TY - JOUR
T1 - Trust and reputation for Internet of Things
T2 - Fundamentals, taxonomy, and open research challenges
AU - Ibrahim Abdalla Ahmed, Abdelmuttlib
AU - Ab Hamid, Siti Hafizah
AU - Gani, Abdullah
AU - Khan, Suleman
AU - Khan, Muhammad Khurram
PY - 2019/11/1
Y1 - 2019/11/1
N2 - Internet of things (IoT) is a contemporary technology, which links a tremendous number of devices with each other to ease the life via many useful services such as information exchange, monitoring, and control. IoT comprises different types of entities such as sensors and RFID tags, which mostly deployed in unattended, sensitive, and hostile territories. Due to rapid scalability and high heterogeneity, traditional security approaches fails to provide adequate security mechanisms for the current IoT infrastructure. The possibility of insecure and unattended deployment make some of IoT's entities subject to be captured physically by the attackers. As a result, the victim device can be exploited as a gateway to compromise the entire network. Furthermore, an entity may not work correctly because of resources constraints or instability of network's link. Recently, trust and reputation (TR) extended in IoT to monitor the behaviors deviation of IoT entities. Many TR models introduced, to incorporate the trust concepts in IoT as a new security paradigm. In this study, we provide thematic taxonomy for trust in IoT, considering several issues such as understanding of trust entity roles, trust properties, trust applications, levels of trust management, trust metrics, trust computation schemes and attacks on TR. Finally, the survey presents advances and open research challenges in the IoT's trust.
AB - Internet of things (IoT) is a contemporary technology, which links a tremendous number of devices with each other to ease the life via many useful services such as information exchange, monitoring, and control. IoT comprises different types of entities such as sensors and RFID tags, which mostly deployed in unattended, sensitive, and hostile territories. Due to rapid scalability and high heterogeneity, traditional security approaches fails to provide adequate security mechanisms for the current IoT infrastructure. The possibility of insecure and unattended deployment make some of IoT's entities subject to be captured physically by the attackers. As a result, the victim device can be exploited as a gateway to compromise the entire network. Furthermore, an entity may not work correctly because of resources constraints or instability of network's link. Recently, trust and reputation (TR) extended in IoT to monitor the behaviors deviation of IoT entities. Many TR models introduced, to incorporate the trust concepts in IoT as a new security paradigm. In this study, we provide thematic taxonomy for trust in IoT, considering several issues such as understanding of trust entity roles, trust properties, trust applications, levels of trust management, trust metrics, trust computation schemes and attacks on TR. Finally, the survey presents advances and open research challenges in the IoT's trust.
KW - Trust
KW - Reputation
KW - Trust computing
KW - Trust management
KW - Decision-making
KW - Internet of things
U2 - 10.1016/j.jnca.2019.102409
DO - 10.1016/j.jnca.2019.102409
M3 - Review article
VL - 145
JO - Journal of Network and Computer Applications
JF - Journal of Network and Computer Applications
SN - 1084-8045
M1 - 102409
ER -