CORE
🇺🇦
make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
research
Challenge-response trust assessment model for personal space IoT
Authors
D Hoang
T Nguyen
A Seneviratne
Publication date
19 April 2016
Publisher
'Institute of Electrical and Electronics Engineers (IEEE)'
Doi
Cite
Abstract
© 2016 IEEE. Internet of Things (IoT) embraces the interconnection of identifiable devices that are capable of providing services through their cooperation. The cooperation among devices in such an IoT environment often requires reliable and trusted participating members in order to provide useful services to the end user. Consequently, an IoT environment or space needs to evaluate the trust levels of all devices in contact before admitting them as members of the space. Existing trust evaluation models are based on resources such as historical observations or recommendations information to evaluate the trust level of a device. However, these methods fail if there is no existing trust resource. This paper introduces a specific IoT environment called personal space IoT and proposes a novel trust evaluation model that performs a challenge-response trust assessment to evaluate the trust level of a device before allowing it to participate in the space. This novel challenge-response trust assessment model does not require the historical observation or previous encounter with the device or any existing trusted recommendation. The proposed challenge-response trust assessment model provides a reliable trust resource that can be used along with other resources such as direct trust, recommendation trust to get a comprehensive trust opinion on a specific device. It can also be considered as a new method for evaluating the trust value on a device
Similar works
Full text
Available Versions
Crossref
See this paper in CORE
Go to the repository landing page
Download from data provider
info:doi/10.1109%2Fpercomw.201...
Last time updated on 05/06/2019
OPUS - University of Technology Sydney
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:opus.lib.uts.edu.au:10453/...
Last time updated on 13/02/2017