物联网安全和隐私信任管理技术的详细研究:挑战、趋势和研究方向

IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS High-Confidence Computing Pub Date : 2023-06-01 DOI:10.1016/j.hcc.2023.100127
Himani Tyagi , Rajendra Kumar , Santosh Kr Pandey
{"title":"物联网安全和隐私信任管理技术的详细研究:挑战、趋势和研究方向","authors":"Himani Tyagi ,&nbsp;Rajendra Kumar ,&nbsp;Santosh Kr Pandey","doi":"10.1016/j.hcc.2023.100127","DOIUrl":null,"url":null,"abstract":"<div><p>The Internet of Things is a modern technology that is directed at easing human life by automating most of the things used in daily life. The never-ending dependency on the network for communication is attracting adversaries to exploit the vulnerabilities of IoT. Therefore, this technology is facing some serious issues and challenges concerning security and privacy. These issues and challenges are the real motivation behind considering this study. Hence, this survey includes a discussion about security and privacy challenges as well as available solutions for IoT based wireless sensor networks. This systematic literature review (SLR) focuses particularly on a popular and applicable security approach known as Trust Management System (TMS). Firstly, all aspects of trust management, including trust indicators, trust properties, trust evaluation, trust building, trust models and the importance of those models for security and privacy, trust prediction methodologies, and ultimately trust-based attacks, are covered in this literature. Secondly, trust management schemes are classified into four groups based on the methodology used for trust-based security solutions in the IoT: cryptography-based, computational and probabilistic-based, information theory-based, and others. Then, an understanding of the problems and difficulties with current methodologies is given, along with suggestions for further research. Finally, the SLR is concluded by formulating the desirable characteristics of a trust management system in the IoT and proposing a trust model suitable for IoT networks.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 2","pages":"Article 100127"},"PeriodicalIF":3.2000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A detailed study on trust management techniques for security and privacy in IoT: challenges, trends, and research directions\",\"authors\":\"Himani Tyagi ,&nbsp;Rajendra Kumar ,&nbsp;Santosh Kr Pandey\",\"doi\":\"10.1016/j.hcc.2023.100127\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>The Internet of Things is a modern technology that is directed at easing human life by automating most of the things used in daily life. The never-ending dependency on the network for communication is attracting adversaries to exploit the vulnerabilities of IoT. Therefore, this technology is facing some serious issues and challenges concerning security and privacy. These issues and challenges are the real motivation behind considering this study. Hence, this survey includes a discussion about security and privacy challenges as well as available solutions for IoT based wireless sensor networks. This systematic literature review (SLR) focuses particularly on a popular and applicable security approach known as Trust Management System (TMS). Firstly, all aspects of trust management, including trust indicators, trust properties, trust evaluation, trust building, trust models and the importance of those models for security and privacy, trust prediction methodologies, and ultimately trust-based attacks, are covered in this literature. Secondly, trust management schemes are classified into four groups based on the methodology used for trust-based security solutions in the IoT: cryptography-based, computational and probabilistic-based, information theory-based, and others. Then, an understanding of the problems and difficulties with current methodologies is given, along with suggestions for further research. Finally, the SLR is concluded by formulating the desirable characteristics of a trust management system in the IoT and proposing a trust model suitable for IoT networks.</p></div>\",\"PeriodicalId\":100605,\"journal\":{\"name\":\"High-Confidence Computing\",\"volume\":\"3 2\",\"pages\":\"Article 100127\"},\"PeriodicalIF\":3.2000,\"publicationDate\":\"2023-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"High-Confidence Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2667295223000259\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"High-Confidence Computing","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2667295223000259","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 3

摘要

物联网是一项现代技术,旨在通过自动化日常生活中使用的大多数东西来缓解人类生活。通信对网络的无休止依赖正在吸引对手利用物联网的漏洞。因此,这项技术在安全和隐私方面面临着一些严重的问题和挑战。这些问题和挑战是考虑这项研究的真正动机。因此,本次调查包括关于安全和隐私挑战的讨论,以及基于物联网的无线传感器网络的可用解决方案。这篇系统的文献综述(SLR)特别关注一种流行且适用的安全方法,即信任管理系统(TMS)。首先,本文献涵盖了信任管理的各个方面,包括信任指标、信任属性、信任评估、信任建立、信任模型以及这些模型对安全和隐私的重要性、信任预测方法,以及最终基于信任的攻击。其次,根据物联网中基于信任的安全解决方案所使用的方法,将信任管理方案分为四组:基于密码学的、基于计算和概率的、基于信息论的和其他。然后,对当前方法论存在的问题和难点进行了理解,并提出了进一步研究的建议。最后,通过制定物联网中信任管理系统的期望特征,并提出适用于物联网网络的信任模型,得出了SLR的结论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A detailed study on trust management techniques for security and privacy in IoT: challenges, trends, and research directions

The Internet of Things is a modern technology that is directed at easing human life by automating most of the things used in daily life. The never-ending dependency on the network for communication is attracting adversaries to exploit the vulnerabilities of IoT. Therefore, this technology is facing some serious issues and challenges concerning security and privacy. These issues and challenges are the real motivation behind considering this study. Hence, this survey includes a discussion about security and privacy challenges as well as available solutions for IoT based wireless sensor networks. This systematic literature review (SLR) focuses particularly on a popular and applicable security approach known as Trust Management System (TMS). Firstly, all aspects of trust management, including trust indicators, trust properties, trust evaluation, trust building, trust models and the importance of those models for security and privacy, trust prediction methodologies, and ultimately trust-based attacks, are covered in this literature. Secondly, trust management schemes are classified into four groups based on the methodology used for trust-based security solutions in the IoT: cryptography-based, computational and probabilistic-based, information theory-based, and others. Then, an understanding of the problems and difficulties with current methodologies is given, along with suggestions for further research. Finally, the SLR is concluded by formulating the desirable characteristics of a trust management system in the IoT and proposing a trust model suitable for IoT networks.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
4.70
自引率
0.00%
发文量
0
期刊最新文献
Identity-based threshold (multi) signature with private accountability for privacy-preserving blockchain Navigating the Digital Twin Network landscape: A survey on architecture, applications, privacy and security Erratum to “An effective digital audio watermarking using a deep convolutional neural network with a search location optimization algorithm for improvement in Robustness and Imperceptibility” [High-Confid. Comput. 3 (2023) 100153] On Building Automation System security SoK: Decentralized Storage Network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1