SlideShare a Scribd company logo
1 of 33
INS653X Project Management
Answer:
Introduction
In this digital world, internet networks and emerging technologies are proliferating,
enabling companies to interconnect multiple systems easily and manage business problems.
IoT is an abbreviation for the internet of things an emerging technology that helps business
communities to propose significant communication platforms and link various devices,
networks and servers through a single system (Xiao, Sidhu, and Christianson, 2015). The
prominent feature of IoT technology is that it provides communication networks and the
ecosystem to exchange data without requiring human assistance so that remote access
controls can be developed within businesses. Using IoT-enabled devices, it is easy for the
users to exchange data and receive real-time information by which complexity and
difficulties can be managed. Business processes, devices, networks and systems can be
connected with the IoT technology and remote accessibility can be provided that can enable
the companies to perform business operations remotely (Abdullayeva, 2016). In terms of
speed, IoT is capable to provide a faster data transmission speed that enables users to
exchange data in less time and receive proper updates from companies.
However, IoT is connected with computing networks and communication channels that can
increase security threats and hacking problems. The larger datasets can be shared over
internet networks and hackers can target IoT networks easily to produce data breach
incidents (Tormo, Mármol, and Pérez, 2015). Due to security concerns, it is challenging for
the companies and users to build trust regarding the implementation of IoT which
negatively reduces the reputation of the IoT networks. The existence of security risks and
any vulnerabilities in the IoT systems will always affect the privacy of sensitive data.
Companies can suffer from data breaches and ethical problems and influence the trust of
the users this is based on what happened to AT&T when they were slammed with a fine of
$25million by FCC due to a data breach.
It is a challenging task for evaluating the trustworthiness of the entities on the internet
network and also increases hacking and cyber-attacks (Ahmed, et al., 2019). The primary
motivation behind this research is that companies are moving toward IoT networks for
which it is essential to review and manage the security and trust-related problems. The
companies need to focus on security and confidentiality and follow proper configuration
processes so that malicious codes and unauthorized activities can be minimized and trust
levels can be improved. Kokoris, et al., (2016) defined trust management as a process of
managing security risks and issues from IoT networks to protect personal details and
computing systems. Therefore these models are highly recommended to the cyber security
area for enhancing the various approaches which are beneficiary for users.
This research will provide more information on network sharing and methods for
evaluating trust and reputation in IoT devices. Also, it enhances the security of those
addresses that have concerns relating to both security and privacy. In this research, the
concept of IoT technology will be reviewed and the implication of security on trust and
reputation in IoT will be analyzed (Yan, Zhang, and Vasilakos, 2014). There are many works
which have been done in this instance to gain in-depth insight into trust and reputation
methods used for IoT networks. Previous findings will be reviewed to manage research
gaps so that we can provide better results for the IoT environment for many
organisations. The presence of cyber threats and insider vulnerabilities in the IoT networks
can affect communication channels and the security of the transmitted data can be reduced.
According to Kravari and Bassiliades (2019), more than 70% of the companies collect
customer data using IoT-based communication networks and store it in databases that can
be targeted by hackers easily. Kowshalya and Valarmathi, (2017) presented a trust
management program that shows that building security and data protection programs can
increase complexity in businesses. It is difficult for the companies to deal with the security
and privacy concerns due to which trust and reputation can be influenced and data
breaches or ethical issues can be posed easily.
When looking at the term "trust", can be defined using different ways that have derived
from different disciplines under a different lens, which depend largely on the field being
perceived. Through such approaches (Abdalzaher et al., 2019), it will be relatively easy to
find the connection that exists when considering trust in IoT. The field of view on the trust
includes the following:
Philosophy – in this, trust is based on reliance since it can be projected on the aspects of
betrayal happening in the process. Meanwhile, reliance is checked based on disappointment
caused (Azzedin, and Ghaleb, 2019).
Psychology – here trust is based on the beliefs of how different situation needs to be
handled when looking at people's background and community.
Network and communication – capture the trust of the user to establish the relationship
built from different sets surrounding scalability and reliability (Saied, et al., 2013).
In IoT technology, trust is connected with the security and confidentiality of personal
details as system security and privacy are important for building trust among customers.
Mainly, companies collect data from the users through IoT-enabled devices and store it in
databases where hacking problems and risks can affect the privacy of collected data and
reduce trust from users easily (Asiri, and Miri, 2016). Trust is based on the security and
confidentiality of sensitive data and companies need to protect the data of users. Companies
need to protect users' data from cyber-criminals while accessing IoT networks to improve
trust and reputation. The social networking model mainly follows three parameters for
evaluating trust and reputation: honesty, community interest and cooperativeness. So, this
dynamic model is capable to find the best parameters of trust and maximize the
effectiveness of IoT networks. This research will review various methods and approaches
used for trust and reputation. Moreover, effective recommendations and taxonomy will be
developed to increase the security and confidentiality of IoT networks and will also improve
trust levels while accessing IoT networks (Rizvi et al., 2018).
Aims And Objectives Of The Research
The primary focus of this research is based on reviewing the trust and reputation modelling
in IoT. A trust framework is designed to counteract a certain type of threat. Each company
has its own unique set of risks and vulnerabilities that can be discovered by doing a data
flow analysis based on use cases. A threat profile, at its core, reveals the kind and
motivations of potential attackers.
Security strength is evaluated by a trust model, which then determines a trustworthiness
score. When evaluating the safety of cloud services, it is important to do so along several
dimensions, and these are all included in a trust value. The security of service and the
reliability of the model can be evaluated using the CSA (Cloud Security Alliance) service
challenges.
The following are objectives developed:
Understanding the enhanced concept of trust models to understand the concept of IoT
To review the challenges to trust and reputation in IoT technology
To evaluate various methods or approaches of trust and reputation for IoT
Research Questions
Below are some of the outline research questions:
What are the characteristics of IoT technology?
What are involved risk factors and security concerns affecting trust and reputation in IoT?
What are the methods and approaches used for evaluating trust and reputation in IoT
networks?
Structure Of The Dissertation
The format of this research contains various sections and chapters including an
introduction, review of the literature, methodology, results and discussion and finally a
conclusion. The introduction section will help to gain a brief overview of topics placed in
this research and propose the aim and objectives. The literature review has a major
contribution when looking at different studies and research since it helps to review the
previous findings and obtain effective information for addressing research questions and
gaps. A research methodology is beneficial for developing effective research plans and
frameworks to complete the study with larger quality and effectiveness. Results and
discussion sections are reliable and help to review the collected data from the literature
review for gaining effective findings and results. The conclusion section will provide a
summary of the entire research along with the recommendations and future direction.
Background And Literature Review
IoT uses wireless sensor networks which are capable to connect numerous computing
devices and systems easily and perform communication-related activities without human
assistance. In this generation, companies are shifting towards digital technologies to
increase operational performance and IoT is a common technology implemented in
businesses to propose remote access controls and perform business operations
remotely (Alofi, Bahsoon, and Hendley, 2021). IoT is an effective technology that enables
companies to deal with complexity and data sharing problems so that real-time updates can
be received and problems can be resolved significantly.
However, IoT is connected with the communication networks and internet servers which
are not capable to manage security concerns and exchanged data can be accessed by the
cyber-criminals the cyber-criminals can access data. These researchers (Duan, et al., 2014)
have identified that security risks and threats enable the hackers to target communication
systems and databases of the companies and IoT networks are less able to defend against
cyber-attacks and criminal activities. It is challenging for companies to deal with the
security threats and vulnerabilities due to which trust and reputation-related problems can
be increased (Arabsorkhi, Haghighi, and Ghorbanloo, 2016). Hackers can access the
collected data from customers and IoT networks can be linked with the malicious codes by
which remote accessibility can be proposed and confidentiality of sensitive data can be
decreased. It is difficult for companies to identify and review the security risks associated
with the IoT networks and suffer from ethical and trust-related problems.
Introduction
Review of literature when conducting research acts as a major advantage and contribution
while conducting research. Since it helps to gain effective information related to the
research topic by reviewing the previous studies and papers. In this research, a literature
review is selected while looking at car sharing systems functionality, to understand the
challenges and problems associated with trust and reputation. To select papers, various
keywords are included such as security issues in IoT, trust models for IoT, trust and
reputation issues in IoT, trust approaches and taxonomy for IoT and many more. This
section will cover various points such as the key concept of IoT, challenges related to trust
and reputation, and trust and reputation methods.
BTRM-WSN is a bio-inspired trust evaluation architecture for wireless sensor nodes, whose
unique feature is the precise use of an ant colony system to assist a node in locating the
most trusted sensor offering a specific service, as well as the most reputable method to
access that sensor. To accomplish this, ants are dispatched and dispersed throughout the
system, leaving pheromone traces in their wake that will aid future ants in following the
correct path.
Characteristics Of IoT
Azzedin and Ghaleb, (2019) reported that IoT is an advanced communication technology
that connects computing devices, networks and servers through a single system. IoT-
enabled devices allow companies and users to access computing devices and
communication systems from any location. In this digital world, companies are accessing
emerging technologies and digital systems where IoT helps the companies to build effective
communication infrastructure and exchange data over multiple networks at a time. Baqa, et
al., (2018) agreed and stated that IoT is an effective technology that interconnects
tremendous devices and systems together without requiring human assistance so that the
level of communication can be improved. In the context of businesses, IoT plays a major
contribution in receiving real-time information and enables customers to address queries
and problems in less time (Ma, Liu, and Meng, 2020). Connectivity is one of the major
characteristics of IoT technology that provides a platform to interconnect the number of
computing systems, networks and devices to perform data transmission-related activities.
Figure 2.1: Characteristics of the Internet of Things (Bennaceur et al., 2021)
The extraction of knowledge from the developed data is significant for companies where
business intelligence and identification of business problems can be managed easily.
Bennaceur et al., (2021) reported that scalability is a major feature of IoT technology that
enables companies to handle massive data and manage data storing-related concerns. IoT is
now connected with advanced technologies such as artificial intelligence, cloud computing
as well as big data analytics. Using such features, it is easy for companies to develop remote
access controls and automated systems so that business operations and communication-
related activities can be done remotely (Mendoza, and Kleinschmidt, 2015). In future,
companies will be dependent on IoT networks and will build effective digital systems and
communication infrastructures.
Challenges Related To Trust And Reputation
Fernandez, et al., (2017) reported that IoT provides a system to connect networks, servers,
devices and machines and process communication-related activities. Using IoT-enabled
devices, higher data communication networks can be developed for increasing the speed of
data transmission and also enables the companies to receive real-time updates. However,
IoT is less capable to manage insider threats and security vulnerabilities experienced by
companies and users through cyber-attacks and criminal incidents. Fortino, et al., (2020)
agreed and stated that cyber-criminals have the potential to develop malicious programs
and target IoT-based communication networks to enter into the servers and perform
hacking activities.
Figure 2.2: Trust and reputation in IoT (Jabeen, et al., 2018)
It is challenging to evaluate the trustworthiness of entities on the IoT networks due to
which confidentiality of sensitive data can be affected easily. The term trust is mainly
associated with security as system privacy is necessary to obtain trust and IoT is less able to
manage security issues that can influence trust and reputation negatively. Jabeen, et al.,
(2018) reported that trust management plays a major role in the context of IoT security,
allowing effective data mining and fusion for delivering qualified facilities.
Major three risk factors are identified as increasing security-based trust and reptation
problems in IoT networks such as lack of understanding, improper security measures and
misconfiguration. Janiszewski, (2020) agreed and observed that lack of awareness is a
major factor among users that increase insider threats and enables hackers to perform
unauthorized activities. In order to manage such risk, a trust management model is
developed that enables the companies to deal with the understanding problems and
increase the security level. More than 60% of the companies have implemented IoT
networks, most of them are found in silicon valley and included simple security programs
which are less capable to control cyber-threats and malicious activities due to which trust
regarding the confidentiality of data can be affected (Ma, Liu, and Meng, 2020).
Neisse, et al., (2015) identified that in this digital environment, IoT networks are vulnerable
to security risks as incomplete or distorted information can be shared by hackers that can
affect trust and reputation. Implementing secured communication infrastructure in IoT
devices can help companies control and reduce trust-based security issues. Companies need
to develop proper trusting and reputation models to manage security and trust problems
and increase the privacy of database systems from cyber-attacks. The previous studies did
not compare the trust and reputation models used for the IoT networks. It is challenging to
select a suitable model for improving the trust and privacy of the IoT networks and systems.
This research focuses on the specific trust models and frameworks and the taxonomy of
trust models and protocols created to deal with the trust and reputation problems in IoT.
Trust As A Taxonomy In IoT
When standard security paradigms can indeed be enforced owing to a lack of centralized
authority and an insufficient understanding of the environment, trust management is
considered a promising solution to promote collaboration between entities. However, there
is a dearth of workable approaches in the existing literature for collecting and
disseminating information for efficient trust evaluation and for providing users with trust
data. This could make it so that people have a hard time grasping and accepting a trust
management solution. In order to build and develop a trust management platform that can
be readily accepted by users before practical implementation, this study presents users-
driven trust modelling & management strategy. To prove the efficacy of this approach, we
show how it may be implemented in the creation of a reputation system for a mobile
application.
A thematic taxonomy is proposed for the trust and reputation in IoT networks to deal with
the trust-related challenges (Copigneaux, 2014). The thematic taxonomy is developed
relying on major seven factors including roles based on trust entities, trust management
level, trust properties, trust computation, trust metrics, trust attacks and many more (Li,
White, and Clarke, 2021). Such factors are identified to represent a trust-based IoT
environment that helps review and evaluate the challenges and risks associated with IoT
security and trust.
Figure 2.3: Taxonomy of Trust in IoT (Jabeen, et al., 2018)
A) Trust Metrics
The major aim of trust metrics is to examine standards and security patterns to evaluate
and measure trust among IoT networks (Nitti, Girau, and Atzori, 2013). A suitable trust
management system mainly relies on the best trust metrics that can help for monitoring the
interactive facilities among IoT entities (Lingda, et al., 2021). Major two types of metrics are
included such as social trust metrics and QoS trust metrics. QoS metrics are more effective
and reliable and can help provide quality services to the users and the proper security so
that trust can be improved. Modelling and understanding trust is made possible by trust
measures. They have intimate ties to established structures of trust. PGP is an example of a
program that uses a binary trust metric. Trust metrics in computing history can be traced
back to early examples such as eBay's Feedback Rating.
B) Trust Metrics On Reputation And Recommendation
Reputation is considered both in the social side's product and process section. The social
section is deemed to be a product since the entity of opinion arises from it. It also influences
how information flows within the Social Internet of Things (SIoT). Examples of this include
those developed in firms like eBay as well as the Keynote.
A centralized authority of trust is used to help maintain the feedback that is used for the
rating process. When looking at the same process in distributed systems, reputation is built
from what has been there for a certain number of times and comes from both behaviour and
customers (Urena, et al., 2019). For smooth operation, it requires the system to apply a
heuristic algorithm that does the update and integration process.
Through the above process is relatively easy for decisions to be made by humans as
compared to a system for a recommendation. Since reputation and recommendation can be
done much faster while relying on the existing surrounding. Through this, it is best for a
reputation system to be developed, which will handle the trust service platform. When
handling the trust service platform, the following modules are considered to be the most
important section (Bao, Chen, and Guo, 2013):
The feedback mechanism is also known as Reputation Measurement and Evaluation.
Propagation
Maintenance
While handling the SIoT the following components are needed during the development
process since they form the basic components:
Trust Analysis and Management – this module plays a key role in ensuring that the system
has been implemented based on the needed desire (Sicari, et al., 2015). This part normally
appears in many systems that are closely related to the trust mechanism.
Trust Broker – this section is the one responsible for providing trusted knowledge when
handling different applications and services that are operating within SIoT (Truong, et al.,
2016). Information needed must be registered previously as a requirement before using any
trust service platform.
Trust Agent – this component is known for collecting data related to trust ranging from
physical to domains found on social SIoT (Tr?ek, 2018). The data collected can fall under
opinion as an entity that contains recommendations or even feedback from other
applications.
C) Entity Role
In the context of IoT networks, trust relation contains two entities such as trustee and
trustor which are dependent on every other for sharing the common interest in the
communication networks. The trustor requires to have confidence in the trustees in regards
to honesty, beliefs and benevolence.
D) Trust Properties
Trust properties are mainly derived from the social science to the cyber-attacks and contain
various properties for IoT security and trust such as asymmetry, subjectivity, partial
transitivity and context sensitivity. Jabeen, et al., (2018) reported that context sensitivity is
one of the major trust properties for the IoT networks that need to be included in the
communication infrastructure. Trust properties are mainly used for evaluating and
reviewing the security-related concerns from IoT networks and building strong
communication programs so that trust levels can be improved.
Properties To Be Considered When Looking At Trust
A) Propagative
This section of trust has been studied by many researchers when handling computing
features in IoT. According to Chen, Guo, and Bao (2014), this property is useful in assessing
risk from schemes used in entity recognition and assessment system being built. The
entities of the system are deemed extensive mostly on trust, and recommendation, and have
ad hoc networks normally use short paths when connecting the entities.
B) Dynamic
According to Li, White, and Clarke (2021), this property looks at changes that normally
happen when different entities interact based on the trust existing. Since it can be decreased
or increased depending on the experiences gained in the process of interaction. Different
measures have been placed in computing to determine ways through which measurement
and quality of dynamics can be placed into consideration when handling computers. These
different mechanisms are placed in terms of rewards and penalties whenever interaction or
transaction occurs.
C) Subjective
Trust is more subjective and relies mostly on the interaction that has been conducted
between different parties (Copigneaux, 2014). The reason for this is that various users have
their way of perceiving what is trustworthy. Opinion and reasoning may vary based on the
activity being done at the end of a particular event.
D) Context-Dependent
This property mostly relies on the trust score being issued that depends on the context of
interaction. The best example, in this case, can be on solving two problems existing within a
farm. Where one is a prediction of yield and the other problem is detecting diseases that are
likely to break. In this, one company can be trusted to handle the production yield but not
the detection of disease.
E) Trust Applications
It is demonstrated that trust applications can be applied over IoT networks to manage trust-
related issues. Major two types of applications are included in the IoT trust such as service
management and security mechanism. The trust-based security mechanism is more
effective and beneficial that developing effective security programs and plans to deal with
the insider threats and vulnerabilities from IoT networks and increase trust levels (Saied, et
al., 2013). On the other hand, trust-based service management delivers effective services to
the IoT technology for increasing the alignment of IoT efforts with smart devices.
F) Trust Management Levels
Trust management acts as a major contribution in the IoT that helps to control and manage
the factors affecting trust and reputation in wireless communication networks. Trust
management goals can be achieved at various levels that include data perception, identity
trust, the transmission of data, and preservation of privacy and users and
applications (Azzedin, and Ghaleb, 2019), for which data perception and privacy
preservations are major levels that need to be covered in trust management so that privacy
and confidentiality can be improved.
G) Trust Computation Scheme
Trust computation is a kind of process which is mainly included for extracting
trustworthiness information in regards to the IoT entities (Chen, Guo, and Bao, 2014). It is
mainly divided into various sections such as the composition of trust, propagation, trust
update, formation and trust aggregation. Trust formation and updating both are major
schemes used in the IoT networks due to their capability to build trust among users by
updating security programs and providing quality services through IoT networks.
H) Trust Attacks
Trust attacks are mainly performed by cyber-criminals based on malicious programs and
target communication channels linked with the IoT networks. Using security threats and
attacks, it is easy for cyber-criminals to perform data breaches and criminal activities over
IoT networks (Azzedin, and Ghaleb, 2019). Trust attacks are mainly divided into three
categories such as biased recommendation, inconsistent behaviour and identity attacks. It is
found that identity attacks are more common and easily performed by hackers over IoT
networks and provide easy accessibility of the communication channels and database
systems.
Methodology: Introduction
Research methodology has a major contribution to the research that can manage the
research problems and focus on the research aims and objectives. The development of
effective methodologies can lead to increase research quality and provide better ways to
address research gaps (Urena, et al., 2019). The methodology section intends to increase
understanding and knowledge in the field of IoT and trust and reputation modelling.
Numerous research methods are selected for this project such as research design, research
approach, philosophies, data collection and many more.
Since the introduction of the internet, both the quantity and variety of information sources
have expanded at an exponential rate. These days, knowledge is both a commodity and a
necessity in the decision-making process. It is common practice for businesses to share
some of the data they already have in order to obtain additional data that could be useful to
their operations. This data may be sensitive, so businesses need to know if they can have
faith in the partners they're sharing it with. To address this predicament, various trust
models were developed.
To examine the dynamics of relationships, trust models apply rational principles. Whenever
a computer operating a trust model interacts with another agent, it evaluates that agent to
establish its level of trustworthiness. All interactions between agents are governed by this
single value of trust. At the same time, values below that level are viewed with scepticism.
The problem is these trust models are so broad and different from one another that it's hard
to tell which ones tackle which aspects of the trust idea. This study suggests a set of factors
to be used in evaluating different security models in order to discover the problems that are
solved by particular models. This set of requirements can be broken down into four broad
classes. Limitations on space mean only one of these criteria may be examined in depth,
followed by an example study of a trust model to show how these criteria are applied in
practice.
Research Philosophy
Research philosophy is mainly used in the studies to create effective frameworks to address
research problems and gain depth information regarding research themes (Ureña, et al.,
2019). Two major types of philosophies are included in the studies: positivism and
interpretivism. Positive philosophy is capable to provide observational research based on
the research objectives and requires developing and testing the research hypotheses. As
opposed, interpretivism is a branch of Epistemology capable of focusing on the research
problems and developing effective data-gathering ways to address the identified problems
and issues (Bao, Chen, and Guo, 2013). An interpretivism philosophy aims to provide in-
depth analysis in regards to the research topic by providing observational research.
In this research, an interpretivism philosophy is selected as it can propose effective
approaches and plans to gain in-depth insight into research questions. Using such a
philosophy, there is no need to develop research hypotheses and testing processes by which
complexity can be reduced and objectives can be achieved effectively.
Research Approach
A research approach is reliable and beneficial for the dissertation that has the capability can
develop significant research plans and outlines based on the objectives and research
themes. It is capable to propose significant data collection platforms for the research so that
depth information can be obtained and research questions can be addressed in less
time (G?owacka, Krygier, and Amanowicz, 2015).
Major two types of approaches are included in the studies such as inductive and deductive.
Inductive Approach: The inductive approach is also defined as inductive reasoning that
begins with the observational process and theories are developed toward the research
questions(Ureña, et al., 2019).
Deductive Approach: On the other side, the deductive approach is based on the
generalization reasoning of the research topic that requires proposal hypotheses and
provides limited information in the research.
This research followed an inductive approach due to its ability to provide significant ideas
and observational programs to develop reliable plans and outlines so that research can be
done in the right direction. Using such an approach, it is easy for achieving the developed
goals and objectives and obtain effective findings.
Research Design
Truong, et al., (2016) reported that research design is one of the important methodologies
used to outline the research structure. By using the investigation design, the study can get
the right way to comprehend the investigation issue to obtain valuable and proper data. It
also helps the scholar to propose an outline of the process of investigating the study and
permits them to resolve the research problems and concerns in less time. It is found that
different types of designs could be added to research for example quantitative and
qualitative (Sicari, et al., 2015). In this manner, quantitative design is beneficial to focus on
gaining numerical info with the help of statistical techniques. On the other side, qualitative
design can allow the researcher for developing opinions and gain theoretical information. It
also delivers the base for quantitative design and supports the data collection methods.
A qualitative design is followed in this research as it is beneficial for gaining in-depth
observation and proposing effective data collection processes. Using qualitative research, it
is easy to manage and address the research questions and research can be completed within
time with significant findings. The design can be based on the below approaches.
Fuzzy Technique
Traditional authentication techniques are ineffective in distributed and dynamic IoT
environments, when identities are unknown in advance. The gadgets end up sharing
information and applications with people they know and trust. After that, a Fuzzy system
for Trust-Based Access Control is introduced (FTBAC). In FTBAC, trust is calculated by
taking into account three factors: experience, expertise, and suggestion. The trust ratings
are then linked to privileges, access requests, and credentials to create confirmation of
granting or not granting accessibility.
Device Layer, Requesting Layer, as well as Access Control Layer, are the three layers that
make up FTBAC. Both Smart devices and our interactions are included in the first layer. The
second level gets data on experience, competence, and recommendations before calculating
a fuzzy trust rating. Following the principle of least privilege, the third approach is
considered in the decision mechanism and correlates the computed fuzzy trust value and
access privileges. The simulation findings show that FTBAC is both flexible and scalable, as
well as energy-efficient. While managing accessibility through a mechanism based on
cryptographic security improves the level of confidence, it comes at the cost to minimize the
time.
A fuzzy way of calculating trust is presented. There are three layers to it: a sensing layer, a
core network, and a network protocol. Users view the IoT ecosystem to be a Service
Provider, as well as trust management enables the IoT to give better-qualified services to
every Service Requester. Retrieval, distribution, and decision-making are all parts of this
trust model. It also creates security procedures depending on a judgment function
depending on the customer's trust score. Unless the customer's credential complies with
these security criteria can the client access the IoT.
The trust model is employed to maintain user security by connecting location-aware,
identity-aware, and authentication records. Whenever a user requests a service, They
receive a trust value. There seem to be three methods of verification, one per trust value.
Clients must supply biometric data if the trust value is low. If they have a medium level of
trust. The goal is to use a fuzzy process to gain a categorization of the operations to assess
the responsiveness of the provided data.
Social Networking
Because smart technologies are human-related gadgets, they are typically found in public
spaces and connect via wireless channels, making them vulnerable to malicious assaults.
Smart objects are frequently heterogeneous and must collaborate to perform a task. There
are three types of social connections: friendship, ownership, as well as the community.
As a form of self-promotion, malicious nodes carry out trust-related threats to disrupt the
normal operation of IoT. Another decentralized, encounter-based, as well as activity-based
trust management mechanism for IoT has been suggested. Network entities that
communicate with one other, in particular, produce a trust evaluation and then trade that
with other nodes, resulting in an implicit rate that appears to be a suggestion.
Cooperativeness and communal interest are the criteria used to calculate trust. As a result,
even if the settings vary continuously, this dynamic protocol can discover the appropriate
trust parameter to enhance the application's effectiveness.
Introduce a completely secure overlay network in the context of social media networks.
Because it is centred on continuous peer-to-peer contacts and community development, it
guarantees quick, simple, and secured access to the Internet. Every gadget and community
has a unique identity that influences the trustworthiness of other nodes based on their
actions. Physical closeness, satisfaction, clarity of answer, seniority in the trusted channel,
common aims, justifications, and history of engagement are some of the characteristics to
consider. Chains of credibility will enable the creation of groupings and distinctive identities
to gain accessibility and disseminate related data. When users connect to the network, they
do so via crossing the trust chain created by nodes.
Cooperative Approach
To recognize the malicious activity of surrounding nodes, a hierarchy trust model for IoT is
being introduced. To track object-reader interactions, t Verifiable Caching Interaction Digest
(VCID) is used. The study also includes a long-term reputational strategy for managing
organizational trust.
In a pervasive Computing architecture, a decentralized strategy manages collaboration.
Specifically, creating a trust management system with IoT that may assess a node's trust
based on its previous behaviour. The model calculates the trust value based on both direct
and indirect observations from surrounding nodes.
For distributed networking in the Internet of Things, an attack-resistant trust management
paradigm has been developed. This approach determines and propagates reputations in
distributed routing architectures, allowing for the establishment of dependable trust
relations of self-organized units and the avoidance of dangerous attacks. Evidence synthesis
and the Bayes algorithm are used to calculate the suggested trust and historical statistical
trust.
Research Strategy
The research strategy is helpful for the research project that provides a platform to assess
the data assembly ways by which investigation can be completed reliably. the development
of an effective strategy can lead to increase research quality and effective outcomes can be
obtained (Truong, et al., 2016). There are various strategies included in the studies for
example surveys, focus groups, literature reviews, case studies and many more.
In this research project, a literature review based on the research strategy is included due
to its capability to reduce challenges and obtain effective information. The literature review
intends to gain depth insight into IoT and trust-related issues by addressing the research
gaps and problems. In this manner, various resources are included such as peer-reviewed
papers, online websites, books, journal papers and many more. In the literature review,
more than 50 research papers have been reviewed that focus on the trust and reputation-
related problems associated with IoT technology. In terms of effectiveness, the literature
review is more effective and reliable as that delivers a platform to propose effective data
collection approaches so that research questions can be addressed in less time. It also
supports qualitative research design and helps maintain the research quality by reducing
research gaps significantly.
Data Collection
The data collection method plays a significant part when looking at research methodology
that can deal with the research questions by proposing effective data gathering approaches
and techniques. The selection of a data collection technique is based on the research theme
and developed questions. Major primary and secondary methods are included in the studies
for collecting data (Truong, et al., 2016).
In this manner, primary data is mainly gathered from fresh resources including interviews,
surveys and many more and support quantitative research. On the other hand, secondary
data is gathered using literature review, case studies and observations that mainly support
qualitative research. Using primary research, the complexity and difficulties can be
increased that require conducting either survey or interview for collecting data from the
participants. However, secondary is an effective way to obtain data in less time and manage
the research problems.
In this research project, a secondary data collection technique is added as it is capable to
provide effective that can provide in-depth insight into IoT and trust-related issues. Using
literature review, it is easy to collect secondary data and address research questions in less
time. Therefore, data collection is a beneficial methodology for achieving research
objectives and gathering related data easily.
Analysis Of Data
Data analysis plays a major role in the research, enabling the researchers to review and
analyze the obtained data and propose effective findings. A data analysis technique aims to
gain significant results or outcomes and address the developed questions effectively.
Different techniques are included in the data analysis such as statistical, content analysis
and thematic (Tr?ek, 2018). In this research, descriptive content analysis is included due to
its ability to manage the research gaps and analyze the collected data sufficiently to obtain
