Trust Management in the Internet of Things

Trust Management in the Internet of Things

Nabil Djedjig, Djamel Tandjaoui, Imed Romdhani, Faiza Medjek
Copyright: © 2018 |Pages: 25
DOI: 10.4018/978-1-5225-5736-4.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The internet of things (IoT) is a new paradigm where users, objects, and any things are interconnected using wired and wireless technology such as RFID, ZigBee, WSN, NFC, Bluetooth, GPRS, and LTE. In this last decade, the IoT concept has attracted significant attention from both industrial and research communities. Many application domains may have significant benefits with IoT systems. These domains range from home automation, environmental monitoring, healthcare, to logistic and smart grid. Nevertheless, the IoT is facing many security issues such as authentication, key management, identification, availability, privacy, and trust management. Indeed, establishing trust relationships between nodes in IoT represents a primary security milestone to have reliable systems that exclude malicious nodes. However, trust management in an IoT constrained and ubiquitous environment represents a real challenge. This chapter presents an overview of trust management in IoT. This overview explains and demonstrates the usefulness of trust management and how it should be exploited in IoT.
Chapter Preview
Top

Security Requirements For Iot

IoT has specific characteristics such as heterogeneity, connectivity and ubiquity, resources limitation, self-organization, mobility, and scalability. Nonetheless, to fulfil IoT full deployment the following security requirements have to be addressed (Al-Fuqaha et al., 2015; Airehrour et al., 2016a).

Complete Chapter List

Search this Book:
Reset