978-1-7281-2827-6/19/$31.00 ©2019 IEEE
A Trust Management Model for IoT
Ahmed Abdlrazaq
Department of Software Engineering
College of Technology
Firat University
Elazig, Turkey
Ahmed.abdulfattah87@gmail.com
Serkan Varol
Department of Engineering and Technology
Southeast Missouri State University
Cape Girardeau, MO
svarol@semo.edu
Abstract— The Internet of Things (IoT) is profoundly
influencing our daily lives in many areas, covering small devices to
large network systems. An IoT system may be a set of directing
rules that rearranges the usage of IoT applications. This paper
details a trust management model and security of IoT systems.
Trust management models and security play a critical part in IoT
to protect information and devices from attacks since it supplies
security for all layers and networks. This review focuses on how a
trust management model has a significant function in IoT in
enhancing reliability, privacy, and security. In this survey, we
explained the challenges along with the solutions in terms of IoT
security and privacy and recognized the main security problem in
the IoT framework. In addition, this paper explored the
characteristics of trust and pointed out some IoT security
challenges, explaining how middleware can affect the security of
IoT.
Keywords: Internet of Things (IoT), Trust Management Model
(TMM).
I. INTRODUCTION
The IoT has created a new universe, where materials and
smart devices are connected over networks and have been
integrated into each other in order to supply a smart service for
humanity. This study discusses how trust management models
have a significant function in the IoT for reliability, privacy,
enhancement, and security, in terms of information. The key
challenge in this environment is not to just to create a smart
technology system to connect several hardware devices through
networks, but to provide a high-level, secure and a trust model
process. Another challenge will involve a type of solution that
can explain how an issue can be solved in terms of security if
happened and can propose a robust solution or can provide
advice for future cases. These kinds of smart systems require a
management model with a security and privacy level high
enough to guarantee that the system will be protected against
any attacks.
The IoT can be thought of as the interface which is based on
the link between regular objects. With the rise of smart homes,
modern cities, and everything intelligence, advances have risen
as operations for unimaginable affect, potential, and
development with Cisco—the company anticipating having 50
billion devices associated with it by 2020 [1].
In any case, most of these advances could simply be hacked,
meaning that a TMM is needed to protect the identifying
research issues and take on to the security processes. The
techniques are another topic of interest that will be discussed,
as well as identifying key security issues and operational
processes. We classified these problems in terms of high,
intermediate and low-level concerns, intermediate level of
techniques processes. Looking for end-to-end secure operation
technologies allows wireless devices to connect to any
computer in the world with data and network security. The
proposed plan can protect the solution of the techniques of
operations against attacks such as the Denial-of-Service attacks
and unauthorized access. Providing a secure management
system requires a high level of security with cloud connectivity
in order to enable process technologies [2].
In addition, the work carried out on different techniques
needs to be implemented. It is essential that security has priority
if the full range of opportunity for work process techniques is
to be realized. The industry needs to be sure that it can stop
hackers and ensure that the hardware linking with the network
cannot transact with it. It needs to protect the infrastructure of
customer technology and ensure the firmware can be updated
in a secure manner [3].
IoT is still evolving as the next generation of networking and
other services. Currently, there are a lot of applications,
systems, and services related to IoT that have recently come on
to the markets in different areas such as healthcare,
transportation, security in general, etc. TMM has an important
function in IoT for checking and ensuring the reliability of data,
services, user confidentiality, and security information. This
will support the users in the understanding of unbelief and risk
regarding user agreement and the consumption of IoT
applications and services. The word ‘trust’ is a very complex
concept, with consideration as to dependability and ideas, as
well as expectations on security, capability, accuracy, and
safety [1].