Trust is an essential component of every interaction we make. For some transactions we need very little trust, while for others we may be quite risk averse. In this paper we investigate trust in an Internet-of-Things environment. Can we trust devices? How can we quantify trust in devices?
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Thompson K. (1984) Refelctions on trusting trust. Turing award lecture. Communications of the ACM 27(8): 761–763
Raymond E. S. (1999) The Cathedral and the Bazaar. O’Reilly Media, USA
Anderson R. (2005) Open and closed systems are equivalent (that is, in an ideal world). In: Feller Feller J., Fitzgerald B., Hissam S. A., Lakhani K. R. (eds) Perspectives on free and open source software. MIT Press, Cambridge
ISO, ISO/IEC 11990-1. (2009). Information technology: Trusted platform module—Part 1: Overview.
3GPP. (2011). TS 31.101 UICC-terminal interface; Physical and logical characteristics (Release 9), 01-2011.
3GPP. (2010). TS 33.320 security of home node B (HNB) / home evolved node B (HeNB) (Release 11), 12-2010.
Chakraborty, R. S., Narasimhan, S. & Bhunia, S. (2009). Hardware Tojan: Threats and emerging solutions. In Proceedings of IEEE International High Level Design Validation and Test Workshop 2009 (HLDVT’09) (pp. 166–171).
Tehranipoor, M. & Koushanfar, F. (2010). A survey of hardware Trojan taxonomy and detection. In Design & Test of Computers, 27(1), 10–25, IEEE Computer Society.
Jin, Y., Kupp, N. & Makris, Y. (2009). Experiences in hardware Trojan design and implementation. In Proceedings of IEEE International Workshop on Hardware Oriented Security and Trust, 2009, (HOST’09) (pp. 50–57). August 2009.
Falliere, N., Murchu, L. O. & Chien, E. (2011). W32.Stuxnet Dossier. Symantec, Version 1.4, February 2011.
Køien G. M. (2009) Entity authentication and personal privacy in future cellular systems. River Publisher, Denmark
Liu, Y. & Wang, K. (2010). Trust control in heterogeneous networks for internet of things. In Proceedings of IEEE International Conference on Computer Applications and Systems Modelling (ICCASM) 2010 (pp. 632–636). IEEE Press, October 2010.
Grandison, T. & Sloman, M. (2000). A survey of trust in internet applications. Communications Surveys & Tutorials, 3(4), 2–16. IEEE Communications Society.
Dolev, D. & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208. IEEE Information Theory Society, March, 1983.
West R. (2008) The psychology of security: Why do good users make bad decisions?. Communications of the ACM 51(4): 34–40
Schneier B. (2003) Beyond fear: Thinking sensibly about security in an uncertain world. Springer, New York
Baron-Cohen S. (2003) The essential difference: Men, women and the extreme male brain. Penguin, London
Dawkins, R. (2006). The selfish gene. Oxford University Press, England. 30th aniversary edition.
Dawkins, R. (2008). The extended phenotype. Oxford University Press, England. Revised and corrected edition.
Robinson, J., Wakeman, I., Chalmers, D. & Horsfall, B. (2010). Trust and the internet of things. In Proceedings of TruLoco 2010: The Joint International Workshop on Trust in Location and Communications in Decentralised Computing.
Baars B. J., Gage N. M. (2010) Cognition, brain, and consciousness: Introduction to cognitive neuroscience (2nd ed.). Academic Press, London
Goleman, D. (2006). Emotional intelligence: Why it can matter more than IQ. 10th Aniversary Edition, New York: Bantam. September 2006.
Jøsang, A., Hayward, R. & Pope, S. (2006). Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference (ACSC’06), Australian Computer Society.
Jøsang, A. & Bhuiyan, T. (2008). Optimal trust network analysis with subjective logic. In Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECUWARE’08). IEEE Computer Society, 2008.
About this article
Cite this article
Køien, G.M. Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context. Wireless Pers Commun 61, 495–510 (2011). https://doi.org/10.1007/s11277-011-0386-4
- Subjective logic