Advertisement

Linking Trust to Cyber-Physical Systems

  • Dagmar AuerEmail author
  • Markus Jäger
  • Josef Küng
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1062)

Abstract

Cyber-physical systems deeply connect artefacts, systems and people. As we will use these systems on a daily basis, the question arises to what extent we can trust them, and even more, whether and how we can develop computational models for trust in such systems. Trust has been explored in a wide range of domains, starting with philosophy via psychology, sociology, and economy. Also in automation, computing and networking definitions, models and computations have emerged. In this paper we discuss our initial considerations on linking concepts and models of trust and cyber-physical systems. After structuring and selecting basic approaches in both areas, we propose appropriate links, which can be used as action areas for future development of trust models and computations in cyber-physical systems.

Keywords

Cyber-physical systems Trust Trust models Linking 

Notes

Acknowledgement

This work has partially been supported by the FFG, Contract No. 854184: “Pro\(^{2}\)Future is funded within the Austrian COMET Program—Competence Centers for Excellent Technologies—under the auspices of the Austrian Federal Ministry of Transport, Innovation and Technology, the Austrian Federal Ministry for Digital and Economic Affairs and of the Provinces of Upper Austria and Styria. COMET is managed by the Austrian Research Promotion Agency FFG.”, and by the LIT Secure and Correct Systems Lab funded by the State of Upper Austria.

References

  1. 1.
    Ahmadi, A., Sodhro, A.H., Cherifi, C., Cheutet, V., Ouzrout, Y.: Evolution of 3C cyber-physical systems architecture for industry 4.0. In: Borangiu, T., Trentesaux, D., Thomas, A., Cavalieri, S. (eds.) SOHOMA 2018. Studies in Computational Intelligence, vol. 803, pp. 448–459. Springer, Cham (2019).  https://doi.org/10.1007/978-3-030-03003-2_35. https://www.springer.com/gp/book/9783030030025CrossRefGoogle Scholar
  2. 2.
    Andersen, B., Kaur, B., Tange, H.: Computational trust. In: Khajuria, S., Bøgh Sørensen, L., Skouby, K.E. (eds.) Cybersecurity and Privacy - Bridging the Gap. River Publishers Series in Communications, pp. 83–98. River Publishers, Aalborg (2017)Google Scholar
  3. 3.
    Cardin, O.: Classification of cyber-physical production systems applications: proposition of an analysis framework. Comput. Ind. 104, 11–21 (2019).  https://doi.org/10.1016/j.compind.2018.10.002CrossRefGoogle Scholar
  4. 4.
    Chang, E., Dillon, T.: Trust, reputation, and risk in cyber physical systems. In: Papadopoulos, H., Andreou, A.S., Iliadis, L., Maglogiannis, I. (eds.) AIAI 2013. IAICT, vol. 412, pp. 1–9. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-41142-7_1. https://www.springer.com/de/book/9783642411410CrossRefGoogle Scholar
  5. 5.
    Cho, J.H., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. 48(2), 1–40 (2015).  https://doi.org/10.1145/2815595CrossRefGoogle Scholar
  6. 6.
    Griffor, E.R., Greer, C., Wollman, D.A., Burns, M.J.: Framework for cyber-physical systems: volume 1, overview. National Institute of Standards and Technology, Gaithersburg, MD (2017).  https://doi.org/10.6028/NIST.SP.1500-201
  7. 7.
    Jäger, M., Küng, J.: Introducing the factor importance to trust of sources and certainty of data in knowledge processing systems - a new approach for incorporation and processing. In: Proceedings of the 50th Hawaii International Conference on System Sciences, vol. 50, pp. 4298–4307. IEEE, January 2017.  https://doi.org/10.24251/HICSS.2017.521. Accessed 07 Sept 2018
  8. 8.
    Jäger, M., Nadschläger, S., Küng, J.: Concepts for trust propagation in knowledge processing systems - a brief introduction and overview. In: Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2018), pp. 1502–1505 (2018).  https://doi.org/10.1109/TrustCom/BigDataSE.2018.00212
  9. 9.
    Jøsang, A., Knapskog, S.J.: A metric for trusted systems. In: Proceedings of the 21st NIST-NCSC National Information Systems Security Conference, pp. 16–29. NSA, August 1998. http://folk.uio.no/josang/papers/JK1998-NSC.pdf
  10. 10.
    Jøsang, A., Marsh, S., Pope, S.: Exploring different types of trust propagation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 179–192. Springer, Heidelberg (2006).  https://doi.org/10.1007/11755593_14CrossRefGoogle Scholar
  11. 11.
    Lee, I.: Trust management for cyber-physical systems, 19 June 2016Google Scholar
  12. 12.
    Liu, Y., Peng, Y., Wang, B., Yao, S., Liu, Z.: Review on cyber-physical systems. IEEE/CAA J. Automatica Sinica 4(1), 27–40 (2017).  https://doi.org/10.1109/JAS.2017.7510349CrossRefGoogle Scholar
  13. 13.
    Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995).  https://doi.org/10.2307/258792CrossRefGoogle Scholar
  14. 14.
    Monostori, L., et al.: Cyber-physical systems in manufacturing. CIRP Ann. 65(2), 621–641 (2016).  https://doi.org/10.1016/j.cirp.2016.06.005CrossRefGoogle Scholar
  15. 15.
    Rein, A., Rieke, R., Jäger, M., Kuntze, N., Coppolino, L.: Trust establishment in cooperating cyber-physical systems. In: Bécue, A., Cuppens-Boulahia, N., Cuppens, F., Katsikas, S., Lambrinoudakis, C. (eds.) CyberICS/WOS-CPS -2015. LNCS, vol. 9588, pp. 31–47. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-40385-4_3CrossRefGoogle Scholar
  16. 16.
    Rousseau, D., Sitkin, S., Burt, R., Camerer, C.: Not so different after all: a cross-discipline view of trust. Acad. Manag. Rev. 23(3), 393–404 (1998).  https://doi.org/10.5465/AMR.1998.926617CrossRefGoogle Scholar
  17. 17.
    Schuh, G., Potente, T., Varandani, R., Hausberg, C., Fränken, B.: Collaboration moves productivity to the next level. Procedia CIRP 17, 3–8 (2014).  https://doi.org/10.1016/j.procir.2014.02.037CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Institute for Application-oriented Knowledge Processing (FAW)Johannes Kepler University Linz (JKU)LinzAustria
  2. 2.LIT Secure and Correct Systems Lab, Linz Institute of Technology (LIT)Johannes Kepler University Linz (JKU)LinzAustria
  3. 3.Pro2Future GmbHLinzAustria

Personalised recommendations