2019
DOI: 10.1002/cpe.5355
|View full text |Cite
|
Sign up to set email alerts
|

A trust assurance technique for Internet of things based on human behavior compliance

Abstract: The advent of the Internet of Things (IoT) has radically changed the way in which computations and communications are carried out. People are just becoming another component of IoT environments and, in turn, IoT environments are becoming a mixture of platforms, software, services, things, and people. The price we pay for such dynamic and powerful environment is an intrinsic uncertainty and low trustworthiness due to its opaque perimeter, the multitude of different data sources with unknown providers, and uncer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…The price one pays for such dynamic and powerful environment is an intrinsic uncertainty and low trustworthiness due to its opaque perimeter, the multitude of different data sources with unknown providers, and uncertain responsibilities. In the contribution by Anisetti et al, “A Trust Assurance Technique for IoT based on Human Behavior Compliance,” the authors took a different approach and put forward the idea that, in many cases, the behavior of people owning smart devices can contribute to the evaluation of the trustworthiness of collected data and, in turn, of the whole decision process 16 . The authors therefore defined an assurance methodology based on data analytics evaluating the compliance of people to behavioral policies.…”
Section: Themes Of This Special Issuementioning
confidence: 99%
“…The price one pays for such dynamic and powerful environment is an intrinsic uncertainty and low trustworthiness due to its opaque perimeter, the multitude of different data sources with unknown providers, and uncertain responsibilities. In the contribution by Anisetti et al, “A Trust Assurance Technique for IoT based on Human Behavior Compliance,” the authors took a different approach and put forward the idea that, in many cases, the behavior of people owning smart devices can contribute to the evaluation of the trustworthiness of collected data and, in turn, of the whole decision process 16 . The authors therefore defined an assurance methodology based on data analytics evaluating the compliance of people to behavioral policies.…”
Section: Themes Of This Special Issuementioning
confidence: 99%
“…In this context, node trustworthiness is fundamental to the development of IoT networks for decision processes based on observation. Although some security methods provide high data trustworthiness, they are difficult to apply in an IoT environment due to cost and performance reasons [7].…”
Section: Introductionmentioning
confidence: 99%
“…Direct trust and indirect trust were measured from the network, and the best node was found for transmission. An assurance policy template [7] was applied for the trust measure based on the data collection process and human behavior. The assurance policy instance is applied in the assurance policy template for the selection of node.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations