Skip to main content
Log in

Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Trust is an essential component of every interaction we make. For some transactions we need very little trust, while for others we may be quite risk averse. In this paper we investigate trust in an Internet-of-Things environment. Can we trust devices? How can we quantify trust in devices?

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Thompson K. (1984) Refelctions on trusting trust. Turing award lecture. Communications of the ACM 27(8): 761–763

    Article  Google Scholar 

  2. Raymond E. S. (1999) The Cathedral and the Bazaar. O’Reilly Media, USA

    Google Scholar 

  3. Anderson R. (2005) Open and closed systems are equivalent (that is, in an ideal world). In: Feller Feller J., Fitzgerald B., Hissam S. A., Lakhani K. R. (eds) Perspectives on free and open source software. MIT Press, Cambridge

    Google Scholar 

  4. ISO, ISO/IEC 11990-1. (2009). Information technology: Trusted platform module—Part 1: Overview.

  5. 3GPP. (2011). TS 31.101 UICC-terminal interface; Physical and logical characteristics (Release 9), 01-2011.

  6. 3GPP. (2010). TS 33.320 security of home node B (HNB) / home evolved node B (HeNB) (Release 11), 12-2010.

  7. Chakraborty, R. S., Narasimhan, S. & Bhunia, S. (2009). Hardware Tojan: Threats and emerging solutions. In Proceedings of IEEE International High Level Design Validation and Test Workshop 2009 (HLDVT’09) (pp. 166–171).

  8. Tehranipoor, M. & Koushanfar, F. (2010). A survey of hardware Trojan taxonomy and detection. In Design & Test of Computers, 27(1), 10–25, IEEE Computer Society.

  9. Jin, Y., Kupp, N. & Makris, Y. (2009). Experiences in hardware Trojan design and implementation. In Proceedings of IEEE International Workshop on Hardware Oriented Security and Trust, 2009, (HOST’09) (pp. 50–57). August 2009.

  10. Falliere, N., Murchu, L. O. & Chien, E. (2011). W32.Stuxnet Dossier. Symantec, Version 1.4, February 2011.

  11. Køien G. M. (2009) Entity authentication and personal privacy in future cellular systems. River Publisher, Denmark

    Google Scholar 

  12. Liu, Y. & Wang, K. (2010). Trust control in heterogeneous networks for internet of things. In Proceedings of IEEE International Conference on Computer Applications and Systems Modelling (ICCASM) 2010 (pp. 632–636). IEEE Press, October 2010.

  13. Grandison, T. & Sloman, M. (2000). A survey of trust in internet applications. Communications Surveys & Tutorials, 3(4), 2–16. IEEE Communications Society.

    Google Scholar 

  14. Dolev, D. & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208. IEEE Information Theory Society, March, 1983.

    Google Scholar 

  15. West R. (2008) The psychology of security: Why do good users make bad decisions?. Communications of the ACM 51(4): 34–40

    Article  Google Scholar 

  16. Schneier B. (2003) Beyond fear: Thinking sensibly about security in an uncertain world. Springer, New York

    Google Scholar 

  17. Baron-Cohen S. (2003) The essential difference: Men, women and the extreme male brain. Penguin, London

    Google Scholar 

  18. Dawkins, R. (2006). The selfish gene. Oxford University Press, England. 30th aniversary edition.

  19. Dawkins, R. (2008). The extended phenotype. Oxford University Press, England. Revised and corrected edition.

  20. Robinson, J., Wakeman, I., Chalmers, D. & Horsfall, B. (2010). Trust and the internet of things. In Proceedings of TruLoco 2010: The Joint International Workshop on Trust in Location and Communications in Decentralised Computing.

  21. Baars B. J., Gage N. M. (2010) Cognition, brain, and consciousness: Introduction to cognitive neuroscience (2nd ed.). Academic Press, London

    Google Scholar 

  22. Goleman, D. (2006). Emotional intelligence: Why it can matter more than IQ. 10th Aniversary Edition, New York: Bantam. September 2006.

  23. Jøsang, A., Hayward, R. & Pope, S. (2006). Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference (ACSC’06), Australian Computer Society.

  24. Jøsang, A. & Bhuiyan, T. (2008). Optimal trust network analysis with subjective logic. In Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECUWARE’08). IEEE Computer Society, 2008.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Geir M. Køien.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Køien, G.M. Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context. Wireless Pers Commun 61, 495–510 (2011). https://doi.org/10.1007/s11277-011-0386-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-011-0386-4

Keywords

Navigation