Skip to main content

POM: A Trust-Based AHP-Like Methodology to Solve Conflict Requirements for the IoT

  • Chapter
  • First Online:
Collaborative Approaches for Cyber Security in Cyber-Physical Systems

Abstract

The Internet of Things (IoT) is an environment of interconnected entities which are identifiable, usable and controllable via the Internet. Trust is necessary for a system such as the IoT as the entities involved should know the other entities they have to interact with. In order to guarantee trust in an IoT entity, it is useful to consider it during all its System Development Life Cycle (SDLC). The requirements phase is one of the first and the most important phases of the SDLC. In this phase, trust requirements must be elicited in order to guarantee that the built entity can be trusted. However, during this phase, it is possible to raise conflicts among requirements reflecting conflicting needs. Decision-making processes can be helpful in order to solve these issues. The Analytic Hierarchy Process (AHP) is a discipline that supports decision-makers in choosing between heterogeneous and conflicting alternatives, but it has several problems, especially if there are numerous parameters. Thus, we propose an AHP-like methodology called Pairwise Ordination Method (POM). Its aim is to solve issues among conflicting requirements deciding which one is the less important in order to modify or delete it, maximising the trust level of the IoT entity under development.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agudo I, Fernandez-Gago C, Lopez J (2008) A model for trust metrics analysis. In: International conference on trust, privacy and security in digital business. Springer, pp 28–37

    Google Scholar 

  2. Altuzarra A, Moreno-Jiménez JM, Salvador M (2007) A Bayesian priorization procedure for AHP-group decision making. Eur J Oper Res 182(1):367–382

    Article  MATH  Google Scholar 

  3. Cabała P (2010) Using the analytic hierarchy process in evaluating decision alternatives. Oper Res Decis 20(1):5–23

    MathSciNet  MATH  Google Scholar 

  4. Erickson J (2009) Trust metrics. In: International symposium on collaborative technologies and systems, 2009, CTS’09. IEEE, pp 93–97

    Google Scholar 

  5. Fernandez-Gago C, Moyano F, Lopez J (2017) Modelling trust dynamics in the internet of things. Inf Sci 396:72–82

    Article  Google Scholar 

  6. Ferraris D, Fernandez-Gago C (2019) TrUStAPIS: a trust requirements elicitation method for IoT. Int J Inf Secur 1–17

    Google Scholar 

  7. Ferraris D, Fernandez-Gago C, Lopez J (2018) A trust by design framework for the internet of things. In: NTMS’2018—security track (NTMS 2018 security track). Paris, France

    Google Scholar 

  8. Friedenthal S, Moore A, Steiner R (2014) A practical guide to SysML: the systems modeling language. Morgan Kaufmann

    Google Scholar 

  9. Gambetta D et al (2000) Can we trust trust. Trust: making and breaking cooperative relations. 13:213–237

    Google Scholar 

  10. Hoffman LJ, Lawson-Jenkins K, Blum J (2006) Trust beyond security: an expanded trust model. Commun ACM 49(7):94–101

    Article  Google Scholar 

  11. Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644

    Article  Google Scholar 

  12. Kassab M, Kilicay-Ergin N (2015) Applying analytical hierarchy process to system quality requirements prioritization. Innov Syst Softw Eng 11(4):303–312

    Article  Google Scholar 

  13. Kim B, Kim S (2017) An AHP-based interface and channel selection for multi-channel mac protocol in IoT ecosystem. Wirel Pers Commun 93(1):97–118

    Article  Google Scholar 

  14. Lee MC (2014) Information security risk analysis methods and research trends: AHP and fuzzy comprehensive method. Int J Comput Sci Inf Technol 6(1):29

    Google Scholar 

  15. McKnight DH, Chervany NL (1996) The meanings of trust

    Google Scholar 

  16. Metcalfe B (1995) Metcalfe’s law: a network becomes more valuable as it reaches more users. Infoworld 17(40):53

    Google Scholar 

  17. Pang XY, Wang C (2014) The study of trust evaluation model based on improved AHP and cloud model in IoT. In: Advanced materials research, vol 918. Trans Tech Publ, pp 258–263

    Google Scholar 

  18. Pavlidis M (2011) Designing for trust. In: CAiSE (doctoral consortium), pp 3–14

    Google Scholar 

  19. Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 44(9):51–58

    Article  Google Scholar 

  20. Saaty TL (1980) Analytic hierarchy process. Wiley Online Library

    Google Scholar 

  21. Taha A, Trapero R, Luna J, Suri N (2014) AHP-based quantitative approach for assessing and comparing cloud security. In: 2014 IEEE 13th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 284–291

    Google Scholar 

  22. Vaidya OS, Kumar S (2006) Analytic hierarchy process: an overview of applications. Eur J Oper Res 169(1):1–29

    Article  MathSciNet  MATH  Google Scholar 

  23. Voigt P, Von dem Bussche A (2017) The EU general data protection regulation (GDPR). A practical guide, 1st edn. Springer International Publishing, Cham

    Google Scholar 

  24. Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134

    Article  Google Scholar 

Download references

Acknowledgements

This work has received funding from the NeCS project by the European Union’s Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grant agreement No. 675320, the CyberSec4Europe project under SU-ICT-03 programme grant agreement 830929, and the EU project H2020-MSCA-RISE-2017 under grant agreement No. 777996 (Sealed-GRID).

This work reflects only the authors’ view and the Research Executive Agency is not responsible for any use that may be made of the information it contains.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Davide Ferraris .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ferraris, D., Fernandez-Gago, C., Lopez, J. (2023). POM: A Trust-Based AHP-Like Methodology to Solve Conflict Requirements for the IoT. In: Dimitrakos, T., Lopez, J., Martinelli, F. (eds) Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-16088-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-16088-2_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-16087-5

  • Online ISBN: 978-3-031-16088-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics