101,841 research outputs found
Trust-based Approaches Towards Enhancing IoT Security: A Systematic Literature Review
The continuous rise in the adoption of emerging technologies such as Internet
of Things (IoT) by businesses has brought unprecedented opportunities for
innovation and growth. However, due to the distinct characteristics of these
emerging IoT technologies like real-time data processing, Self-configuration,
interoperability, and scalability, they have also introduced some unique
cybersecurity challenges, such as malware attacks, advanced persistent threats
(APTs), DoS /DDoS (Denial of Service & Distributed Denial of Service attacks)
and insider threats. As a result of these challenges, there is an increased
need for improved cybersecurity approaches and efficient management solutions
to ensure the privacy and security of communication within IoT networks. One
proposed security approach is the utilization of trust-based systems and is the
focus of this study. This research paper presents a systematic literature
review on the Trust-based cybersecurity security approaches for IoT. A total of
23 articles were identified that satisfy the review criteria. We highlighted
the common trust-based mitigation techniques in existence for dealing with
these threats and grouped them into three major categories, namely:
Observation-Based, Knowledge-Based & Cluster-Based systems. Finally, several
open issues were highlighted, and future research directions presented.Comment: 20 Pages, Conferenc
Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey
Distributed Ledger Technologies (DLTs), like Blockchain, are characterized by features such as transparency, traceability, and security by design. These features make the adoption of Blockchain attractive to enhance information security, privacy, and trustworthiness in very different contexts. This paper provides a comprehensive survey and aims at analyzing and assessing the use of Blockchain in the context of Distributed Trust and Reputation Management Systems (DTRMS). The analysis includes academic research as well as initiatives undertaken in the business domain. The paper defines two taxonomies for both Blockchain and DTRMS and applies a Formal Concept Analysis. Such an approach allowed us to identify the most recurrent and stable features in the current scientific landscape and several important implications among the two taxonomies. The results of the analysis have revealed significant trends and emerging practices in the current implementations that have been distilled into recommendations to guide Blockchain's adoption in DTRMS systems
Recommended from our members
Trust-based approaches towards enhancing IoT security: a systematic literature review
The continuous rise in the adoption of emerging technologies such as Internet of Things (IoT) by businesses has brought unprecedented opportunities for innovation and growth. However, due to the distinct characteristics of these emerging IoT technologies like real-time data processing, Self-configuration, interoperability, and scalability, they have also introduced some unique cybersecurity challenges, such as malware attacks, advanced persistent threats (APTs), DoS /DDoS (Denial of Service & Distributed Denial of Service attacks) and insider threats. As a result of these challenges, there is an increased need for improved cybersecurity approaches and efficient management solutions to ensure the privacy and security of communication within IoT networks. One proposed security approach is the utilization of trust-based systems and is the focus of this study. This research paper presents a systematic literature review on the Trust-based cybersecurity security approaches for IoT. A total of 23 articles were identified that satisfy the review criteria. We highlighted the common trust-based mitigation techniques in existence for dealing with these threats and grouped them into three major categories, namely: Observation-Based, Knowledge-Based & Cluster-Based systems. Finally, several open issues were highlighted, and future research directions presented
Recommended from our members
Guest Editorial: Special Issue on Frontiers in Trust Management
Information and Communication Technologies (ICT) are becoming increasingly important in the way we organize our lives, our workplaces and our societies. ICT allows people and organisations, that have never interacted with each other in the past, to initiate new and mutually beneficial businesses across the world. This means that personal and business information is increasingly being communicated across interpersonal, inter-business and international borders. Keeping this information safe and protecting the fragile IT infrastructure from criminals is a growing problem in most societies. Unfortunately, traditional security technologies based on a strong perimeter defence work poorly in an inter-connected world that obeys Metcalfe’s law which states that “the value of a network is proportional to the square of the number of connected users of the system”, i.e., where there is a strong incentive for interactions across the different borders. During the past decade, trust management has emerged as a promising solution to many challenges in networks and distributed systems as well as emerging problems in computer security and privacy.
This special issue on “Frontiers in Trust Management” attempts to highlight some of the latest re- search addressing those challenges. It collects a series of papers on trust management issues that extends papers and ideas presented at the Fifth IFIP WG 11.11 International Conference on Trust Management or one of the affiliated workshops in Copenhagen, June 27 – July 1, 2011
- …