computing environment. Wireless Networks; New York Vol. 26, Iss. 4, pp.1-13.
  21. T. Zhang, L. Yan, and Y. Yang 2016. Trust evaluation method for clustered wireless sensor networks based on cloud model," Wireless Networks, pp. 1-21.
  22. Warsun Najib, Selo Sulistyo, Widyawan 2019. Survey on Trust Calculation Methods in Internet of Things, Procedia Computer Science, Volume 161, pp. 1300-1307. https://doi.org/10.1016/j.procs.2019.11.245
  23. Wee, B. Van, and D. Banister 2016. How to Write a Literature Review Paper. Transp. Rev. 36 (2): 278-288. https://doi.org/10.1080/01441647.2015.1065456
  24. Yan, Z., P. Zhang, and A. V. Vasilakos. 2014. A Survey on Trust Management for Internet of Things." J. Netw. Comput. Appl. 42: 120- 134. https://doi.org/10.1016/j.jnca.2014.01.014
  25. Yu H, et al. 2010. A survey of trust and reputation management systems in wireless communications. Proc IEEE 2010; 98(10):1755e72.
  26. Zeeshan Ali Khan 2018. Using energy-efficient trust management to protect IoT networks for smart cities, Sustainable Cities and Society, Volume 40, Pages 1-15. https://doi.org/10.1016/j.scs.2018.03.026