Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context

Abstract

Trust is an essential component of every interaction we make. For some transactions we need very little trust, while for others we may be quite risk averse. In this paper we investigate trust in an Internet-of-Things environment. Can we trust devices? How can we quantify trust in devices?

This is a preview of subscription content, log in to check access.

References

  1. 1

    Thompson K. (1984) Refelctions on trusting trust. Turing award lecture. Communications of the ACM 27(8): 761–763

  2. 2

    Raymond E. S. (1999) The Cathedral and the Bazaar. O’Reilly Media, USA

  3. 3

    Anderson R. (2005) Open and closed systems are equivalent (that is, in an ideal world). In: Feller Feller J., Fitzgerald B., Hissam S. A., Lakhani K. R. (eds) Perspectives on free and open source software. MIT Press, Cambridge

  4. 4

    ISO, ISO/IEC 11990-1. (2009). Information technology: Trusted platform module—Part 1: Overview.

  5. 5

    3GPP. (2011). TS 31.101 UICC-terminal interface; Physical and logical characteristics (Release 9), 01-2011.

  6. 6

    3GPP. (2010). TS 33.320 security of home node B (HNB) / home evolved node B (HeNB) (Release 11), 12-2010.

  7. 7

    Chakraborty, R. S., Narasimhan, S. & Bhunia, S. (2009). Hardware Tojan: Threats and emerging solutions. In Proceedings of IEEE International High Level Design Validation and Test Workshop 2009 (HLDVT’09) (pp. 166–171).

  8. 8

    Tehranipoor, M. & Koushanfar, F. (2010). A survey of hardware Trojan taxonomy and detection. In Design & Test of Computers, 27(1), 10–25, IEEE Computer Society.

  9. 9

    Jin, Y., Kupp, N. & Makris, Y. (2009). Experiences in hardware Trojan design and implementation. In Proceedings of IEEE International Workshop on Hardware Oriented Security and Trust, 2009, (HOST’09) (pp. 50–57). August 2009.

  10. 10

    Falliere, N., Murchu, L. O. & Chien, E. (2011). W32.Stuxnet Dossier. Symantec, Version 1.4, February 2011.

  11. 11

    Køien G. M. (2009) Entity authentication and personal privacy in future cellular systems. River Publisher, Denmark

  12. 12

    Liu, Y. & Wang, K. (2010). Trust control in heterogeneous networks for internet of things. In Proceedings of IEEE International Conference on Computer Applications and Systems Modelling (ICCASM) 2010 (pp. 632–636). IEEE Press, October 2010.

  13. 13

    Grandison, T. & Sloman, M. (2000). A survey of trust in internet applications. Communications Surveys & Tutorials, 3(4), 2–16. IEEE Communications Society.

  14. 14

    Dolev, D. & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208. IEEE Information Theory Society, March, 1983.

  15. 15

    West R. (2008) The psychology of security: Why do good users make bad decisions?. Communications of the ACM 51(4): 34–40

  16. 16

    Schneier B. (2003) Beyond fear: Thinking sensibly about security in an uncertain world. Springer, New York

  17. 17

    Baron-Cohen S. (2003) The essential difference: Men, women and the extreme male brain. Penguin, London

  18. 18

    Dawkins, R. (2006). The selfish gene. Oxford University Press, England. 30th aniversary edition.

  19. 19

    Dawkins, R. (2008). The extended phenotype. Oxford University Press, England. Revised and corrected edition.

  20. 20

    Robinson, J., Wakeman, I., Chalmers, D. & Horsfall, B. (2010). Trust and the internet of things. In Proceedings of TruLoco 2010: The Joint International Workshop on Trust in Location and Communications in Decentralised Computing.

  21. 21

    Baars B. J., Gage N. M. (2010) Cognition, brain, and consciousness: Introduction to cognitive neuroscience (2nd ed.). Academic Press, London

  22. 22

    Goleman, D. (2006). Emotional intelligence: Why it can matter more than IQ. 10th Aniversary Edition, New York: Bantam. September 2006.

  23. 23

    Jøsang, A., Hayward, R. & Pope, S. (2006). Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference (ACSC’06), Australian Computer Society.

  24. 24

    Jøsang, A. & Bhuiyan, T. (2008). Optimal trust network analysis with subjective logic. In Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECUWARE’08). IEEE Computer Society, 2008.

Download references

Author information

Correspondence to Geir M. Køien.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Køien, G.M. Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context. Wireless Pers Commun 61, 495–510 (2011). https://doi.org/10.1007/s11277-011-0386-4

Download citation

Keywords

  • Trust
  • Internet-of-things
  • Software
  • Hardware
  • Subjective logic