2020
DOI: 10.1155/2020/6612919
|View full text |Cite
|
Sign up to set email alerts
|

Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges

Abstract: With the increasing day-to-day acceptance of IOT computing, the issues related to it are also getting more attention. The current IOT computing infrastructure brings some security challenges concerned with the users/customers and CSP. The users can store their confidential data at IOT storage and can access them anytime when they need. Lack of trust exists among IOT users and between IOT users and CSP. The prevention of this risk is a big research issue and it needs to be solved. There is a need for trusted IO… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…The simulation experiments of the proposed BFPSMTM and the comparative CATEM, 13 ONDM, 14 MPTPM, 11 and GTMF 12 schemes are conducted using IoT Simulator. In specific, NET‐based Distributed Trust Management Simulator 19 is utilized for facilitating the option of implementing the proposed dynamic trust management model that aids in calculating the trust value of a node.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The simulation experiments of the proposed BFPSMTM and the comparative CATEM, 13 ONDM, 14 MPTPM, 11 and GTMF 12 schemes are conducted using IoT Simulator. In specific, NET‐based Distributed Trust Management Simulator 19 is utilized for facilitating the option of implementing the proposed dynamic trust management model that aids in calculating the trust value of a node.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…Faisal et al 11 proposed a Multiple Perspective Trust Platform Module (MPTPM) for utilizing it into the IoT computing environment to attain cryptographic operations and offer hardware‐based security. It was proposed with the capability of multiple perspective trust evaluation for resisting and handling the challenges in cybersecurity.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, please note that in our analysis we focused on security solutions provided at various layers of IoT platforms (especially at communication, service, and management ones like secure communication channels to avoid intrusions such as man-in-the-middle attacks; data encryption solutions to ensure data are safely encrypted while in transit and at rest; firewalls and intrusion prevention systems as foreseen by ISO to detect unwanted intrusions and prevent malicious activities; digital certificates for identification and authentication so as to verify the integrity of other cloud platforms or third party applications; policy enforcement, regular auditing, remote control, and security updates dispatching) but we did not deal with security features related to device’s hardware and software. To this extent, some manufacturers are introducing chip security in the form of trusted platform modules that act as a root of trust by protecting sensitive information and credentials (i.e., not releasing encryption keys outside the chip) [ 67 ]; secure booting to ensure only verified software will run on the device; physical security protection (e.g., full metal shield covering all internal circuitry) to guard against tampering if an intruder gains physical access to the device [ 68 ]. For example, in Microsoft Azure, device IDs can be associated with a device during manufacturing (that is, flashed in a hardware trust module) or can use an existing fixed identity as a proxy (for example CPU serial numbers).…”
Section: Summary and Discussionmentioning
confidence: 99%
“…To ensure authentication, several techniques can be implemented. Some examples of these techniques include hardware root trust, trusted execution environment [38], trusted platform module [39], and digital certificates. Furthermore, any lightweight encryption can be implemented to mitigate the risk of possible security attacks at this layer [40].…”
Section: A Physical Layermentioning
confidence: 99%