reliable results. In terms of complexity, content analysis is less complex and difficult which
helps to review the literature review and obtain effective points and facts in regards to the
research topic. Therefore, it is stated that all these are reliable and helpful methodologies
used in the project that can manage research problems and proper effective plans to
address research questions and achieve aims and objectives.
Trust Evaluation Based On Complexity Provided By IoT Services
IoT application normally uses different approaches when it comes to how information and
data are evaluated within a given system. Since one approach cannot be fulfilling enough to
calculate matters arising locally or even those that need to be handled remotely.
Centralized
According to Kravari and Bassiliades, (2019), this approach uses a centralised platform that
can be accessed by nodes found within its domain that relies on the request and services
trusted. The platform is the one managing all the trust information like negotiations,
calculations, and the making of the decision. Also, it provides the user with all the
information that will be used in making all the necessary trust evaluations. This means that
what has been rated applies to the whole rating system since it is treated as global. Areas,
where centralization plays a key role, include electronic marketing as well as social
networks with companies like Facebook, Amazon, and e-bay taking their chances.
Distributed
This evaluation method works through the cooperation of nodes as they calculate trust
locally through conducting observation and exchange of reports with their neighbouring
nodes (Guo, and Chen, 2015). An example is when the node considered as the trustor
estimates the final value from the trustee through comparison with the report it has as the
trustor node. This is done also to other global peers. In cases where direct is not available,
validation of data plays a key role in identifying information on other sections of the
domain.
Decentralized
This trust mechanism acts as an alternative to the existing model where it combines both
architectures of centralized and distributed making it to be more reliable. Since it contains
added points based on what the two designs had. This is evident through the capability of a
centralized model being able to evaluate trust information and place it where its agency
matters the most. While distribute approach is capable of handling trust computation
regularly (Kounelis, et al., 2014). The major concern is the application of trust authorities
that will help in evaluating information when this is applied on large scale.
Ethical Considerations
Conducting research requires focusing on the ethical issues and problems of the study. This
research project developed an ethical approval form and submitted it to the university
based on the provided guidelines to deal with the ethical challenges. In order to manage
security concerns, data protection laws and regulations are reviewed and followed which
helps to reduce ethical and unauthorized problems from the research. Only authentic
sources are included in the data collection that helped to obtain data with lesser ethical
concerns and risks. In the conducted literature review, various research papers and articles
were analyzed and in-text citations were added in order to provide credit to the
writers (Tr?ek, 2018). Moreover, a reference list is added to the research by which readers
can access the complete papers included in the literature review and improve their
knowledge. Therefore, by using such activities and processes, ethical challenges and risks
can be managed and the quality of the project can be improved.
Limitations
Research methods and approaches that are more effective and reliable helped to develop
significant outlines and gain significant data in regards to the trust and reputation issues
related to IoT. This chapter helped to increase understanding and knowledge about
research methodologies and managed research gaps significantly. In this research, a
qualitative design is followed as it is beneficial for gaining in-depth observation and
proposing effective data collection processes.
Using qualitative research, it is easy to manage and address the research questions and
research can be completed within time with significant findings. However, the major
limitation of the methodology is that it focuses on secondary research based on a literature
review by which theoretical information can be obtained and quality can be affected.
Qualitative design provided brief and limited information about trust and reputation
modelling in IoT and it is difficult to support arguments with the viewpoints of the
participants. Future research should focus on such limitations and need to conduct primary
research to get participants' opinions regarding IoT-based trust and reputation modelling.
Analysis And Findings From Data: Introduction
Data analysis is one of the major parts of the research that delivers a platform to review and
evaluate the collected data for obtaining effective findings. In this report, descriptive
content of analysis is selected as it is capable to issue findings or results effectively and also
managing research problems easily. This chapter will review and compare the various trust
and reputation models used in IoT technology and will also propose a taxonomy for
improving security and trust within IoT networks.
Trust And Reputation Methods
Kravari and Bassiliades, (2019) reported that trust and reputation both are major parts of
IoT security that need to be managed from IoT networks by implementing proper models
and approaches. In order to manage trust issues from IoT networks, companies need to
manage identity and access controls by implementing proper security frameworks and
programs. Increasing the security of IoT networks can help to build trust and reputation
and protect the personal data of the users from cyber-criminals. There are the following
methods and approaches used for evaluating trust and reputation in IoT:
A) Social Networking Model
Kusuma, et al., (2020) reported that social networking is an effective trust model that can
review and evaluate the security risks associated with IoT networks and analyze trust-
related problems. It is a conventional peer-to-peer network-based trust approach that is
linked with the social network information shared over IoT devices. In the context of IoT
trust and reputation, any entity builds social relations with other entities which are based
on social networks and communication channels (Guo, and Chen, 2015). It follows the Eigen
trust model for IoT networks where every peer is assigned a global trust value based on the
previous transactions over communication networks.
Figure 4.1: Trust Management in IoT (Jabeen, et al., 2018)
Malicious nodes are mainly developed by hackers that realize trust-related attacks and help
to reduce the cyber-security of sensitive data. In order to manage such problems, the social
networking model helps to connect malicious detection nodes with the IoT networks and
provides self-promoting and risk detection programs. Mohammadi, et al., (2019) reported
that the major advantage of the social networking approach is that it is based on the
theoretical models that depend on the communication networks used in the IoT devices.
The social networking model mainly follows three parameters for evaluating trust and
reputation: honesty, community interest and cooperativeness (Kounelis, et al., 2014). So,
this dynamic model is capable to find the best parameters of trust and maximize the
effectiveness of IoT networks. It is completely based on the subjective model which is
mainly used for managing the trustworthiness of the IoT-based security programs and
frameworks. However, the major disadvantage of this model is that it is less capable to
detect and identify insider risks and threats leading to security concerns due to which trust
cannot be increased and privacy can be affected.
B) Fuzzy Technique
Origgi, (2019) identified that the traditional security and access control models cannot
manage security and privacy concerns where identities are not described earlier which can
negatively influence trust and reputation. A fuzzy approach is more effective and beneficial
for the IoT networks that develop trust-based access control to deal with security and data
breach-related problems (Bauer, et al., 2013). In the context of IoT networks, the trust is
computed in trust-based access control by considering three factors experience, knowledge
and suggestion. The trust values are now mapped to the permissions, and requests for
accessing the confidential platforms.
Figure 4.2: Trust and reputation in IoT(Pollák, et al., 2016)
Pecori, (2016) stated that the fuzzy trust model also follows the PeerTrust-based reputation
model in order to manage factors influencing the security and trust of personal details. The
key benefit of the fuzzy model is that it is capable to increase trust and reputation in IoT
networks by implementing security controls and access controls. Pollák, et al., (2016)
identified that the fuzzy-based trust model is capable to ensure flexibility and security of the
IoT networks and building effective trust and reputation. In order to calculate trust, the
fuzzy technique composes three layers as sensor layer that contains physical devices, the
core layer that contains access networks and the application layer that includes distributed
networks and interfaces (Kang, et al., 2013). For IoT networks, the fuzzy trust model
enables the IoT to deliver more qualified and secured services to the companies (Ullah et al.,
2019). However, the major disadvantage of the fuzzy trust model is that it requires proper
resources and systems for evaluating trust and reputation which can produce challenges
and difficulties in IoT systems (Hussain et al., 2020).
C) Cooperative Approach
Rafey, et al., (2016) proposed a hierarchical trust model for IoT technology which is based
on the cooperative approach to detecting unwanted and malicious signals from computing
networks. The cooperative approach is more effective and suitable for trust and reputation
in IoT that uses a decentralized model to handle cooperation in the IoT-based
communication architecture (Rana and Bo, 2020). In this manner, a trust management
system is developed which is capable to evaluate and review the security risks and focus on
the trust of a node based on the previous behaviour.
Figure 4.3: trust model for IoT networks (Salamai, 2021)
The key feature of the cooperative approach is that it calculates the value of trust and
reputation regarding both direct observation and indirect observation with the
neighbouring nodes. The trust management system based on the cooperative model is
capable to contains several phases such as collecting the trust value of the nodes,
establishing a collaborative service with the nodes, and evaluating self-updates with the
help of retrieving information from the previous activities, setting a recommendation score
to every node. Salamai, (2021) reported that trust modelling is completely dependent on
the security programs and networks linked with the IoT and corporation modelling helps to
calculate and propagate the reputation that allows the development of reliable and effective
trust relations among self-organized nodes. In terms of effectiveness, a cooperative
approach is more reliable and beneficial for the IoT networks that can manage the security
issues and risks from internal networks and protect data effectively. However, the major
limitation of this trust approach is that it is complex and requires more time to build trust
models for the communication networks and external risks cannot be minimized (Chen et
al., 2018).
D) Identity-Based Method
(Tr?ek, 2018) The author reported that IoT is mainly connected with the computing
networks and communication channels which are less capable to defend against cyber-
attacks due to which hackers can be performed cyber-criminal activities and trust can be
affected. a Web social network is mainly used for detecting and managing the security-
based trust issues from IoT networks. It is found that an identity-based approach is more
effective and reliable for trust management in IoT technology that follows the social
networking models to deal with trust and reputation problems.
Figure 4.4: IoT trust (Truong, et al., 2016)
In order to increase confidentiality and privacy for the IoT networks, it is recommended
that the identity-based technique should be followed as it is capable to limits attacks and
criminal activities from outside the IoT network and identifying malicious nodes. Truong, et
al., (2016) agreed and stated that an identity-based network has the potential to monitor
the movements of the network-based nodes from the IoT systems and detect malicious
codes and risks to protect data from hackers. Moreover, the identity-based trust model can
be connected with the communication channels and device node identification from the
host addressing so that chances of hacking can be minimized.
More than 70% of the cyber-criminals perform unauthorized activities over IoT networks
and communication channels for which identity-based is helpful that provides a way to
increase the authenticity of the networks and communication nodes. The shared
authentication of nodes receipts through the sign of the identity characteristics, produced
by a trusted third party. Truong, et al., (2016-II) observed that identity info is revealed only
to the authorized focusses and the Domain Trusted Entity establishes an internationally
trusted substructure by the pre-sharing of cryptographic credentials. The infrastructures-
based communication is being endangered through cryptographic protocols and is capable
to deal with trust and reputation-related problems. The major advantage of the identity-
based model is that it uses cryptography algorithms that are capable to convert data into
codes so that privacy and hacking problems can be minimized (Pöhls, et al., 2014).
However, it requires changing communication infrastructure and advanced networks and
systems are required that can increase operational costs.
E) TRMSim-WSN Model
Turkina and Ihnatiev, (2020) reported that TRMSim-WSN is an effective trust and
reputation model which is used for IoT-based distributed networks. It is capable to identify
and review the malicious nodes from the communication networks and providing a way to
incorporate a new trust model. The major benefit of the TRMSim-WSN model is that it
stimulates the security risk detection programs over IoT networks so that insider threats
and vulnerabilities can be managed and a proper effective communication
framework (Mahalle, et al., 2013). As compared to the other trust and reputation models,
TRMSim-WSN is more reliable and beneficial that delivers a generic API composed to deal
with trust-related challenges. Major five steps are followed by TRMSim-WSN to simulate
trust within IoT networks such as gathering information, scoring, entity selection,
transaction, reward and punish.
Figure 4.5: TRMSim-WSN model (Ureña, et al., 2019)
Ureña, et al., (2019) examined that TRMSim-WSN initially gather behavioural information in
regards to the members accessing IoT communication networks. The collected information
is utilized for delivering a score that can be used to examine the reputation and trust of each
user in the database system. The most trustworthy entity is mainly chosen and a transaction
is performed for evaluating the satisfaction and security levels. As per the identification, it is
easy for managing trust-related problems and increase security of the sensitive data.
Therefore, it is stated that TRMSim-WSN is helpful for the trust and reputation in IoT and
can be used to increase the security and trust of the communication networks. However, the
implementation of the TRMSim-WSN model can increase problems within data
management and communication systems. Therefore, all these are common trust and
reputation models that can be implemented in the IoT technology and communication
networks.
Results And Discussion
It is found that IoT is an effective technology that provides a platform for connecting
multiple devices and networks through a single system. In terms of effectiveness, IoT
technology is more effective and suitable for the data communication by which remote
access controls can be developed. The conducted literature examined that IoT is less
capable to deal with the security risks and vulnerabilities due to which users can suffer
from the data breach and hacking problems that influence trust and reputation among
users (Azzedin, and Ghaleb, 2019).
The presence of security risks in the IoT networks can affect the confidentiality of personal
details and users can suffer from ethical issues and cyber-criminals. Trust and reputations
both are linked with the security of IoT networks for which proper security and trust
models need to be implemented. Tr?ek, (2018) agreed and stated that trust can be
improved among users by increasing the security of the IoT networks for which secured
infrastructures and communication platforms need to be developed. As compared to other
communication networks, IoT is a common technology used as a wireless communication
network and enables companies to collect data from the users that require better trust and
security models.
Comparison Between Trust And Reputation Methods
Trust management plays a major contribution in the IoT networks that provides a way to
focus on the trust and reputation challenges and increase the security of personal data. The
findings show that the trust model based on the trust management approach can help the
companies to increase privacy and information security and overcome perception
uncertainty and insider threats.
Both trust and reputations are dependent on the security programs linked with the IoT
networks where it is a challenging task for the companies to build trust among users as
cyber-attacks are increasing rapidly. Truong, et al., (2016) examined that trust in IoT is
based on security and it is important for companies to securely store collected data into a
database and connect communication systems with the security frameworks. Various types
of trust and reputation methods are reviewed in the literature such as social networking,
fuzzy technique, corporative approach, PeerTrust, identity-based approach and TRMSim-
WSN model.
It is found social networking is a theoretical trust model which is capable to deal with the
security issues linked with communication networks. As compared to other trust models,
social networking ensures quick, easy and secure access to the users and personal details as
it is based on the PeerTrust approach. Social networking based on the PeerTrust model is
capable to work in peer-to-peer networks where factors affecting trust can be reviewed and
evaluated at every node.
The literature review shows that in the social networking approach, every IoT device
contains the identity and changes the trust of nodes by reviewing their behaviour. Security
can be established within the IoT networks using proper risk assessment plans and it is
easy to build trust and reputation among users. However, it is a theoretical and behavioural
trust model due to which significant and depth insight into IoT trust cannot be obtained.
Bennaceur, Idoudi, and Saidane, (2021) agreed and stated that traditional access controls
are not capable to identify the factors affecting trust and reputation among IoT networks
due to which privacy can be affected.
Table 4.1: Comparison between trust models used for IoT networks
Trust Model
Formed for this basis
The problem it addresses
Limitation
eBay Model for Auction
Has a centralized model of trust that relies on the online feedback system
Evaluate the trust that is evident between buyers and sellers
Has limited ability to restrict identities that are duplicate or fake.
Point-Based Model of Trust
Access and control authentication
Via point-based authorization
Sensitive information is protected while in an open environment.
The description of how point values are gathered is not stated.
Basic Management Model of Trust
Properties from the trust
Transfer of trust.
Existing relation between the transfer of trust and entailment of policy
Not advisable when dealing with distributed systems.
Credential Based Model of Trust
Information based authorization
Authentication procedure in a distributed environment
Centralized environment.
Figure 4.6: Root of trust in IoT (Bennaceur et al., 2021)
