TRUST MANAGEMENT OF COMMUNICATION ARCHITECTURES OF INTERNET OF THINGS
PDF

Keywords

Internet of Things
Block Chain
Light Weight Cryptography
Security and Privacy

How to Cite

Haoxiang, Wang. 2019. “TRUST MANAGEMENT OF COMMUNICATION ARCHITECTURES OF INTERNET OF THINGS”. Journal of Trends in Computer Science and Smart Technology 1 (2): 121-30. https://doi.org/10.36548/jtcsst.2019.2.005.

Abstract

The Internet of things is the basic paradigm with the cluster of techniques that ensure innovations in the service rendered in various applications. It aims to develop a seamless connection between the tangible objects around and the information network in turn to provide a well-structured servicing to its users. Though the IOT service seems to be promising, the risks still prevail in the form of privacy and the security in user acceptance in utilizing the internet of things services, and its application. This makes the trust management very important for the internet of things. So the paper puts forth the distributed block chain involved trust system to manage the conveyance infrastructures of the internet of things paradigm. The evaluation of the proposed model evinces the enhanced security provided for the nodes of the IOT as well as its information exchange.

PDF

References

Raj, Jennifer S., and Abul Basar. (2019). QOS OPTIMIZATION OF ENERGY EFFICIENT ROUTING IN IOT WIRELESS SENSOR NETWORKS. “Journal of ISMAC”, 1(01), 12-23..

Saied, Yosra Ben, Alexis Olivereau, Djamal Zeghlache, and Maryline Laurent. "Trust management system design for the Internet of Things: A context-aware and multi-service approach." Computers & Security 39 (2013): 351-365.

Karthiban, Karthiban, Mr K., and Jennifer S. Raj. (2019). BIG DATA ANALYTICS FOR DEVELOPING SECURE INTERNET OF EVERYTHING. "Journal of ISMAC." , 1(02), 129-136

Yan, Zheng, Peng Zhang, and Athanasios V. Vasilakos. "A survey on trust management for Internet of Things." Journal of network and computer applications 42 (2014): 120-134.

Mugunthan, S. R. "SECURITY AND PRIVACY PRESERVING OF SENSOR DATA LOCALIZATION BASED ON INTERNET OF THINGS." Journal of ISMAC 1, no. 02 (2019): 81-91.

Andrea, Ioannis, Chrysostomos Chrysostomou, and George Hadjichristofi. "Internet of Things: Security vulnerabilities and challenges." In 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 180-187. IEEE, 2015.

Valanarasu, Mr R. "SMART AND SECURE IOT AND AI INTEGRATİON FRAMEWORK FOR HOSPITAL ENVİRONMENT." Journal of ISMAC 1, no. 03 (2019): 172-179.

Guo, Jia, Ray Chen, and Jeffrey JP Tsai. "A survey of trust computation models for service management in internet of things systems." Computer Communications 97 (2017): 1-14.

Suma, V. "SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN." Journal of Ubiquitous Computing and Communication Technologies (UCCT) 1, no. 01 (2019): 45-54.

Bhalaji, N. "QOS AND DEFENSE ENHANCEMENT USING BLOCK CHAIN FOR FLY WIRELESS NETWORKS." Journal of trends in Computer Science and Smart technology (TCSST) 1, no. 01 (2019): 1-13.

Eder, Thomas, Daniel Nachtmann, and Daniel Schreckling. "Trust and Reputation in the Internet of Things." Universität Passau, Tech. Rep. (2013).

Pandian, A. Pasumpon. "ENHANCED EDGE MODEL FOR BIG DATA IN THE INTERNET OF THINGS BASED APPLICATIONS." Journal of trends in Computer Science and Smart technology (TCSST) 1, no. 01 (2019): 63-73.

Liu, Yan, and Kun Wang. "Trust control in heterogeneous networks for Internet of Things." In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), vol. 1, pp. V1-632. IEEE, 2010.

Sathesh, A. "ENHANCED SOFT COMPUTING APPROACHES FOR INTRUSION DETECTION SCHEMES IN SOCIAL MEDIA NETWORKS." Journal of Soft Computing Paradigm (JSCP) 1, no. 02 (2019): 69-79.

Shakya, Subarna. "AN EFFICIENT SECURITY FRAMEWORK FOR DATA MIGRATION IN A CLOUD COMPUTING ENVIRONMENT." Journal of Artificial Intelligence 1, no. 01 (2019): 45-53.

Sivaganesan, D. "BLOCK CHAIN ENABLED INTERNET OF THINGS." Journal of Information Technology 1, no. 01 (2019): 1-8.

Katagi, Masanobu, and Shiho Moriai. "Lightweight cryptography for the internet of things." Sony Corporation (2008): 7-10.

Bashar, A. (2019). SECURE AND COST EFFICIENT IMPLEMENTATION OF THE MOBILE COMPUTING USING OFFLOADING TECHNIQUE. Journal of Information Technology, 1(01), 48-57.

Kumar, R. Praveen, and S. Smys. "A novel report on architecture, protocols and applications in Internet of Things (IoT)." In 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 1156-1161. IEEE, 2018.

Jyothirmai, Pondi, Jennifer S. Raj, and S. Smys. "Secured self-organizing network architecture in wireless personal networks." Wireless Personal Communications 96, no. 4 (2017): 5603-5620.