Trust Based Security Model in IoT Ecosystem | IEEE Conference Publication | IEEE Xplore

Trust Based Security Model in IoT Ecosystem


Abstract:

In recent studies, IoT devices can be seen as having a form of social relations. One form of social relations between IoT objects is the level of trust. A trust-based sec...Show More

Abstract:

In recent studies, IoT devices can be seen as having a form of social relations. One form of social relations between IoT objects is the level of trust. A trust-based security model is an approach to creating a secure IoT environment. It can also be viewed as a method of determining the level of trust of an object in an IoT system. Confidence levels are obtained through calculations both directly and based on previous experience. The value of this belief calculation will be used as a recommendation of trusted objects. The main objective of this research was to design a trust-based security model on a network of non-infrastructure and limited resources, emphasizing to develop a trusted IoT ecosystem so that a secure environment would be established to run services within IoT systems and applications. The calculation of trust value in the proposed trust model is based on four metrics centrality, intelligence, direct observation, and indirect observation. This paper also presents the result of execution time testing of the trust calculation algorithm in various IoT devices.
Date of Conference: 13-14 December 2022
Date Added to IEEE Xplore: 10 March 2023
ISBN Information:
Conference Location: Yogyakarta, Indonesia

I. Introduction

Conventional security systems cannot be directly applied to IoT systems. This is because objects in the IoT are dynamic and different from the traditional computer network. Characteristics of objects in internet of things (IoT) systems include dynamic (often joining and separating) and resource limitations (battery, processor, memory) [1]. In addition, communication networks in IoT systems are often unstable. This condition makes the characteristics and security problems of IoT different from computer networks in general. One of the attacks on IoT is related to privacy. Data and user access restrictions are important so that IoT objects can only interact with trustworthy objects.

Contact IEEE to Subscribe

References

References is not available for this document.