2012
DOI: 10.1186/1687-1499-2012-203
|View full text |Cite
|
Sign up to set email alerts
|

Internet of things: where to be is to trust

Abstract: Networks' creation is getting more and more required, anytime, anywhere. Devices that can participate on these networks can be quite different among them. Sensors, mobiles, home appliances, or other type of devices will have to collaborate to increase and improve the services provided to clients. In the same way, network configuration, security mechanisms establishment, and optimal performance control must be done by them. Some of these devices could have limited resources to work, sometimes even resources res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0
3

Year Published

2012
2012
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(25 citation statements)
references
References 21 publications
(22 reference statements)
0
22
0
3
Order By: Relevance
“…Secure and trustworthy computing typically focuses on resource-rich environments or hard security measures (e.g., encryption, signatures and certificates) that are typically energy hungry (e.g., Kumar and Madria (2015); Kothmayr et al (2013)). Only a few studies address the specific challenges of trust in IoT (e.g., Bao and Chen (2012) ;Lacuesta et al (2012)), and none take into consideration the characteristics of rugged environments, making their findings not applicable in such environments. Trust in IoT data collection at user level has recently received more public attention, with users becoming aware of the potential for mis-use of information collected (Brennan 2015).…”
Section: Using Sensors and Iot For Personal Monitoringmentioning
confidence: 99%
“…Secure and trustworthy computing typically focuses on resource-rich environments or hard security measures (e.g., encryption, signatures and certificates) that are typically energy hungry (e.g., Kumar and Madria (2015); Kothmayr et al (2013)). Only a few studies address the specific challenges of trust in IoT (e.g., Bao and Chen (2012) ;Lacuesta et al (2012)), and none take into consideration the characteristics of rugged environments, making their findings not applicable in such environments. Trust in IoT data collection at user level has recently received more public attention, with users becoming aware of the potential for mis-use of information collected (Brennan 2015).…”
Section: Using Sensors and Iot For Personal Monitoringmentioning
confidence: 99%
“…When devices trust each other, they prefer to share services and resources to certain extent. Trust management allows the computation and analysis of trust among devices to make suitable decision in order to establish efficient and reliable communication among devices [5,9,10]. Basically, trust management is the mechanisms to evaluate, establish, maintain, and revoke the trust between devices of the same or different networks within the IoT environment.…”
Section: Trust Management For the Internet Of Thingsmentioning
confidence: 99%
“…More recently, some work in trust management has been studied in the context of IoT [8][9][10][11][12][13][14][15].…”
Section: Trust Ismentioning
confidence: 99%
See 1 more Smart Citation
“…Toward addressing this issue the authors of "Internet of Things: Where to Be Is to Trust" [9] propose the adoption of direct peer-to-peer interaction and communities' creation to grant quick, easy, and secure access to users to surf the web. This way a secure spontaneous ad hoc network is created where access is established through the use of the trust chain generated by nodes.…”
mentioning
confidence: 99%