In order to manage such problems, a fuzzy technique is developed which is capable to
propose a decentralized approach to deal with the trust and reputation problems in IoT.
The major benefit of the fuzzy approach is that it develops a trust-based access control
where trust is computed by considering various factors such as knowledge, experience and
recommendations. The literature review identified that the fuzzy approach can identify the
trust values associated with the IoT users and map into the permissions to provide
accessibility regarding communication channels (Gui et al., 2018).
Another advantage of the fuzzy approach is that it contains three layers to manage trust-
related problems from IoT networks as device layer that monitor computing devices, the
request layer that provides updates regarding security and trust problems and the access
control layer that provide remote access to the collected data. Fernandez, et al., (2017)
examined that the fuzzy approach is beneficial for increasing the trust level among IoT
networks and dealing with security issues by proposing security frameworks. However, the
major drawback of the fuzzy approach is that it overhead the communication networks due
to which the connectivity may be lost. From the conducted literature, it is found that a
cooperative trust model is a decentralized approach to handling trust-related problems
from IoT architecture.
Figure 4.7: IoT security and trust challenges (Bennaceur et al., 2021)
In the context of trust management, the cooperative approach follows the PowerTrust
model which is capable to consider the distribution of peer networks in a secured and
trusted framework. A cooperative major is beneficial for the IoT networks that calculate
trust value in regards to the direct observation and indirect observation coming from the
communication nodes (Wei et al., 2014). As compared to the other trust models, the
cooperative approach is more effective that collecting the trust values from nodes and
establishing a collaborative service with the network so that trust-related issues can be
minimized. The findings show that the cooperative approach is capable to recommend trust
programs and historical trust issues are computed by the evidence combination and Bayes
algorithm to examine effective information.
However, the major disadvantage of the cooperative approach is that it requires building
communication and security frameworks for IoT networks that can increase complexity and
affect overall performance. Fortino, et al., (2020) proposed a trust model based on the
identify method which is capable to determine trust management for the IoT networks and
communication systems. The major benefit of the identity-based method is that it increases
the security of the communication networks and limits cyber-attacks from the IoT networks
along with malicious codes (Tabassum and Lebda, 2019).
Figure 4.8: Trust evaluation factors (Jabeen, et al., 2018)
As compared to other trust models, the identify-based method is more effective and suitable
that delivers a platform to detect and monitor the malicious risks from networks and nodes
so that trust can be increased among users and privacy of sensitive data can be improved.
TRMSim-WSN is one of the common trust models used by companies to deal with the
security and trust issues associated with IoT networks. The major advantage of TRMSim-
WSN is that it delivers a platform to develop and incorporate trusted networks for the IoT
devices so that collected data from the users can be protected from cyber-criminals. Jabeen,
et al., (2018) agreed and stated that the TRMSim-WSN model simulates the risk
identification programs and compares the security models with the previous activities to
obtain significant information.
It contains various steps for evaluating trust and reputation in IoT networks such as
gathering data, scoring trust, entity selection, and transaction and reward programs.
However, TRMSim-WSN requires to development of proper programs and risk
identification frameworks that can increase challenges and difficulties in businesses and IoT
networks. In terms of cost, TRMSim-WSN implementation requires advanced
communication systems and programs which are more expensive to implement. Therefore,
it is recommended that companies have a trust and reputation model as per their
requirement to minimise trust and security concerns.
Conclusion
From the above findings, it may be said that IoT is an effective technology that can be
combined in businesses to manage communication gaps and propose remote access
controls but it is difficult to resolve security and trust-related problems. This research
helped to review the challenges and risks associated with trust and reputation in IoT
networks and helped to increase understanding and knowledge about IoT trust. It is found
that it is important for companies to include IoT in their business operations due to their
ability to propose data communication flows and provide smart analytics so that
identification and evaluation of the collected data can be done in less time. It is capable to
build wireless communication networks by which it is easy for the users to exchange data
or information without requiring connecting cables and wires.
With the help of IoT networks, business communities are capable to deal with
communication-related problems and collecting data from the customers for performing
analysis and evaluation-related activities. Due to improper knowledge about cyber-security,
it is challenging for the employees to deal with the security threats and communication
channels that can be accessed by the attackers which can affect trust and reputation
negatively.
Various types of trust and reputation methods are reviewed in the literature such as social
networking, fuzzy technique, corporative approach, PeerTrust, identity-based approach and
TRMSim-WSN model. The literature review identified that the fuzzy approach can identify
the trust values associated with the IoT users and map into the permissions to provide
accessibility regarding communication channels. The findings show that the cooperative
approach is capable to recommend trust programs and historical trust issues are computed
by the evidence combination and Bayes algorithm to examine effective information.
This dissertation concluded:
Enhanced knowledge and awareness of cyber security and its model.
The fuzzy approaches for better security of IoT users.
Cooperative approaches for recommending the proposed trust model.
Recommendations
It is recommended that companies should focus on the security and trust-related problems
associated with the IoT networks and proper trust models should be applied so that data
privacy and confidentiality can be improved. In order to evaluate trust and reputation, it is
recommended that the TRMSim-WSN model should be implemented due to its capability to
develop a simulation system for reviewing the security issues and protecting IoT networks
from malicious codes (Yoon et al., 2015). Moreover, companies should develop proper risk
assessment plans and ensure that collected data from the users through IoT networks are
stored in secured database systems.
Future Direction
The major limitation of this research is that it focuses on secondary research based on a
literature review by which theoretical information can be obtained and the quality of
research can be affected. However, future research will survey questionnaires for gaining
viewpoints of the participants regarding trust and reputation in IoT networks and will
manage research gaps.
Moreover, a trust model will be implemented over IoT-based communication networks to
deal with the security and trust-related problems and will also suggest effective security
controls and frameworks for improving data privacy.
References
Abdalzaher, M.S., Samy, L. and Muta, O., 2019. Non?zero?sum game?based trust model to
enhance wireless sensor networks security for IoT applications. IET Wireless Sensor
Systems, 9(4), pp.218-226.
Abdullayeva, F., 2016. Analysis of the Requirements of the Information Security of
Reputation Systems and Scenario of Using Reputation Systems in the Cloud Computing
Environment. Journal of Automation and Information Sciences, 48(7).
Ahmed, A.I.A., Ab Hamid, S.H., Gani, A. and Khan, M.K., 2019. Trust and reputation for
Internet of Things: Fundamentals, taxonomy, and open research challenges. Journal of
Network and Computer Applications, 145, p.102409.
Alofi, A., Bahsoon, R. and Hendley, R., 2021, September. MinerRepu: A Reputation Model for
Miners in Blockchain Networks. In 2021 IEEE International Conference on Web Services
(ICWS) (pp. 724-733). IEEE.
Arabsorkhi, A., Haghighi, M.S. and Ghorbanloo, R., 2016, September. A conceptual trust
model for the Internet of Things interactions. In 2016 8th International Symposium on
Telecommunications (IST) (pp. 89-93). IEEE.
Asiri, S. and Miri, A., 2016, December. An IoT trust and reputation model based on
recommender systems. In 2016 14th Annual Conference on Privacy, Security and Trust
(PST) (pp. 561-568). IEEE.
Azzedin, F. and Ghaleb, M., 2019. Internet-of-Things and information fusion: Trust
perspective survey. Sensors, 19(8), p.1929.
Bao, F., Chen, R. and Guo, J., 2013, March. Scalable, adaptive and survivable trust
management for community of interest-based internet of things systems. In 2013 IEEE
eleventh international symposium on autonomous decentralized systems (ISADS) (pp. 1-7).
IEEE.
Baqa, H., Truong, N.B., Crespi, N., Lee, G.M. and Le Gall, F., 2018, August. Quality of
Information as an indicator of Trust in the Internet of Things. In 2018 17th IEEE
International Conference On Trust, Security And Privacy In Computing And
Communications/12th IEEE International Conference On Big Data Science And Engineering
(TrustCom/BigDataSE) (pp. 204-211). IEEE.
Bauer, M., Bui, N., Loof, J.D., Magerkurth, C., Nettsträter, A., Stefa, J. and Walewski, J.W., 2013.
IoT reference model. In Enabling Things to Talk (pp. 113-162). Springer, Berlin, Heidelberg.
Bennaceur, J., Idoudi, H. and Saidane, L.A., 2021. Hierarchical game-based secure data
collection with trust and reputation management in the cognitive radio network. Computers
& Electrical Engineering, 96, p.107463.
Chen, R., Bao, F. and Guo, J., 2015. Trust-based service management for social internet of
things systems. IEEE transactions on dependable and secure computing, 13(6), pp.684-696.
Chen, R., Guo, J. and Bao, F., 2014. Trust management for SOA-based IoT and its application
to service composition. IEEE Transactions on Services Computing, 9(3), pp.482-495.
Chen, X., Lijffijt, J. and De Bie, T., 2018, July. Quantifying and minimizing risk of conflict in
social networks. In Proceedings of the 24th ACM SIGKDD International Conference on
Knowledge Discovery & Data Mining (pp. 1197-1205).
Copigneaux, B., 2014, March. Semi-autonomous, context-aware, agent using behaviour
modelling and reputation systems to authorize data operation in the Internet of Things.
In 2014 IEEE World Forum on Internet of Things (WF-IoT) (pp. 411-416). IEEE.
Duan, J., Gao, D., Yang, D., Foh, C.H. and Chen, H.H., 2014. An energy-aware trust derivation
scheme with game theoretic approach in wireless sensor networks for IoT
applications. IEEE Internet of Things Journal, 1(1), pp.58-69.
Fernandez-Gago, C., Moyano, F. and Lopez, J., 2017. Modelling trust dynamics in the Internet
of Things. Information Sciences, 396, pp.72-82.
Fortino, G., Fotia, L., Messina, F., Rosaci, D. and Sarné, G.M., 2020. Trust and reputation in the
internet of things: state-of-the-art and research challenges. IEEE Access, 8, pp.60117-60125.
G?owacka, J., Krygier, J. and Amanowicz, M., 2015, December. A trust-based situation
awareness system for military applications of the internet of things. In 2015 IEEE 2nd
World Forum on Internet of Things (WF-IoT) (pp. 490-495). IEEE.
Gui, G., Huang, H., Song, Y. and Sari, H., 2018. Deep learning for an effective nonorthogonal
multiple access scheme. IEEE Transactions on Vehicular Technology, 67(9), pp.8440-8450.
Guo, J. and Chen, R., 2015, June. A classification of trust computation models for service-
oriented internet of things systems. In 2015 IEEE International Conference on Services
Computing (pp. 324-331). IEEE.
Hussain, Y., Zhiqiu, H., Akbar, M.A., Alsanad, A., Alsanad, A.A.A., Nawaz, A., Khan, I.A. and
Khan, Z.U., 2020. Context-aware trust and reputation model for fog-based IoT. IEEE
Access, 8, pp.31622-31632.
Jabeen, F., Hamid, Z., Akhunzada, A., Abdul, W. and Ghouzali, S., 2018. Trust and reputation
management in healthcare systems: Taxonomy, requirements and open issues. IEEE
Access, 6, pp.17246-17263.
Janiszewski, M., 2020, May. TRM-EAT-a New Tool for Reliability Evaluation of Trust and
Reputation Management Systems in Mobile Environments. In 2020 20th IEEE/ACM
International Symposium on Cluster, Cloud and Internet Computing (CCGRID) (pp. 718-
727). IEEE.
Kang, K., Pang, Z., Da Xu, L., Ma, L. and Wang, C., 2014. An interactive trust model for
application market of the internet of things. IEEE Transactions on Industrial
Informatics, 10(2), pp.1516-1526.
Kokoris-Kogias, E., Voutyras, O. and Varvarigou, T., 2016, September. TRM-SIoT: A scalable
hybrid trust & reputation model for the social Internet of Things. In 2016 IEEE 21st
International Conference on Emerging Technologies and Factory Automation (ETFA) (pp. 1-
9). Ieee.
Kounelis, I., Baldini, G., Neisse, R., Steri, G., Tallacchini, M. and Pereira, A.G., 2014. Building
trust in the human? internet of things relationship. IEEE Technology and Society
Magazine, 33(4), pp.73-80.
Kowshalya, A.M. and Valarmathi, M.L., 2017. Trust management in the social internet of
things. Wireless Personal Communications, 96(2), pp.2681-2691.
Kravari, K. and Bassiliades, N., 2019. StoRM: A social agent-based trust model for the
internet of things adopting microservice architecture. Simulation Modelling Practice and
Theory, 94, pp.286-302.
Kusuma, L., Rejeki, S., Robiyanto, R. and Irviana, L., 2020. Reputation system of C2C e-
commerce, buying interest and trust. Business: Theory and Practice, 21(1), pp.314-321.
Li, F., White, G. and Clarke, S., 2021. A Trust Model for SLA Negotiation Candidates Selection
in a Dynamic IoT Environment. IEEE Transactions on Services Computing.
Lingda, K., Feng, Z., Yingjie, Z., Nan, Q., Dashuai, L. and Shaotang, C., 2021, February.
Evaluation method of trust degree of distribution IoT terminal equipment based on
information entropy. In Journal of Physics: Conference Series (Vol. 1754, No. 1, p. 012108).
IOP Publishing.
Ma, Z., Liu, L. and Meng, W., 2020, November. DCONST: Detection of multiple-mix-attack
malicious nodes using consensus-based trust in IoT networks. In Australasian Conference
on Information Security and Privacy (pp. 247-267). Springer, Cham.
Ma, Z., Liu, L. and Meng, W., 2020. Towards multiple-mix-attack detection via consensus-
based trust management in IoT networks. Computers & Security, 96, p.101898.
Mahalle, P.N., Thakre, P.A., Prasad, N.R. and Prasad, R., 2013, June. A fuzzy approach to trust
based access control in internet of things. In Wireless VITAE 2013 (pp. 1-5). IEEE.
Mendoza, C.V. and Kleinschmidt, J.H., 2015. Mitigating on-off attacks in the internet of things
using a distributed trust management scheme. International Journal of Distributed Sensor
Networks, 11(11), p.859731.
Mohammadi, V., Rahmani, A.M., Darwesh, A.M. and Sahafi, A., 2019. Trust-based
recommendation systems in Internet of Things: a systematic literature review. Human-
centric Computing and Information Sciences, 9(1), pp.1-61.
Neisse, R., Steri, G., Fovino, I.N. and Baldini, G., 2015. SecKit: a model-based security toolkit
for the internet of things. computers & security, 54, pp.60-76.
Nitti, M., Girau, R. and Atzori, L., 2013. Trustworthiness management in the social internet of
things. IEEE Transactions on knowledge and data engineering, 26(5), pp.1253-1266.
Origgi, G., 2019. Trust and Reputation as Filtering Mechanisms of Knowledge. In The
Routledge Handbook of Social Epistemology (pp. 78-86). Routledge.
Pecori, R., 2016. S-Kademlia: A trust and reputation method to mitigate a Sybil attack in
Kademlia. Computer Networks, 94, pp.205-218.
Pöhls, H.C., Angelakis, V., Suppan, S., Fischer, K., Oikonomou, G., Tragos, E.Z., Rodriguez, R.D.
and Mouroutis, T., 2014, April. RERUM: Building a reliable IoT upon privacy-and security-
enabled smart objects. In 2014 IEEE wireless communications and networking conference
workshops (WCNCW) (pp. 122-127). IEEE.
Pollák, F., Dor?ák, P., Ra?eta, N. and Svetozarovová, N., 2016. Sustainable e-marketing of
selected tourism subjects from the Mediterranean through active online reputation
management. In Smart City 360° (pp. 692-703). Springer, Cham.
Rafey, S.E.A., Abdel-Hamid, A. and Abou El-Nasr, M., 2016, April. CBSTM-IoT: Context-based
social trust model for the Internet of Things. In 2016 International Conference on Selected
Topics in Mobile & Wireless Networking (MoWNeT) (pp. 1-8). IEEE.
Rana, M.M. and Bo, R., 2020. IoT?based cyber?physical communication architecture:
challenges and research directions. IET Cyber?Physical Systems: Theory &
Applications, 5(1), pp.25-30.
Rizvi, S., Kurtz, A., Pfeffer, J. and Rizvi, M., 2018, August. Securing the internet of things
(IoT): A security taxonomy for IoT. In 2018 17th IEEE International Conference On Trust,
Security And Privacy In Computing And Communications/12th IEEE International
Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 163-168).
IEEE.
Saied, Y.B., Olivereau, A., Zeghlache, D. and Laurent, M., 2013. Trust management system
design for the Internet of Things: A context-aware and multi-service approach. Computers &
Security, 39, pp.351-365.
Salamai, A.A., 2021. Feedback and User Behavior Trust and Reputation in Risk
Management. Journal of Computer Science and Information Systems, 20, p.18.
Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A., 2015. Security, privacy and trust in
Internet of Things: The road ahead. Computer networks, 76, pp.146-164.
Tabassum, A. and Lebda, W., 2019. Security Framework for IoT Devices against Cyber-
attacks. arXiv preprint arXiv:1912.01712.
Tormo, G.D., Mármol, F.G. and Pérez, G.M., 2015. Dynamic and flexible selection of a
reputation mechanism for heterogeneous environments. Future Generation Computer
Systems, 49, pp.113-124.
Tr?ek, D., 2018. Computational Trust and Reputation Management. In Trust and Reputation
Management Systems (pp. 21-54). Springer, Cham.
Truong, N.B., Cao, Q.H., Um, T.W. and Lee, G.M., 2016, December. Leverage a trust service
platform for data usage control in smart city. In 2016 IEEE Global Communications
Conference (GLOBECOM) (pp. 1-7). IEEE.
Truong, N.B., Um, T.W. and Lee, G.M., 2016. A reputation and knowledge based trust service
platform for trustworthy social internet of things. Innovations in clouds, internet and
networks (ICIN), Paris, France, pp.104-111.
Turkina, V. and Ihnatiev, D., 2020, May. Approach to Sustainable Trust and Reputation
Evaluation in Distributed Mobile Networks of the Internet of Things. In 2020 IEEE 11th
International Conference on Dependable Systems, Services and Technologies
(DESSERT) (pp. 117-121). IEEE.
Ullah, F., Naeem, H., Jabbar, S., Khalid, S., Latif, M.A., Al-Turjman, F. and Mostarda, L., 2019.
Cyber security threats detection in internet of things using deep learning approach. IEEE
access, 7, pp.124379-124389.
Ureña, R., Chiclana, F., Carrasco, R.A. and Herrera-Viedma, E., 2019. Leveraging Users’ Trust
and Reputation in Social Networks. Procedia Computer Science, 162, pp.955-962.
Urena, R., Kou, G., Dong, Y., Chiclana, F. and Herrera-Viedma, E., 2019. A review on trust
propagation and opinion dynamics in social networks and group decision making
frameworks. Information Sciences, 478, pp.461-475.
Wei, Z., Tang, H., Yu, F.R., Wang, M. and Mason, P., 2014. Security enhancements for mobile
ad hoc networks with trust management using uncertain reasoning. IEEE Transactions on
Vehicular Technology, 63(9), pp.4647-4658.
Xiao, H., Sidhu, N. and Christianson, B., 2015, August. Guarantor and reputation based trust
model for social internet of things. In 2015 International wireless communications and
mobile computing conference (IWCMC) (pp. 600-605). IEEE.
Yan, Z., Zhang, P. and Vasilakos, A.V., 2014. A survey on trust management for Internet of
Things. Journal of network and computer applications, 42, pp.120-134.
Yoon, S., Park, H. and Yoo, H.S., 2015. Security issues on smarthome in IoT environment.
In Computer science and its applications (pp. 691-696). Springer, Berlin, Heidelberg.

