A Framework of Online Social IoT System and Trust Management Scheme

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 4, Issue 2, No 5, 2016

Copyright: All Rights Reserved ©2016

Year of Publication: 2016

Author: MAMATHA,Dr.K.Ramakrishna

Reference:IJCS-140

View PDF Format

Abstract

Internet of things is going to make a world where physical objects are unlined in corporate into information networks in order to render advanced and intelligent services for human being. Trust management plays a vital role in IOT; there is a need for robust and efficient trust management. Various security issues result in several different requirements to the design of trust management. The propose a framework to separate desired properties of trust management for each type of security issues. A Iot of service provider needs to control access to their performance and providing personalized services. This entails that the service provider requests and stores personal attributes. Nevertheless, many service providers are not sure enough about the correctness of attributes that are revealed by the user during registration. Identity management systems purpose to increase the easy to use of authentication procedures. The exhibits a new approach for user-centric identity management scheme, using trusted modules. Along with the review, we also discover some open search query for future work and accordingly present a new idea over the trust management implementation.

References

[1] S. Adali et al., “Measuring Behavioral Trust in Social Networks,” IEEE International Conference on Intelligence and Security Informatics,Vancouver, BC, Canada, May 2010. [2] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A Survey,” Computer Networks, vol. 54, no. 15, Oct. 2010, pp. 2787-2805. [3] L. Atzori, A. Iera, G. Morabito, and M. Nitti, “The Social Internet of Things (SIoT) – When social networks meet the Internet of Things: Concept,architecture and network characterization,” Computer Networks, vol. 56, no. 16, Nov. 2012, pp. 3594-3608. [4] E. Borgia, “The Internet of Thingsvision: Key features, applications and open issues,” Computer Communications, vol. 54, 2014, pp. 1-31. [4] F. Bao, and I. R. Chen, “Dynamic Trust Management for Internet of Things Applications,” 2012 International Workshop on Self-Aware Internetof Things, San Jose, California, USA, September 2012. [5] F. Bao, Dynamic Trust Management for Mobile Networks and Its Applications, ETD, Virginia Polytechnic Institute and State University, May2013. [6] F. Bao, I. R. Chen, M. Chang, and J. H. Cho, “Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-BasedRouting and Intrusion Detection,” IEEE Trans. on Network and Service Management, vol. 9, no. 2, 2012, pp. 161-183. [7] F. Bao, I. R. Chen, and J. Guo, “Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of ThingsSystems,” 11th IEEE International Symposium on Autonomous Decentralized System, Mexico City, March 2013. [8] N. Bui, and M. Zorzi, “Health Care Applications: A Solution Based on The Internet of Things,” the 4th International Symposium on AppliedSciences in Biomedical and Communication Technologies, Barcelona, Spain, Oct. 2011, pp. 1-5. [9] B. Carminati, E. Ferrari, and M. Viviani, Security and Trust in Online Social Networks, Morgan & Claypool, 2013. [10] I. R. Chen, F. Bao, M. Chang, and J.H. Cho, “Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 5, 2014, pp. 1200-1210. [11] I. R. Chen, F. Bao, M. Chang, and J.H. Cho, “Trust-based intrusion detection in wireless sensor networks,” IEEE International Conference onCommunications, Kyoto, Japan, June 2011, pp. 1-6. [12] I.R. Chen, F. Bao, M. Chang, and J. H. Cho, “Trust management for encounter-based routing in delay tolerant networks,” IEEE Global Telecommunications Conference (GLOBECOM 2010), 2010, pp. 1-6.


Keywords

Data mining, Internet of Things, Secure Computing.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog