Advertisement

A Comparative Analysis of Scalable and Context-Aware Trust Management Approaches for Internet of Things

  • Mohammad Dahman AlshehriEmail author
  • Farookh Khadeer Hussain
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9492)

Abstract

The Internet of Things – IoT – is a new paradigm in technology that allows most physical ‘things’ to contact each other. Trust between IoT devices is a critical factor. Trust in the IoT environment can be modeled using various approaches, such as confidence level and reputation parameters. Furthermore, trust is an important element in engineering reliable and scalable networks. In this paper, we survey scalable and context-aware trust management for IoT from three perspectives. First, we present an overview of the IoT and the importance of trust in relation to it, and then we provide an in-depth trust/reliable management protocol for the IoT and evaluate comparable trust management protocols. We also investigate a scalable solution for trust management in the IoT and provide a comparative evaluation of existing trust solutions. We then present a context-aware assessment for the IoT and compare the different trust solutions. Lastly, we give a full comparative analysis of trust/reliability management in the IoT. Our results are drawn from this comparative analysis, and directions for future research are outlined.

Keywords

Internet of things Trust management Trust protocol IoT scalable Context-aware assessment 

References

  1. 1.
    Bao, F., Chen, I.-R., Guo, J.: Scalable, adaptive and survivable trust management for community of interest based Internet of things systems. In: 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), pp. 1–7 (2013)Google Scholar
  2. 2.
    Bao, F., Chen, I.-R.: Dynamic trust management for internet of things applications. In: Proceedings of the 2012 International Workshop on Self-aware Internet of Things, pp. 1–6 (2012)Google Scholar
  3. 3.
    Chen, D., Chang, G., Sun, D., Li, J., Jia, J., Wang, X.: TRM-IoT: a trust management model based on fuzzy reputation for internet of things. Comput. Sci. Inf. Syst. 8(4), 1207–1228 (2011)CrossRefGoogle Scholar
  4. 4.
    Hersent, O., Boswarthick, D., Elloumi, O.: Z-wave. In: The Internet of Things: Key Applications and Protocols. John Wiley & Sons Ltd, Chichester (2011)Google Scholar
  5. 5.
    Ma, T., Liu, Y., Zhang, Z.: An energy-efficient reliable trust-based data aggregation protocol for wireless sensor networks. Int. J. Control Autom. 8(3), 305–318 (2015)CrossRefGoogle Scholar
  6. 6.
    Ning, H.: Unit and Ubiquitous Internet of Things. CRC Press, Boca Raton (2013)CrossRefGoogle Scholar
  7. 7.
    Nixon, P., Terzis, S.: Trust Management, vol. 2692. Springer-Verlag, Berlin-Heidelberg (2003)CrossRefzbMATHGoogle Scholar
  8. 8.
    Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: CA4IOT: context awareness for internet of things. In: Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, pp. 775–782 (2012)Google Scholar
  9. 9.
    Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the internet of things: a survey. IEEE Commun. Surv. Tutor. 16(1), 414–454 (2014)CrossRefGoogle Scholar
  10. 10.
    Pfister, C.: Getting Started with the Internet of Things. O’Reilly Media, Sebastopol (2011)Google Scholar
  11. 11.
    Ray, B.R., Abawajy, J., Chowdhury, M.: Scalable RFID security framework and protocol supporting internet of things. Comput. Netw. 67, 89–103 (2014)CrossRefGoogle Scholar
  12. 12.
    Ben Saied, Y., Olivereau, A., Zeghlache, D., Laurent, M.: Trust management system design for the Internet of things: a context-aware and multi-service approach. Comput. Secur. 39, 351–365 (2013)CrossRefGoogle Scholar
  13. 13.
    Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRefGoogle Scholar
  14. 14.
    Singh, M.P.: The Practical Handbook of Internet Computing. CRC Press, Boca Raton (2004)CrossRefGoogle Scholar
  15. 15.
    Tselentis, G., Domingue, J., Galis, A.: Towards the Future Internet: A European Research Perspective. IOS Press, Amsterdam (2009)Google Scholar
  16. 16.
    Uckelmann, D., Harrison, M., Michahelles, F.: Architecting the Internet of Things. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  17. 17.
    Wang, J., Bin, S.: Distributed trust management mechanism for the internet of things. In: Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013), pp. 2197–2200 (2013)Google Scholar
  18. 18.
    Wrona, K., Gomez, L.: Context-aware security and secure context-awareness in ubiquitous computing environments. In: Proceedings of the XXI Autumn Meeting of Polish Information Processing Society, pp. 255–265 (2005)Google Scholar
  19. 19.
    Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for internet of things. J. Netw. Comput. Appl. 42, 120–134 (2014)CrossRefGoogle Scholar
  20. 20.
    Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 21–32 (2014)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Mohammad Dahman Alshehri
    • 2
    • 1
    Email author
  • Farookh Khadeer Hussain
    • 2
  1. 1.College of Computers and Information TechnologyTaif UniversityTaifSaudi Arabia
  2. 2.School of Software, Centre for Quantum Computation and Intelligent Systems – QCIS, Decision Systems and e-Service Intelligence Laboratory - DeSIUniversity of Technology SydneySydneyAustralia

Personalised recommendations