More Related Content

Similar to INS653X Project Management.docx

SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-converted
tanvir616
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
ChantellPantoja184
 
5 Infrastructure Trends That Will Reshape IT By 2023.docx
5 Infrastructure Trends That Will Reshape IT By 2023.docx5 Infrastructure Trends That Will Reshape IT By 2023.docx
5 Infrastructure Trends That Will Reshape IT By 2023.docx
justspamxox
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
nsangary
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
jeanettehully
 
RESERCH PROJECT PROPOSAL AbstractInternet of things (IoT) is o.docx
RESERCH PROJECT PROPOSAL AbstractInternet of things (IoT) is o.docxRESERCH PROJECT PROPOSAL AbstractInternet of things (IoT) is o.docx
RESERCH PROJECT PROPOSAL AbstractInternet of things (IoT) is o.docx
audeleypearl
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
Shyam Goyal
 

Similar to INS653X Project Management.docx (20)

SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-converted
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
 
jose rizal univeristy internet of things
jose rizal univeristy internet of thingsjose rizal univeristy internet of things
jose rizal univeristy internet of things
 
5 Infrastructure Trends That Will Reshape IT By 2023.docx
5 Infrastructure Trends That Will Reshape IT By 2023.docx5 Infrastructure Trends That Will Reshape IT By 2023.docx
5 Infrastructure Trends That Will Reshape IT By 2023.docx
 
Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
 
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
 
IoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityIoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and security
 
RESERCH PROJECT PROPOSAL AbstractInternet of things (IoT) is o.docx
RESERCH PROJECT PROPOSAL AbstractInternet of things (IoT) is o.docxRESERCH PROJECT PROPOSAL AbstractInternet of things (IoT) is o.docx
RESERCH PROJECT PROPOSAL AbstractInternet of things (IoT) is o.docx
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks Threats
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
 

More from write4

roles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docxroles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docx
write4
 
Role of the Military in Disaster.docx
Role of the Military in Disaster.docxRole of the Military in Disaster.docx
Role of the Military in Disaster.docx
write4
 
Role of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docxRole of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docx
write4
 
Robbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docxRobbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docx
write4
 
Rodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docxRodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docx
write4
 
Role in Decision Making What is should be.docx
Role in Decision Making What is should be.docxRole in Decision Making What is should be.docx
Role in Decision Making What is should be.docx
write4
 
Samantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docxSamantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docx
write4
 
Ruth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docxRuth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docx
write4
 
Samantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docxSamantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docx
write4
 
Russian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docxRussian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docx
write4
 
Review the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docxReview the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docx
write4
 
Samantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docxSamantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docx
write4
 
Richard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docxRichard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docx
write4
 

More from write4 (20)

roles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docxroles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docx
 
Role of the Military in Disaster.docx
Role of the Military in Disaster.docxRole of the Military in Disaster.docx
Role of the Military in Disaster.docx
 
Role of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docxRole of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docx
 
Role In Influencing Society.docx
Role In Influencing Society.docxRole In Influencing Society.docx
Role In Influencing Society.docx
 
Role of Private Security.docx
Role of Private Security.docxRole of Private Security.docx
Role of Private Security.docx
 
Robbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docxRobbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docx
 
Robbins Network Services.docx
Robbins Network Services.docxRobbins Network Services.docx
Robbins Network Services.docx
 
Robinson Crusoe review.docx
Robinson Crusoe review.docxRobinson Crusoe review.docx
Robinson Crusoe review.docx
 
Rocking Horse.docx
Rocking Horse.docxRocking Horse.docx
Rocking Horse.docx
 
Rodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docxRodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docx
 
Role in Decision Making What is should be.docx
Role in Decision Making What is should be.docxRole in Decision Making What is should be.docx
Role in Decision Making What is should be.docx
 
Samantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docxSamantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docx
 
Ruth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docxRuth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docx
 
Samantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docxSamantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docx
 
Russian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docxRussian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docx
 
Review the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docxReview the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docx
 
Samantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docxSamantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docx
 
Saudi Arabia.docx
Saudi Arabia.docxSaudi Arabia.docx
Saudi Arabia.docx
 
Right to Privacy.docx
Right to Privacy.docxRight to Privacy.docx
Right to Privacy.docx
 
Richard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docxRichard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

