Abstract
The Internet of Things (IoT) is an environment of interconnected entities which are identifiable, usable and controllable via the Internet. Trust is necessary for a system such as the IoT as the entities involved should know the other entities they have to interact with. In order to guarantee trust in an IoT entity, it is useful to consider it during all its System Development Life Cycle (SDLC). The requirements phase is one of the first and the most important phases of the SDLC. In this phase, trust requirements must be elicited in order to guarantee that the built entity can be trusted. However, during this phase, it is possible to raise conflicts among requirements reflecting conflicting needs. Decision-making processes can be helpful in order to solve these issues. The Analytic Hierarchy Process (AHP) is a discipline that supports decision-makers in choosing between heterogeneous and conflicting alternatives, but it has several problems, especially if there are numerous parameters. Thus, we propose an AHP-like methodology called Pairwise Ordination Method (POM). Its aim is to solve issues among conflicting requirements deciding which one is the less important in order to modify or delete it, maximising the trust level of the IoT entity under development.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agudo I, Fernandez-Gago C, Lopez J (2008) A model for trust metrics analysis. In: International conference on trust, privacy and security in digital business. Springer, pp 28–37
Altuzarra A, Moreno-Jiménez JM, Salvador M (2007) A Bayesian priorization procedure for AHP-group decision making. Eur J Oper Res 182(1):367–382
Cabała P (2010) Using the analytic hierarchy process in evaluating decision alternatives. Oper Res Decis 20(1):5–23
Erickson J (2009) Trust metrics. In: International symposium on collaborative technologies and systems, 2009, CTS’09. IEEE, pp 93–97
Fernandez-Gago C, Moyano F, Lopez J (2017) Modelling trust dynamics in the internet of things. Inf Sci 396:72–82
Ferraris D, Fernandez-Gago C (2019) TrUStAPIS: a trust requirements elicitation method for IoT. Int J Inf Secur 1–17
Ferraris D, Fernandez-Gago C, Lopez J (2018) A trust by design framework for the internet of things. In: NTMS’2018—security track (NTMS 2018 security track). Paris, France
Friedenthal S, Moore A, Steiner R (2014) A practical guide to SysML: the systems modeling language. Morgan Kaufmann
Gambetta D et al (2000) Can we trust trust. Trust: making and breaking cooperative relations. 13:213–237
Hoffman LJ, Lawson-Jenkins K, Blum J (2006) Trust beyond security: an expanded trust model. Commun ACM 49(7):94–101
Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644
Kassab M, Kilicay-Ergin N (2015) Applying analytical hierarchy process to system quality requirements prioritization. Innov Syst Softw Eng 11(4):303–312
Kim B, Kim S (2017) An AHP-based interface and channel selection for multi-channel mac protocol in IoT ecosystem. Wirel Pers Commun 93(1):97–118
Lee MC (2014) Information security risk analysis methods and research trends: AHP and fuzzy comprehensive method. Int J Comput Sci Inf Technol 6(1):29
McKnight DH, Chervany NL (1996) The meanings of trust
Metcalfe B (1995) Metcalfe’s law: a network becomes more valuable as it reaches more users. Infoworld 17(40):53
Pang XY, Wang C (2014) The study of trust evaluation model based on improved AHP and cloud model in IoT. In: Advanced materials research, vol 918. Trans Tech Publ, pp 258–263
Pavlidis M (2011) Designing for trust. In: CAiSE (doctoral consortium), pp 3–14
Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 44(9):51–58
Saaty TL (1980) Analytic hierarchy process. Wiley Online Library
Taha A, Trapero R, Luna J, Suri N (2014) AHP-based quantitative approach for assessing and comparing cloud security. In: 2014 IEEE 13th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 284–291
Vaidya OS, Kumar S (2006) Analytic hierarchy process: an overview of applications. Eur J Oper Res 169(1):1–29
Voigt P, Von dem Bussche A (2017) The EU general data protection regulation (GDPR). A practical guide, 1st edn. Springer International Publishing, Cham
Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134
Acknowledgements
This work has received funding from the NeCS project by the European Union’s Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grant agreement No. 675320, the CyberSec4Europe project under SU-ICT-03 programme grant agreement 830929, and the EU project H2020-MSCA-RISE-2017 under grant agreement No. 777996 (Sealed-GRID).
This work reflects only the authors’ view and the Research Executive Agency is not responsible for any use that may be made of the information it contains.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Ferraris, D., Fernandez-Gago, C., Lopez, J. (2023). POM: A Trust-Based AHP-Like Methodology to Solve Conflict Requirements for the IoT. In: Dimitrakos, T., Lopez, J., Martinelli, F. (eds) Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-16088-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-16088-2_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-16087-5
Online ISBN: 978-3-031-16088-2
eBook Packages: Computer ScienceComputer Science (R0)