INS653X Project Management.docx

  • 1. INS653X Project Management Answer: Introduction In this digital world, internet networks and emerging technologies are proliferating, enabling companies to interconnect multiple systems easily and manage business problems. IoT is an abbreviation for the internet of things an emerging technology that helps business communities to propose significant communication platforms and link various devices, networks and servers through a single system (Xiao, Sidhu, and Christianson, 2015). The prominent feature of IoT technology is that it provides communication networks and the ecosystem to exchange data without requiring human assistance so that remote access controls can be developed within businesses. Using IoT-enabled devices, it is easy for the users to exchange data and receive real-time information by which complexity and difficulties can be managed. Business processes, devices, networks and systems can be connected with the IoT technology and remote accessibility can be provided that can enable the companies to perform business operations remotely (Abdullayeva, 2016). In terms of speed, IoT is capable to provide a faster data transmission speed that enables users to exchange data in less time and receive proper updates from companies. However, IoT is connected with computing networks and communication channels that can increase security threats and hacking problems. The larger datasets can be shared over internet networks and hackers can target IoT networks easily to produce data breach incidents (Tormo, Mármol, and Pérez, 2015). Due to security concerns, it is challenging for the companies and users to build trust regarding the implementation of IoT which negatively reduces the reputation of the IoT networks. The existence of security risks and any vulnerabilities in the IoT systems will always affect the privacy of sensitive data. Companies can suffer from data breaches and ethical problems and influence the trust of the users this is based on what happened to AT&T when they were slammed with a fine of $25million by FCC due to a data breach. It is a challenging task for evaluating the trustworthiness of the entities on the internet network and also increases hacking and cyber-attacks (Ahmed, et al., 2019). The primary motivation behind this research is that companies are moving toward IoT networks for which it is essential to review and manage the security and trust-related problems. The
  • 2. companies need to focus on security and confidentiality and follow proper configuration processes so that malicious codes and unauthorized activities can be minimized and trust levels can be improved. Kokoris, et al., (2016) defined trust management as a process of managing security risks and issues from IoT networks to protect personal details and computing systems. Therefore these models are highly recommended to the cyber security area for enhancing the various approaches which are beneficiary for users. This research will provide more information on network sharing and methods for evaluating trust and reputation in IoT devices. Also, it enhances the security of those addresses that have concerns relating to both security and privacy. In this research, the concept of IoT technology will be reviewed and the implication of security on trust and reputation in IoT will be analyzed (Yan, Zhang, and Vasilakos, 2014). There are many works which have been done in this instance to gain in-depth insight into trust and reputation methods used for IoT networks. Previous findings will be reviewed to manage research gaps so that we can provide better results for the IoT environment for many organisations. The presence of cyber threats and insider vulnerabilities in the IoT networks can affect communication channels and the security of the transmitted data can be reduced. According to Kravari and Bassiliades (2019), more than 70% of the companies collect customer data using IoT-based communication networks and store it in databases that can be targeted by hackers easily. Kowshalya and Valarmathi, (2017) presented a trust management program that shows that building security and data protection programs can increase complexity in businesses. It is difficult for the companies to deal with the security and privacy concerns due to which trust and reputation can be influenced and data breaches or ethical issues can be posed easily. When looking at the term "trust", can be defined using different ways that have derived from different disciplines under a different lens, which depend largely on the field being perceived. Through such approaches (Abdalzaher et al., 2019), it will be relatively easy to find the connection that exists when considering trust in IoT. The field of view on the trust includes the following: Philosophy – in this, trust is based on reliance since it can be projected on the aspects of betrayal happening in the process. Meanwhile, reliance is checked based on disappointment caused (Azzedin, and Ghaleb, 2019). Psychology – here trust is based on the beliefs of how different situation needs to be handled when looking at people's background and community. Network and communication – capture the trust of the user to establish the relationship built from different sets surrounding scalability and reliability (Saied, et al., 2013). In IoT technology, trust is connected with the security and confidentiality of personal details as system security and privacy are important for building trust among customers. Mainly, companies collect data from the users through IoT-enabled devices and store it in databases where hacking problems and risks can affect the privacy of collected data and
  • 3. reduce trust from users easily (Asiri, and Miri, 2016). Trust is based on the security and confidentiality of sensitive data and companies need to protect the data of users. Companies need to protect users' data from cyber-criminals while accessing IoT networks to improve trust and reputation. The social networking model mainly follows three parameters for evaluating trust and reputation: honesty, community interest and cooperativeness. So, this dynamic model is capable to find the best parameters of trust and maximize the effectiveness of IoT networks. This research will review various methods and approaches used for trust and reputation. Moreover, effective recommendations and taxonomy will be developed to increase the security and confidentiality of IoT networks and will also improve trust levels while accessing IoT networks (Rizvi et al., 2018). Aims And Objectives Of The Research The primary focus of this research is based on reviewing the trust and reputation modelling in IoT. A trust framework is designed to counteract a certain type of threat. Each company has its own unique set of risks and vulnerabilities that can be discovered by doing a data flow analysis based on use cases. A threat profile, at its core, reveals the kind and motivations of potential attackers. Security strength is evaluated by a trust model, which then determines a trustworthiness score. When evaluating the safety of cloud services, it is important to do so along several dimensions, and these are all included in a trust value. The security of service and the reliability of the model can be evaluated using the CSA (Cloud Security Alliance) service challenges. The following are objectives developed: Understanding the enhanced concept of trust models to understand the concept of IoT To review the challenges to trust and reputation in IoT technology To evaluate various methods or approaches of trust and reputation for IoT Research Questions Below are some of the outline research questions: What are the characteristics of IoT technology? What are involved risk factors and security concerns affecting trust and reputation in IoT? What are the methods and approaches used for evaluating trust and reputation in IoT networks? Structure Of The Dissertation The format of this research contains various sections and chapters including an introduction, review of the literature, methodology, results and discussion and finally a conclusion. The introduction section will help to gain a brief overview of topics placed in
  • 4. this research and propose the aim and objectives. The literature review has a major contribution when looking at different studies and research since it helps to review the previous findings and obtain effective information for addressing research questions and gaps. A research methodology is beneficial for developing effective research plans and frameworks to complete the study with larger quality and effectiveness. Results and discussion sections are reliable and help to review the collected data from the literature review for gaining effective findings and results. The conclusion section will provide a summary of the entire research along with the recommendations and future direction. Background And Literature Review IoT uses wireless sensor networks which are capable to connect numerous computing devices and systems easily and perform communication-related activities without human assistance. In this generation, companies are shifting towards digital technologies to increase operational performance and IoT is a common technology implemented in businesses to propose remote access controls and perform business operations remotely (Alofi, Bahsoon, and Hendley, 2021). IoT is an effective technology that enables companies to deal with complexity and data sharing problems so that real-time updates can be received and problems can be resolved significantly. However, IoT is connected with the communication networks and internet servers which are not capable to manage security concerns and exchanged data can be accessed by the cyber-criminals the cyber-criminals can access data. These researchers (Duan, et al., 2014) have identified that security risks and threats enable the hackers to target communication systems and databases of the companies and IoT networks are less able to defend against cyber-attacks and criminal activities. It is challenging for companies to deal with the security threats and vulnerabilities due to which trust and reputation-related problems can be increased (Arabsorkhi, Haghighi, and Ghorbanloo, 2016). Hackers can access the collected data from customers and IoT networks can be linked with the malicious codes by which remote accessibility can be proposed and confidentiality of sensitive data can be decreased. It is difficult for companies to identify and review the security risks associated with the IoT networks and suffer from ethical and trust-related problems. Introduction Review of literature when conducting research acts as a major advantage and contribution while conducting research. Since it helps to gain effective information related to the research topic by reviewing the previous studies and papers. In this research, a literature review is selected while looking at car sharing systems functionality, to understand the challenges and problems associated with trust and reputation. To select papers, various keywords are included such as security issues in IoT, trust models for IoT, trust and reputation issues in IoT, trust approaches and taxonomy for IoT and many more. This section will cover various points such as the key concept of IoT, challenges related to trust
  • 5. and reputation, and trust and reputation methods. BTRM-WSN is a bio-inspired trust evaluation architecture for wireless sensor nodes, whose unique feature is the precise use of an ant colony system to assist a node in locating the most trusted sensor offering a specific service, as well as the most reputable method to access that sensor. To accomplish this, ants are dispatched and dispersed throughout the system, leaving pheromone traces in their wake that will aid future ants in following the correct path. Characteristics Of IoT Azzedin and Ghaleb, (2019) reported that IoT is an advanced communication technology that connects computing devices, networks and servers through a single system. IoT- enabled devices allow companies and users to access computing devices and communication systems from any location. In this digital world, companies are accessing emerging technologies and digital systems where IoT helps the companies to build effective communication infrastructure and exchange data over multiple networks at a time. Baqa, et al., (2018) agreed and stated that IoT is an effective technology that interconnects tremendous devices and systems together without requiring human assistance so that the level of communication can be improved. In the context of businesses, IoT plays a major contribution in receiving real-time information and enables customers to address queries and problems in less time (Ma, Liu, and Meng, 2020). Connectivity is one of the major characteristics of IoT technology that provides a platform to interconnect the number of computing systems, networks and devices to perform data transmission-related activities. Figure 2.1: Characteristics of the Internet of Things (Bennaceur et al., 2021) The extraction of knowledge from the developed data is significant for companies where business intelligence and identification of business problems can be managed easily. Bennaceur et al., (2021) reported that scalability is a major feature of IoT technology that enables companies to handle massive data and manage data storing-related concerns. IoT is now connected with advanced technologies such as artificial intelligence, cloud computing as well as big data analytics. Using such features, it is easy for companies to develop remote access controls and automated systems so that business operations and communication- related activities can be done remotely (Mendoza, and Kleinschmidt, 2015). In future, companies will be dependent on IoT networks and will build effective digital systems and communication infrastructures. Challenges Related To Trust And Reputation Fernandez, et al., (2017) reported that IoT provides a system to connect networks, servers,
  • 6. devices and machines and process communication-related activities. Using IoT-enabled devices, higher data communication networks can be developed for increasing the speed of data transmission and also enables the companies to receive real-time updates. However, IoT is less capable to manage insider threats and security vulnerabilities experienced by companies and users through cyber-attacks and criminal incidents. Fortino, et al., (2020) agreed and stated that cyber-criminals have the potential to develop malicious programs and target IoT-based communication networks to enter into the servers and perform hacking activities. Figure 2.2: Trust and reputation in IoT (Jabeen, et al., 2018) It is challenging to evaluate the trustworthiness of entities on the IoT networks due to which confidentiality of sensitive data can be affected easily. The term trust is mainly associated with security as system privacy is necessary to obtain trust and IoT is less able to manage security issues that can influence trust and reputation negatively. Jabeen, et al., (2018) reported that trust management plays a major role in the context of IoT security, allowing effective data mining and fusion for delivering qualified facilities. Major three risk factors are identified as increasing security-based trust and reptation problems in IoT networks such as lack of understanding, improper security measures and misconfiguration. Janiszewski, (2020) agreed and observed that lack of awareness is a major factor among users that increase insider threats and enables hackers to perform unauthorized activities. In order to manage such risk, a trust management model is developed that enables the companies to deal with the understanding problems and increase the security level. More than 60% of the companies have implemented IoT networks, most of them are found in silicon valley and included simple security programs which are less capable to control cyber-threats and malicious activities due to which trust regarding the confidentiality of data can be affected (Ma, Liu, and Meng, 2020). Neisse, et al., (2015) identified that in this digital environment, IoT networks are vulnerable to security risks as incomplete or distorted information can be shared by hackers that can affect trust and reputation. Implementing secured communication infrastructure in IoT devices can help companies control and reduce trust-based security issues. Companies need to develop proper trusting and reputation models to manage security and trust problems and increase the privacy of database systems from cyber-attacks. The previous studies did not compare the trust and reputation models used for the IoT networks. It is challenging to select a suitable model for improving the trust and privacy of the IoT networks and systems. This research focuses on the specific trust models and frameworks and the taxonomy of trust models and protocols created to deal with the trust and reputation problems in IoT. Trust As A Taxonomy In IoT
  • 7. When standard security paradigms can indeed be enforced owing to a lack of centralized authority and an insufficient understanding of the environment, trust management is considered a promising solution to promote collaboration between entities. However, there is a dearth of workable approaches in the existing literature for collecting and disseminating information for efficient trust evaluation and for providing users with trust data. This could make it so that people have a hard time grasping and accepting a trust management solution. In order to build and develop a trust management platform that can be readily accepted by users before practical implementation, this study presents users- driven trust modelling & management strategy. To prove the efficacy of this approach, we show how it may be implemented in the creation of a reputation system for a mobile application. A thematic taxonomy is proposed for the trust and reputation in IoT networks to deal with the trust-related challenges (Copigneaux, 2014). The thematic taxonomy is developed relying on major seven factors including roles based on trust entities, trust management level, trust properties, trust computation, trust metrics, trust attacks and many more (Li, White, and Clarke, 2021). Such factors are identified to represent a trust-based IoT environment that helps review and evaluate the challenges and risks associated with IoT security and trust. Figure 2.3: Taxonomy of Trust in IoT (Jabeen, et al., 2018) A) Trust Metrics The major aim of trust metrics is to examine standards and security patterns to evaluate and measure trust among IoT networks (Nitti, Girau, and Atzori, 2013). A suitable trust management system mainly relies on the best trust metrics that can help for monitoring the interactive facilities among IoT entities (Lingda, et al., 2021). Major two types of metrics are included such as social trust metrics and QoS trust metrics. QoS metrics are more effective and reliable and can help provide quality services to the users and the proper security so that trust can be improved. Modelling and understanding trust is made possible by trust measures. They have intimate ties to established structures of trust. PGP is an example of a program that uses a binary trust metric. Trust metrics in computing history can be traced back to early examples such as eBay's Feedback Rating. B) Trust Metrics On Reputation And Recommendation Reputation is considered both in the social side's product and process section. The social section is deemed to be a product since the entity of opinion arises from it. It also influences how information flows within the Social Internet of Things (SIoT). Examples of this include
  • 8. those developed in firms like eBay as well as the Keynote. A centralized authority of trust is used to help maintain the feedback that is used for the rating process. When looking at the same process in distributed systems, reputation is built from what has been there for a certain number of times and comes from both behaviour and customers (Urena, et al., 2019). For smooth operation, it requires the system to apply a heuristic algorithm that does the update and integration process. Through the above process is relatively easy for decisions to be made by humans as compared to a system for a recommendation. Since reputation and recommendation can be done much faster while relying on the existing surrounding. Through this, it is best for a reputation system to be developed, which will handle the trust service platform. When handling the trust service platform, the following modules are considered to be the most important section (Bao, Chen, and Guo, 2013): The feedback mechanism is also known as Reputation Measurement and Evaluation. Propagation Maintenance While handling the SIoT the following components are needed during the development process since they form the basic components: Trust Analysis and Management – this module plays a key role in ensuring that the system has been implemented based on the needed desire (Sicari, et al., 2015). This part normally appears in many systems that are closely related to the trust mechanism. Trust Broker – this section is the one responsible for providing trusted knowledge when handling different applications and services that are operating within SIoT (Truong, et al., 2016). Information needed must be registered previously as a requirement before using any trust service platform. Trust Agent – this component is known for collecting data related to trust ranging from physical to domains found on social SIoT (Tr?ek, 2018). The data collected can fall under opinion as an entity that contains recommendations or even feedback from other applications. C) Entity Role In the context of IoT networks, trust relation contains two entities such as trustee and trustor which are dependent on every other for sharing the common interest in the communication networks. The trustor requires to have confidence in the trustees in regards to honesty, beliefs and benevolence.
  • 9. D) Trust Properties Trust properties are mainly derived from the social science to the cyber-attacks and contain various properties for IoT security and trust such as asymmetry, subjectivity, partial transitivity and context sensitivity. Jabeen, et al., (2018) reported that context sensitivity is one of the major trust properties for the IoT networks that need to be included in the communication infrastructure. Trust properties are mainly used for evaluating and reviewing the security-related concerns from IoT networks and building strong communication programs so that trust levels can be improved. Properties To Be Considered When Looking At Trust A) Propagative This section of trust has been studied by many researchers when handling computing features in IoT. According to Chen, Guo, and Bao (2014), this property is useful in assessing risk from schemes used in entity recognition and assessment system being built. The entities of the system are deemed extensive mostly on trust, and recommendation, and have ad hoc networks normally use short paths when connecting the entities. B) Dynamic According to Li, White, and Clarke (2021), this property looks at changes that normally happen when different entities interact based on the trust existing. Since it can be decreased or increased depending on the experiences gained in the process of interaction. Different measures have been placed in computing to determine ways through which measurement and quality of dynamics can be placed into consideration when handling computers. These different mechanisms are placed in terms of rewards and penalties whenever interaction or transaction occurs. C) Subjective Trust is more subjective and relies mostly on the interaction that has been conducted between different parties (Copigneaux, 2014). The reason for this is that various users have their way of perceiving what is trustworthy. Opinion and reasoning may vary based on the activity being done at the end of a particular event. D) Context-Dependent This property mostly relies on the trust score being issued that depends on the context of interaction. The best example, in this case, can be on solving two problems existing within a farm. Where one is a prediction of yield and the other problem is detecting diseases that are likely to break. In this, one company can be trusted to handle the production yield but not the detection of disease.
  • 10. E) Trust Applications It is demonstrated that trust applications can be applied over IoT networks to manage trust- related issues. Major two types of applications are included in the IoT trust such as service management and security mechanism. The trust-based security mechanism is more effective and beneficial that developing effective security programs and plans to deal with the insider threats and vulnerabilities from IoT networks and increase trust levels (Saied, et al., 2013). On the other hand, trust-based service management delivers effective services to the IoT technology for increasing the alignment of IoT efforts with smart devices. F) Trust Management Levels Trust management acts as a major contribution in the IoT that helps to control and manage the factors affecting trust and reputation in wireless communication networks. Trust management goals can be achieved at various levels that include data perception, identity trust, the transmission of data, and preservation of privacy and users and applications (Azzedin, and Ghaleb, 2019), for which data perception and privacy preservations are major levels that need to be covered in trust management so that privacy and confidentiality can be improved. G) Trust Computation Scheme Trust computation is a kind of process which is mainly included for extracting trustworthiness information in regards to the IoT entities (Chen, Guo, and Bao, 2014). It is mainly divided into various sections such as the composition of trust, propagation, trust update, formation and trust aggregation. Trust formation and updating both are major schemes used in the IoT networks due to their capability to build trust among users by updating security programs and providing quality services through IoT networks. H) Trust Attacks Trust attacks are mainly performed by cyber-criminals based on malicious programs and target communication channels linked with the IoT networks. Using security threats and attacks, it is easy for cyber-criminals to perform data breaches and criminal activities over IoT networks (Azzedin, and Ghaleb, 2019). Trust attacks are mainly divided into three categories such as biased recommendation, inconsistent behaviour and identity attacks. It is found that identity attacks are more common and easily performed by hackers over IoT networks and provide easy accessibility of the communication channels and database systems. Methodology: Introduction
  • 11. Research methodology has a major contribution to the research that can manage the research problems and focus on the research aims and objectives. The development of effective methodologies can lead to increase research quality and provide better ways to address research gaps (Urena, et al., 2019). The methodology section intends to increase understanding and knowledge in the field of IoT and trust and reputation modelling. Numerous research methods are selected for this project such as research design, research approach, philosophies, data collection and many more. Since the introduction of the internet, both the quantity and variety of information sources have expanded at an exponential rate. These days, knowledge is both a commodity and a necessity in the decision-making process. It is common practice for businesses to share some of the data they already have in order to obtain additional data that could be useful to their operations. This data may be sensitive, so businesses need to know if they can have faith in the partners they're sharing it with. To address this predicament, various trust models were developed. To examine the dynamics of relationships, trust models apply rational principles. Whenever a computer operating a trust model interacts with another agent, it evaluates that agent to establish its level of trustworthiness. All interactions between agents are governed by this single value of trust. At the same time, values below that level are viewed with scepticism. The problem is these trust models are so broad and different from one another that it's hard to tell which ones tackle which aspects of the trust idea. This study suggests a set of factors to be used in evaluating different security models in order to discover the problems that are solved by particular models. This set of requirements can be broken down into four broad classes. Limitations on space mean only one of these criteria may be examined in depth, followed by an example study of a trust model to show how these criteria are applied in practice. Research Philosophy Research philosophy is mainly used in the studies to create effective frameworks to address research problems and gain depth information regarding research themes (Ureña, et al., 2019). Two major types of philosophies are included in the studies: positivism and interpretivism. Positive philosophy is capable to provide observational research based on the research objectives and requires developing and testing the research hypotheses. As opposed, interpretivism is a branch of Epistemology capable of focusing on the research problems and developing effective data-gathering ways to address the identified problems and issues (Bao, Chen, and Guo, 2013). An interpretivism philosophy aims to provide in- depth analysis in regards to the research topic by providing observational research. In this research, an interpretivism philosophy is selected as it can propose effective approaches and plans to gain in-depth insight into research questions. Using such a
  • 12. philosophy, there is no need to develop research hypotheses and testing processes by which complexity can be reduced and objectives can be achieved effectively. Research Approach A research approach is reliable and beneficial for the dissertation that has the capability can develop significant research plans and outlines based on the objectives and research themes. It is capable to propose significant data collection platforms for the research so that depth information can be obtained and research questions can be addressed in less time (G?owacka, Krygier, and Amanowicz, 2015). Major two types of approaches are included in the studies such as inductive and deductive. Inductive Approach: The inductive approach is also defined as inductive reasoning that begins with the observational process and theories are developed toward the research questions(Ureña, et al., 2019). Deductive Approach: On the other side, the deductive approach is based on the generalization reasoning of the research topic that requires proposal hypotheses and provides limited information in the research. This research followed an inductive approach due to its ability to provide significant ideas and observational programs to develop reliable plans and outlines so that research can be done in the right direction. Using such an approach, it is easy for achieving the developed goals and objectives and obtain effective findings. Research Design Truong, et al., (2016) reported that research design is one of the important methodologies used to outline the research structure. By using the investigation design, the study can get the right way to comprehend the investigation issue to obtain valuable and proper data. It also helps the scholar to propose an outline of the process of investigating the study and permits them to resolve the research problems and concerns in less time. It is found that different types of designs could be added to research for example quantitative and qualitative (Sicari, et al., 2015). In this manner, quantitative design is beneficial to focus on gaining numerical info with the help of statistical techniques. On the other side, qualitative design can allow the researcher for developing opinions and gain theoretical information. It also delivers the base for quantitative design and supports the data collection methods. A qualitative design is followed in this research as it is beneficial for gaining in-depth observation and proposing effective data collection processes. Using qualitative research, it is easy to manage and address the research questions and research can be completed within time with significant findings. The design can be based on the below approaches.
  • 13. Fuzzy Technique Traditional authentication techniques are ineffective in distributed and dynamic IoT environments, when identities are unknown in advance. The gadgets end up sharing information and applications with people they know and trust. After that, a Fuzzy system for Trust-Based Access Control is introduced (FTBAC). In FTBAC, trust is calculated by taking into account three factors: experience, expertise, and suggestion. The trust ratings are then linked to privileges, access requests, and credentials to create confirmation of granting or not granting accessibility. Device Layer, Requesting Layer, as well as Access Control Layer, are the three layers that make up FTBAC. Both Smart devices and our interactions are included in the first layer. The second level gets data on experience, competence, and recommendations before calculating a fuzzy trust rating. Following the principle of least privilege, the third approach is considered in the decision mechanism and correlates the computed fuzzy trust value and access privileges. The simulation findings show that FTBAC is both flexible and scalable, as well as energy-efficient. While managing accessibility through a mechanism based on cryptographic security improves the level of confidence, it comes at the cost to minimize the time. A fuzzy way of calculating trust is presented. There are three layers to it: a sensing layer, a core network, and a network protocol. Users view the IoT ecosystem to be a Service Provider, as well as trust management enables the IoT to give better-qualified services to every Service Requester. Retrieval, distribution, and decision-making are all parts of this trust model. It also creates security procedures depending on a judgment function depending on the customer's trust score. Unless the customer's credential complies with these security criteria can the client access the IoT. The trust model is employed to maintain user security by connecting location-aware, identity-aware, and authentication records. Whenever a user requests a service, They receive a trust value. There seem to be three methods of verification, one per trust value. Clients must supply biometric data if the trust value is low. If they have a medium level of trust. The goal is to use a fuzzy process to gain a categorization of the operations to assess the responsiveness of the provided data. Social Networking Because smart technologies are human-related gadgets, they are typically found in public spaces and connect via wireless channels, making them vulnerable to malicious assaults. Smart objects are frequently heterogeneous and must collaborate to perform a task. There are three types of social connections: friendship, ownership, as well as the community. As a form of self-promotion, malicious nodes carry out trust-related threats to disrupt the
  • 14. normal operation of IoT. Another decentralized, encounter-based, as well as activity-based trust management mechanism for IoT has been suggested. Network entities that communicate with one other, in particular, produce a trust evaluation and then trade that with other nodes, resulting in an implicit rate that appears to be a suggestion. Cooperativeness and communal interest are the criteria used to calculate trust. As a result, even if the settings vary continuously, this dynamic protocol can discover the appropriate trust parameter to enhance the application's effectiveness. Introduce a completely secure overlay network in the context of social media networks. Because it is centred on continuous peer-to-peer contacts and community development, it guarantees quick, simple, and secured access to the Internet. Every gadget and community has a unique identity that influences the trustworthiness of other nodes based on their actions. Physical closeness, satisfaction, clarity of answer, seniority in the trusted channel, common aims, justifications, and history of engagement are some of the characteristics to consider. Chains of credibility will enable the creation of groupings and distinctive identities to gain accessibility and disseminate related data. When users connect to the network, they do so via crossing the trust chain created by nodes. Cooperative Approach To recognize the malicious activity of surrounding nodes, a hierarchy trust model for IoT is being introduced. To track object-reader interactions, t Verifiable Caching Interaction Digest (VCID) is used. The study also includes a long-term reputational strategy for managing organizational trust. In a pervasive Computing architecture, a decentralized strategy manages collaboration. Specifically, creating a trust management system with IoT that may assess a node's trust based on its previous behaviour. The model calculates the trust value based on both direct and indirect observations from surrounding nodes. For distributed networking in the Internet of Things, an attack-resistant trust management paradigm has been developed. This approach determines and propagates reputations in distributed routing architectures, allowing for the establishment of dependable trust relations of self-organized units and the avoidance of dangerous attacks. Evidence synthesis and the Bayes algorithm are used to calculate the suggested trust and historical statistical trust. Research Strategy The research strategy is helpful for the research project that provides a platform to assess the data assembly ways by which investigation can be completed reliably. the development of an effective strategy can lead to increase research quality and effective outcomes can be obtained (Truong, et al., 2016). There are various strategies included in the studies for
  • 15. example surveys, focus groups, literature reviews, case studies and many more. In this research project, a literature review based on the research strategy is included due to its capability to reduce challenges and obtain effective information. The literature review intends to gain depth insight into IoT and trust-related issues by addressing the research gaps and problems. In this manner, various resources are included such as peer-reviewed papers, online websites, books, journal papers and many more. In the literature review, more than 50 research papers have been reviewed that focus on the trust and reputation- related problems associated with IoT technology. In terms of effectiveness, the literature review is more effective and reliable as that delivers a platform to propose effective data collection approaches so that research questions can be addressed in less time. It also supports qualitative research design and helps maintain the research quality by reducing research gaps significantly. Data Collection The data collection method plays a significant part when looking at research methodology that can deal with the research questions by proposing effective data gathering approaches and techniques. The selection of a data collection technique is based on the research theme and developed questions. Major primary and secondary methods are included in the studies for collecting data (Truong, et al., 2016). In this manner, primary data is mainly gathered from fresh resources including interviews, surveys and many more and support quantitative research. On the other hand, secondary data is gathered using literature review, case studies and observations that mainly support qualitative research. Using primary research, the complexity and difficulties can be increased that require conducting either survey or interview for collecting data from the participants. However, secondary is an effective way to obtain data in less time and manage the research problems. In this research project, a secondary data collection technique is added as it is capable to provide effective that can provide in-depth insight into IoT and trust-related issues. Using literature review, it is easy to collect secondary data and address research questions in less time. Therefore, data collection is a beneficial methodology for achieving research objectives and gathering related data easily. Analysis Of Data Data analysis plays a major role in the research, enabling the researchers to review and analyze the obtained data and propose effective findings. A data analysis technique aims to gain significant results or outcomes and address the developed questions effectively. Different techniques are included in the data analysis such as statistical, content analysis and thematic (Tr?ek, 2018). In this research, descriptive content analysis is included due to
  • 16. its ability to manage the research gaps and analyze the collected data sufficiently to obtain reliable results. In terms of complexity, content analysis is less complex and difficult which helps to review the literature review and obtain effective points and facts in regards to the research topic. Therefore, it is stated that all these are reliable and helpful methodologies used in the project that can manage research problems and proper effective plans to address research questions and achieve aims and objectives. Trust Evaluation Based On Complexity Provided By IoT Services IoT application normally uses different approaches when it comes to how information and data are evaluated within a given system. Since one approach cannot be fulfilling enough to calculate matters arising locally or even those that need to be handled remotely. Centralized According to Kravari and Bassiliades, (2019), this approach uses a centralised platform that can be accessed by nodes found within its domain that relies on the request and services trusted. The platform is the one managing all the trust information like negotiations, calculations, and the making of the decision. Also, it provides the user with all the information that will be used in making all the necessary trust evaluations. This means that what has been rated applies to the whole rating system since it is treated as global. Areas, where centralization plays a key role, include electronic marketing as well as social networks with companies like Facebook, Amazon, and e-bay taking their chances. Distributed This evaluation method works through the cooperation of nodes as they calculate trust locally through conducting observation and exchange of reports with their neighbouring nodes (Guo, and Chen, 2015). An example is when the node considered as the trustor estimates the final value from the trustee through comparison with the report it has as the trustor node. This is done also to other global peers. In cases where direct is not available, validation of data plays a key role in identifying information on other sections of the domain. Decentralized This trust mechanism acts as an alternative to the existing model where it combines both architectures of centralized and distributed making it to be more reliable. Since it contains added points based on what the two designs had. This is evident through the capability of a centralized model being able to evaluate trust information and place it where its agency matters the most. While distribute approach is capable of handling trust computation regularly (Kounelis, et al., 2014). The major concern is the application of trust authorities that will help in evaluating information when this is applied on large scale.
  • 17. Ethical Considerations Conducting research requires focusing on the ethical issues and problems of the study. This research project developed an ethical approval form and submitted it to the university based on the provided guidelines to deal with the ethical challenges. In order to manage security concerns, data protection laws and regulations are reviewed and followed which helps to reduce ethical and unauthorized problems from the research. Only authentic sources are included in the data collection that helped to obtain data with lesser ethical concerns and risks. In the conducted literature review, various research papers and articles were analyzed and in-text citations were added in order to provide credit to the writers (Tr?ek, 2018). Moreover, a reference list is added to the research by which readers can access the complete papers included in the literature review and improve their knowledge. Therefore, by using such activities and processes, ethical challenges and risks can be managed and the quality of the project can be improved. Limitations Research methods and approaches that are more effective and reliable helped to develop significant outlines and gain significant data in regards to the trust and reputation issues related to IoT. This chapter helped to increase understanding and knowledge about research methodologies and managed research gaps significantly. In this research, a qualitative design is followed as it is beneficial for gaining in-depth observation and proposing effective data collection processes. Using qualitative research, it is easy to manage and address the research questions and research can be completed within time with significant findings. However, the major limitation of the methodology is that it focuses on secondary research based on a literature review by which theoretical information can be obtained and quality can be affected. Qualitative design provided brief and limited information about trust and reputation modelling in IoT and it is difficult to support arguments with the viewpoints of the participants. Future research should focus on such limitations and need to conduct primary research to get participants' opinions regarding IoT-based trust and reputation modelling. Analysis And Findings From Data: Introduction Data analysis is one of the major parts of the research that delivers a platform to review and evaluate the collected data for obtaining effective findings. In this report, descriptive content of analysis is selected as it is capable to issue findings or results effectively and also managing research problems easily. This chapter will review and compare the various trust and reputation models used in IoT technology and will also propose a taxonomy for improving security and trust within IoT networks.
  • 18. Trust And Reputation Methods Kravari and Bassiliades, (2019) reported that trust and reputation both are major parts of IoT security that need to be managed from IoT networks by implementing proper models and approaches. In order to manage trust issues from IoT networks, companies need to manage identity and access controls by implementing proper security frameworks and programs. Increasing the security of IoT networks can help to build trust and reputation and protect the personal data of the users from cyber-criminals. There are the following methods and approaches used for evaluating trust and reputation in IoT: A) Social Networking Model Kusuma, et al., (2020) reported that social networking is an effective trust model that can review and evaluate the security risks associated with IoT networks and analyze trust- related problems. It is a conventional peer-to-peer network-based trust approach that is linked with the social network information shared over IoT devices. In the context of IoT trust and reputation, any entity builds social relations with other entities which are based on social networks and communication channels (Guo, and Chen, 2015). It follows the Eigen trust model for IoT networks where every peer is assigned a global trust value based on the previous transactions over communication networks. Figure 4.1: Trust Management in IoT (Jabeen, et al., 2018) Malicious nodes are mainly developed by hackers that realize trust-related attacks and help to reduce the cyber-security of sensitive data. In order to manage such problems, the social networking model helps to connect malicious detection nodes with the IoT networks and provides self-promoting and risk detection programs. Mohammadi, et al., (2019) reported that the major advantage of the social networking approach is that it is based on the theoretical models that depend on the communication networks used in the IoT devices. The social networking model mainly follows three parameters for evaluating trust and reputation: honesty, community interest and cooperativeness (Kounelis, et al., 2014). So, this dynamic model is capable to find the best parameters of trust and maximize the effectiveness of IoT networks. It is completely based on the subjective model which is mainly used for managing the trustworthiness of the IoT-based security programs and frameworks. However, the major disadvantage of this model is that it is less capable to detect and identify insider risks and threats leading to security concerns due to which trust cannot be increased and privacy can be affected. B) Fuzzy Technique
  • 19. Origgi, (2019) identified that the traditional security and access control models cannot manage security and privacy concerns where identities are not described earlier which can negatively influence trust and reputation. A fuzzy approach is more effective and beneficial for the IoT networks that develop trust-based access control to deal with security and data breach-related problems (Bauer, et al., 2013). In the context of IoT networks, the trust is computed in trust-based access control by considering three factors experience, knowledge and suggestion. The trust values are now mapped to the permissions, and requests for accessing the confidential platforms. Figure 4.2: Trust and reputation in IoT(Pollák, et al., 2016) Pecori, (2016) stated that the fuzzy trust model also follows the PeerTrust-based reputation model in order to manage factors influencing the security and trust of personal details. The key benefit of the fuzzy model is that it is capable to increase trust and reputation in IoT networks by implementing security controls and access controls. Pollák, et al., (2016) identified that the fuzzy-based trust model is capable to ensure flexibility and security of the IoT networks and building effective trust and reputation. In order to calculate trust, the fuzzy technique composes three layers as sensor layer that contains physical devices, the core layer that contains access networks and the application layer that includes distributed networks and interfaces (Kang, et al., 2013). For IoT networks, the fuzzy trust model enables the IoT to deliver more qualified and secured services to the companies (Ullah et al., 2019). However, the major disadvantage of the fuzzy trust model is that it requires proper resources and systems for evaluating trust and reputation which can produce challenges and difficulties in IoT systems (Hussain et al., 2020). C) Cooperative Approach Rafey, et al., (2016) proposed a hierarchical trust model for IoT technology which is based on the cooperative approach to detecting unwanted and malicious signals from computing networks. The cooperative approach is more effective and suitable for trust and reputation in IoT that uses a decentralized model to handle cooperation in the IoT-based communication architecture (Rana and Bo, 2020). In this manner, a trust management system is developed which is capable to evaluate and review the security risks and focus on the trust of a node based on the previous behaviour. Figure 4.3: trust model for IoT networks (Salamai, 2021) The key feature of the cooperative approach is that it calculates the value of trust and reputation regarding both direct observation and indirect observation with the
  • 20. neighbouring nodes. The trust management system based on the cooperative model is capable to contains several phases such as collecting the trust value of the nodes, establishing a collaborative service with the nodes, and evaluating self-updates with the help of retrieving information from the previous activities, setting a recommendation score to every node. Salamai, (2021) reported that trust modelling is completely dependent on the security programs and networks linked with the IoT and corporation modelling helps to calculate and propagate the reputation that allows the development of reliable and effective trust relations among self-organized nodes. In terms of effectiveness, a cooperative approach is more reliable and beneficial for the IoT networks that can manage the security issues and risks from internal networks and protect data effectively. However, the major limitation of this trust approach is that it is complex and requires more time to build trust models for the communication networks and external risks cannot be minimized (Chen et al., 2018). D) Identity-Based Method (Tr?ek, 2018) The author reported that IoT is mainly connected with the computing networks and communication channels which are less capable to defend against cyber- attacks due to which hackers can be performed cyber-criminal activities and trust can be affected. a Web social network is mainly used for detecting and managing the security- based trust issues from IoT networks. It is found that an identity-based approach is more effective and reliable for trust management in IoT technology that follows the social networking models to deal with trust and reputation problems. Figure 4.4: IoT trust (Truong, et al., 2016) In order to increase confidentiality and privacy for the IoT networks, it is recommended that the identity-based technique should be followed as it is capable to limits attacks and criminal activities from outside the IoT network and identifying malicious nodes. Truong, et al., (2016) agreed and stated that an identity-based network has the potential to monitor the movements of the network-based nodes from the IoT systems and detect malicious codes and risks to protect data from hackers. Moreover, the identity-based trust model can be connected with the communication channels and device node identification from the host addressing so that chances of hacking can be minimized. More than 70% of the cyber-criminals perform unauthorized activities over IoT networks and communication channels for which identity-based is helpful that provides a way to increase the authenticity of the networks and communication nodes. The shared authentication of nodes receipts through the sign of the identity characteristics, produced by a trusted third party. Truong, et al., (2016-II) observed that identity info is revealed only to the authorized focusses and the Domain Trusted Entity establishes an internationally
  • 21. trusted substructure by the pre-sharing of cryptographic credentials. The infrastructures- based communication is being endangered through cryptographic protocols and is capable to deal with trust and reputation-related problems. The major advantage of the identity- based model is that it uses cryptography algorithms that are capable to convert data into codes so that privacy and hacking problems can be minimized (Pöhls, et al., 2014). However, it requires changing communication infrastructure and advanced networks and systems are required that can increase operational costs. E) TRMSim-WSN Model Turkina and Ihnatiev, (2020) reported that TRMSim-WSN is an effective trust and reputation model which is used for IoT-based distributed networks. It is capable to identify and review the malicious nodes from the communication networks and providing a way to incorporate a new trust model. The major benefit of the TRMSim-WSN model is that it stimulates the security risk detection programs over IoT networks so that insider threats and vulnerabilities can be managed and a proper effective communication framework (Mahalle, et al., 2013). As compared to the other trust and reputation models, TRMSim-WSN is more reliable and beneficial that delivers a generic API composed to deal with trust-related challenges. Major five steps are followed by TRMSim-WSN to simulate trust within IoT networks such as gathering information, scoring, entity selection, transaction, reward and punish. Figure 4.5: TRMSim-WSN model (Ureña, et al., 2019) Ureña, et al., (2019) examined that TRMSim-WSN initially gather behavioural information in regards to the members accessing IoT communication networks. The collected information is utilized for delivering a score that can be used to examine the reputation and trust of each user in the database system. The most trustworthy entity is mainly chosen and a transaction is performed for evaluating the satisfaction and security levels. As per the identification, it is easy for managing trust-related problems and increase security of the sensitive data. Therefore, it is stated that TRMSim-WSN is helpful for the trust and reputation in IoT and can be used to increase the security and trust of the communication networks. However, the implementation of the TRMSim-WSN model can increase problems within data management and communication systems. Therefore, all these are common trust and reputation models that can be implemented in the IoT technology and communication networks. Results And Discussion It is found that IoT is an effective technology that provides a platform for connecting multiple devices and networks through a single system. In terms of effectiveness, IoT
  • 22. technology is more effective and suitable for the data communication by which remote access controls can be developed. The conducted literature examined that IoT is less capable to deal with the security risks and vulnerabilities due to which users can suffer from the data breach and hacking problems that influence trust and reputation among users (Azzedin, and Ghaleb, 2019). The presence of security risks in the IoT networks can affect the confidentiality of personal details and users can suffer from ethical issues and cyber-criminals. Trust and reputations both are linked with the security of IoT networks for which proper security and trust models need to be implemented. Tr?ek, (2018) agreed and stated that trust can be improved among users by increasing the security of the IoT networks for which secured infrastructures and communication platforms need to be developed. As compared to other communication networks, IoT is a common technology used as a wireless communication network and enables companies to collect data from the users that require better trust and security models. Comparison Between Trust And Reputation Methods Trust management plays a major contribution in the IoT networks that provides a way to focus on the trust and reputation challenges and increase the security of personal data. The findings show that the trust model based on the trust management approach can help the companies to increase privacy and information security and overcome perception uncertainty and insider threats. Both trust and reputations are dependent on the security programs linked with the IoT networks where it is a challenging task for the companies to build trust among users as cyber-attacks are increasing rapidly. Truong, et al., (2016) examined that trust in IoT is based on security and it is important for companies to securely store collected data into a database and connect communication systems with the security frameworks. Various types of trust and reputation methods are reviewed in the literature such as social networking, fuzzy technique, corporative approach, PeerTrust, identity-based approach and TRMSim- WSN model. It is found social networking is a theoretical trust model which is capable to deal with the security issues linked with communication networks. As compared to other trust models, social networking ensures quick, easy and secure access to the users and personal details as it is based on the PeerTrust approach. Social networking based on the PeerTrust model is capable to work in peer-to-peer networks where factors affecting trust can be reviewed and evaluated at every node. The literature review shows that in the social networking approach, every IoT device contains the identity and changes the trust of nodes by reviewing their behaviour. Security can be established within the IoT networks using proper risk assessment plans and it is
  • 23. easy to build trust and reputation among users. However, it is a theoretical and behavioural trust model due to which significant and depth insight into IoT trust cannot be obtained. Bennaceur, Idoudi, and Saidane, (2021) agreed and stated that traditional access controls are not capable to identify the factors affecting trust and reputation among IoT networks due to which privacy can be affected. Table 4.1: Comparison between trust models used for IoT networks Trust Model Formed for this basis The problem it addresses Limitation eBay Model for Auction Has a centralized model of trust that relies on the online feedback system Evaluate the trust that is evident between buyers and sellers Has limited ability to restrict identities that are duplicate or fake. Point-Based Model of Trust
  • 24. Access and control authentication Via point-based authorization Sensitive information is protected while in an open environment. The description of how point values are gathered is not stated. Basic Management Model of Trust Properties from the trust Transfer of trust. Existing relation between the transfer of trust and entailment of policy Not advisable when dealing with distributed systems. Credential Based Model of Trust Information based authorization
  • 25. Authentication procedure in a distributed environment Centralized environment. Figure 4.6: Root of trust in IoT (Bennaceur et al., 2021) In order to manage such problems, a fuzzy technique is developed which is capable to propose a decentralized approach to deal with the trust and reputation problems in IoT. The major benefit of the fuzzy approach is that it develops a trust-based access control where trust is computed by considering various factors such as knowledge, experience and recommendations. The literature review identified that the fuzzy approach can identify the trust values associated with the IoT users and map into the permissions to provide accessibility regarding communication channels (Gui et al., 2018). Another advantage of the fuzzy approach is that it contains three layers to manage trust- related problems from IoT networks as device layer that monitor computing devices, the request layer that provides updates regarding security and trust problems and the access control layer that provide remote access to the collected data. Fernandez, et al., (2017) examined that the fuzzy approach is beneficial for increasing the trust level among IoT networks and dealing with security issues by proposing security frameworks. However, the major drawback of the fuzzy approach is that it overhead the communication networks due to which the connectivity may be lost. From the conducted literature, it is found that a cooperative trust model is a decentralized approach to handling trust-related problems from IoT architecture. Figure 4.7: IoT security and trust challenges (Bennaceur et al., 2021) In the context of trust management, the cooperative approach follows the PowerTrust model which is capable to consider the distribution of peer networks in a secured and trusted framework. A cooperative major is beneficial for the IoT networks that calculate trust value in regards to the direct observation and indirect observation coming from the communication nodes (Wei et al., 2014). As compared to the other trust models, the cooperative approach is more effective that collecting the trust values from nodes and establishing a collaborative service with the network so that trust-related issues can be
  • 26. minimized. The findings show that the cooperative approach is capable to recommend trust programs and historical trust issues are computed by the evidence combination and Bayes algorithm to examine effective information. However, the major disadvantage of the cooperative approach is that it requires building communication and security frameworks for IoT networks that can increase complexity and affect overall performance. Fortino, et al., (2020) proposed a trust model based on the identify method which is capable to determine trust management for the IoT networks and communication systems. The major benefit of the identity-based method is that it increases the security of the communication networks and limits cyber-attacks from the IoT networks along with malicious codes (Tabassum and Lebda, 2019). Figure 4.8: Trust evaluation factors (Jabeen, et al., 2018) As compared to other trust models, the identify-based method is more effective and suitable that delivers a platform to detect and monitor the malicious risks from networks and nodes so that trust can be increased among users and privacy of sensitive data can be improved. TRMSim-WSN is one of the common trust models used by companies to deal with the security and trust issues associated with IoT networks. The major advantage of TRMSim- WSN is that it delivers a platform to develop and incorporate trusted networks for the IoT devices so that collected data from the users can be protected from cyber-criminals. Jabeen, et al., (2018) agreed and stated that the TRMSim-WSN model simulates the risk identification programs and compares the security models with the previous activities to obtain significant information. It contains various steps for evaluating trust and reputation in IoT networks such as gathering data, scoring trust, entity selection, and transaction and reward programs. However, TRMSim-WSN requires to development of proper programs and risk identification frameworks that can increase challenges and difficulties in businesses and IoT networks. In terms of cost, TRMSim-WSN implementation requires advanced communication systems and programs which are more expensive to implement. Therefore, it is recommended that companies have a trust and reputation model as per their requirement to minimise trust and security concerns. Conclusion From the above findings, it may be said that IoT is an effective technology that can be combined in businesses to manage communication gaps and propose remote access controls but it is difficult to resolve security and trust-related problems. This research helped to review the challenges and risks associated with trust and reputation in IoT networks and helped to increase understanding and knowledge about IoT trust. It is found
  • 27. that it is important for companies to include IoT in their business operations due to their ability to propose data communication flows and provide smart analytics so that identification and evaluation of the collected data can be done in less time. It is capable to build wireless communication networks by which it is easy for the users to exchange data or information without requiring connecting cables and wires. With the help of IoT networks, business communities are capable to deal with communication-related problems and collecting data from the customers for performing analysis and evaluation-related activities. Due to improper knowledge about cyber-security, it is challenging for the employees to deal with the security threats and communication channels that can be accessed by the attackers which can affect trust and reputation negatively. Various types of trust and reputation methods are reviewed in the literature such as social networking, fuzzy technique, corporative approach, PeerTrust, identity-based approach and TRMSim-WSN model. The literature review identified that the fuzzy approach can identify the trust values associated with the IoT users and map into the permissions to provide accessibility regarding communication channels. The findings show that the cooperative approach is capable to recommend trust programs and historical trust issues are computed by the evidence combination and Bayes algorithm to examine effective information. This dissertation concluded: Enhanced knowledge and awareness of cyber security and its model. The fuzzy approaches for better security of IoT users. Cooperative approaches for recommending the proposed trust model. Recommendations It is recommended that companies should focus on the security and trust-related problems associated with the IoT networks and proper trust models should be applied so that data privacy and confidentiality can be improved. In order to evaluate trust and reputation, it is recommended that the TRMSim-WSN model should be implemented due to its capability to develop a simulation system for reviewing the security issues and protecting IoT networks from malicious codes (Yoon et al., 2015). Moreover, companies should develop proper risk assessment plans and ensure that collected data from the users through IoT networks are stored in secured database systems. Future Direction The major limitation of this research is that it focuses on secondary research based on a literature review by which theoretical information can be obtained and the quality of research can be affected. However, future research will survey questionnaires for gaining viewpoints of the participants regarding trust and reputation in IoT networks and will
  • 28. manage research gaps. Moreover, a trust model will be implemented over IoT-based communication networks to deal with the security and trust-related problems and will also suggest effective security controls and frameworks for improving data privacy. References Abdalzaher, M.S., Samy, L. and Muta, O., 2019. Non?zero?sum game?based trust model to enhance wireless sensor networks security for IoT applications. IET Wireless Sensor Systems, 9(4), pp.218-226. Abdullayeva, F., 2016. Analysis of the Requirements of the Information Security of Reputation Systems and Scenario of Using Reputation Systems in the Cloud Computing Environment. Journal of Automation and Information Sciences, 48(7). Ahmed, A.I.A., Ab Hamid, S.H., Gani, A. and Khan, M.K., 2019. Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges. Journal of Network and Computer Applications, 145, p.102409. Alofi, A., Bahsoon, R. and Hendley, R., 2021, September. MinerRepu: A Reputation Model for Miners in Blockchain Networks. In 2021 IEEE International Conference on Web Services (ICWS) (pp. 724-733). IEEE. Arabsorkhi, A., Haghighi, M.S. and Ghorbanloo, R., 2016, September. A conceptual trust model for the Internet of Things interactions. In 2016 8th International Symposium on Telecommunications (IST) (pp. 89-93). IEEE. Asiri, S. and Miri, A., 2016, December. An IoT trust and reputation model based on recommender systems. In 2016 14th Annual Conference on Privacy, Security and Trust (PST) (pp. 561-568). IEEE. Azzedin, F. and Ghaleb, M., 2019. Internet-of-Things and information fusion: Trust perspective survey. Sensors, 19(8), p.1929. Bao, F., Chen, R. and Guo, J., 2013, March. Scalable, adaptive and survivable trust management for community of interest-based internet of things systems. In 2013 IEEE eleventh international symposium on autonomous decentralized systems (ISADS) (pp. 1-7). IEEE. Baqa, H., Truong, N.B., Crespi, N., Lee, G.M. and Le Gall, F., 2018, August. Quality of Information as an indicator of Trust in the Internet of Things. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And
  • 29. Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 204-211). IEEE. Bauer, M., Bui, N., Loof, J.D., Magerkurth, C., Nettsträter, A., Stefa, J. and Walewski, J.W., 2013. IoT reference model. In Enabling Things to Talk (pp. 113-162). Springer, Berlin, Heidelberg. Bennaceur, J., Idoudi, H. and Saidane, L.A., 2021. Hierarchical game-based secure data collection with trust and reputation management in the cognitive radio network. Computers & Electrical Engineering, 96, p.107463. Chen, R., Bao, F. and Guo, J., 2015. Trust-based service management for social internet of things systems. IEEE transactions on dependable and secure computing, 13(6), pp.684-696. Chen, R., Guo, J. and Bao, F., 2014. Trust management for SOA-based IoT and its application to service composition. IEEE Transactions on Services Computing, 9(3), pp.482-495. Chen, X., Lijffijt, J. and De Bie, T., 2018, July. Quantifying and minimizing risk of conflict in social networks. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (pp. 1197-1205). Copigneaux, B., 2014, March. Semi-autonomous, context-aware, agent using behaviour modelling and reputation systems to authorize data operation in the Internet of Things. In 2014 IEEE World Forum on Internet of Things (WF-IoT) (pp. 411-416). IEEE. Duan, J., Gao, D., Yang, D., Foh, C.H. and Chen, H.H., 2014. An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications. IEEE Internet of Things Journal, 1(1), pp.58-69. Fernandez-Gago, C., Moyano, F. and Lopez, J., 2017. Modelling trust dynamics in the Internet of Things. Information Sciences, 396, pp.72-82. Fortino, G., Fotia, L., Messina, F., Rosaci, D. and Sarné, G.M., 2020. Trust and reputation in the internet of things: state-of-the-art and research challenges. IEEE Access, 8, pp.60117-60125. G?owacka, J., Krygier, J. and Amanowicz, M., 2015, December. A trust-based situation awareness system for military applications of the internet of things. In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT) (pp. 490-495). IEEE. Gui, G., Huang, H., Song, Y. and Sari, H., 2018. Deep learning for an effective nonorthogonal multiple access scheme. IEEE Transactions on Vehicular Technology, 67(9), pp.8440-8450. Guo, J. and Chen, R., 2015, June. A classification of trust computation models for service- oriented internet of things systems. In 2015 IEEE International Conference on Services
  • 30. Computing (pp. 324-331). IEEE. Hussain, Y., Zhiqiu, H., Akbar, M.A., Alsanad, A., Alsanad, A.A.A., Nawaz, A., Khan, I.A. and Khan, Z.U., 2020. Context-aware trust and reputation model for fog-based IoT. IEEE Access, 8, pp.31622-31632. Jabeen, F., Hamid, Z., Akhunzada, A., Abdul, W. and Ghouzali, S., 2018. Trust and reputation management in healthcare systems: Taxonomy, requirements and open issues. IEEE Access, 6, pp.17246-17263. Janiszewski, M., 2020, May. TRM-EAT-a New Tool for Reliability Evaluation of Trust and Reputation Management Systems in Mobile Environments. In 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID) (pp. 718- 727). IEEE. Kang, K., Pang, Z., Da Xu, L., Ma, L. and Wang, C., 2014. An interactive trust model for application market of the internet of things. IEEE Transactions on Industrial Informatics, 10(2), pp.1516-1526. Kokoris-Kogias, E., Voutyras, O. and Varvarigou, T., 2016, September. TRM-SIoT: A scalable hybrid trust & reputation model for the social Internet of Things. In 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA) (pp. 1- 9). Ieee. Kounelis, I., Baldini, G., Neisse, R., Steri, G., Tallacchini, M. and Pereira, A.G., 2014. Building trust in the human? internet of things relationship. IEEE Technology and Society Magazine, 33(4), pp.73-80. Kowshalya, A.M. and Valarmathi, M.L., 2017. Trust management in the social internet of things. Wireless Personal Communications, 96(2), pp.2681-2691. Kravari, K. and Bassiliades, N., 2019. StoRM: A social agent-based trust model for the internet of things adopting microservice architecture. Simulation Modelling Practice and Theory, 94, pp.286-302. Kusuma, L., Rejeki, S., Robiyanto, R. and Irviana, L., 2020. Reputation system of C2C e- commerce, buying interest and trust. Business: Theory and Practice, 21(1), pp.314-321. Li, F., White, G. and Clarke, S., 2021. A Trust Model for SLA Negotiation Candidates Selection in a Dynamic IoT Environment. IEEE Transactions on Services Computing. Lingda, K., Feng, Z., Yingjie, Z., Nan, Q., Dashuai, L. and Shaotang, C., 2021, February. Evaluation method of trust degree of distribution IoT terminal equipment based on
  • 31. information entropy. In Journal of Physics: Conference Series (Vol. 1754, No. 1, p. 012108). IOP Publishing. Ma, Z., Liu, L. and Meng, W., 2020, November. DCONST: Detection of multiple-mix-attack malicious nodes using consensus-based trust in IoT networks. In Australasian Conference on Information Security and Privacy (pp. 247-267). Springer, Cham. Ma, Z., Liu, L. and Meng, W., 2020. Towards multiple-mix-attack detection via consensus- based trust management in IoT networks. Computers & Security, 96, p.101898. Mahalle, P.N., Thakre, P.A., Prasad, N.R. and Prasad, R., 2013, June. A fuzzy approach to trust based access control in internet of things. In Wireless VITAE 2013 (pp. 1-5). IEEE. Mendoza, C.V. and Kleinschmidt, J.H., 2015. Mitigating on-off attacks in the internet of things using a distributed trust management scheme. International Journal of Distributed Sensor Networks, 11(11), p.859731. Mohammadi, V., Rahmani, A.M., Darwesh, A.M. and Sahafi, A., 2019. Trust-based recommendation systems in Internet of Things: a systematic literature review. Human- centric Computing and Information Sciences, 9(1), pp.1-61. Neisse, R., Steri, G., Fovino, I.N. and Baldini, G., 2015. SecKit: a model-based security toolkit for the internet of things. computers & security, 54, pp.60-76. Nitti, M., Girau, R. and Atzori, L., 2013. Trustworthiness management in the social internet of things. IEEE Transactions on knowledge and data engineering, 26(5), pp.1253-1266. Origgi, G., 2019. Trust and Reputation as Filtering Mechanisms of Knowledge. In The Routledge Handbook of Social Epistemology (pp. 78-86). Routledge. Pecori, R., 2016. S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia. Computer Networks, 94, pp.205-218. Pöhls, H.C., Angelakis, V., Suppan, S., Fischer, K., Oikonomou, G., Tragos, E.Z., Rodriguez, R.D. and Mouroutis, T., 2014, April. RERUM: Building a reliable IoT upon privacy-and security- enabled smart objects. In 2014 IEEE wireless communications and networking conference workshops (WCNCW) (pp. 122-127). IEEE. Pollák, F., Dor?ák, P., Ra?eta, N. and Svetozarovová, N., 2016. Sustainable e-marketing of selected tourism subjects from the Mediterranean through active online reputation management. In Smart City 360° (pp. 692-703). Springer, Cham. Rafey, S.E.A., Abdel-Hamid, A. and Abou El-Nasr, M., 2016, April. CBSTM-IoT: Context-based
  • 32. social trust model for the Internet of Things. In 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT) (pp. 1-8). IEEE. Rana, M.M. and Bo, R., 2020. IoT?based cyber?physical communication architecture: challenges and research directions. IET Cyber?Physical Systems: Theory & Applications, 5(1), pp.25-30. Rizvi, S., Kurtz, A., Pfeffer, J. and Rizvi, M., 2018, August. Securing the internet of things (IoT): A security taxonomy for IoT. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 163-168). IEEE. Saied, Y.B., Olivereau, A., Zeghlache, D. and Laurent, M., 2013. Trust management system design for the Internet of Things: A context-aware and multi-service approach. Computers & Security, 39, pp.351-365. Salamai, A.A., 2021. Feedback and User Behavior Trust and Reputation in Risk Management. Journal of Computer Science and Information Systems, 20, p.18. Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A., 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer networks, 76, pp.146-164. Tabassum, A. and Lebda, W., 2019. Security Framework for IoT Devices against Cyber- attacks. arXiv preprint arXiv:1912.01712. Tormo, G.D., Mármol, F.G. and Pérez, G.M., 2015. Dynamic and flexible selection of a reputation mechanism for heterogeneous environments. Future Generation Computer Systems, 49, pp.113-124. Tr?ek, D., 2018. Computational Trust and Reputation Management. In Trust and Reputation Management Systems (pp. 21-54). Springer, Cham. Truong, N.B., Cao, Q.H., Um, T.W. and Lee, G.M., 2016, December. Leverage a trust service platform for data usage control in smart city. In 2016 IEEE Global Communications Conference (GLOBECOM) (pp. 1-7). IEEE. Truong, N.B., Um, T.W. and Lee, G.M., 2016. A reputation and knowledge based trust service platform for trustworthy social internet of things. Innovations in clouds, internet and networks (ICIN), Paris, France, pp.104-111. Turkina, V. and Ihnatiev, D., 2020, May. Approach to Sustainable Trust and Reputation Evaluation in Distributed Mobile Networks of the Internet of Things. In 2020 IEEE 11th
  • 33. International Conference on Dependable Systems, Services and Technologies (DESSERT) (pp. 117-121). IEEE. Ullah, F., Naeem, H., Jabbar, S., Khalid, S., Latif, M.A., Al-Turjman, F. and Mostarda, L., 2019. Cyber security threats detection in internet of things using deep learning approach. IEEE access, 7, pp.124379-124389. Ureña, R., Chiclana, F., Carrasco, R.A. and Herrera-Viedma, E., 2019. Leveraging Users’ Trust and Reputation in Social Networks. Procedia Computer Science, 162, pp.955-962. Urena, R., Kou, G., Dong, Y., Chiclana, F. and Herrera-Viedma, E., 2019. A review on trust propagation and opinion dynamics in social networks and group decision making frameworks. Information Sciences, 478, pp.461-475. Wei, Z., Tang, H., Yu, F.R., Wang, M. and Mason, P., 2014. Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63(9), pp.4647-4658. Xiao, H., Sidhu, N. and Christianson, B., 2015, August. Guarantor and reputation based trust model for social internet of things. In 2015 International wireless communications and mobile computing conference (IWCMC) (pp. 600-605). IEEE. Yan, Z., Zhang, P. and Vasilakos, A.V., 2014. A survey on trust management for Internet of Things. Journal of network and computer applications, 42, pp.120-134. Yoon, S., Park, H. and Yoo, H.S., 2015. Security issues on smarthome in IoT environment. In Computer science and its applications (pp. 691-696). Springer, Berlin, Heidelberg.