Journal of Physics: Conference Series | 2021

Trust Based Security Mechanisms for Resource-Constrained Internet of Things-A Review

 
 

Abstract


The Internet of Things (IoT) defined as the assembling of real-world objects that are connected over the Internet to make human lives become well-being. The implementation and success of an IoT depend on how it’s secured. But providing security is a critical task because of various natures of IoT devices such as shared and open environment, a wide range of communication protocols, standards, self-organized, lack of central control, heterogeneity of devices, etc. To provide security solutions and mechanisms, key management, cryptographic mechanisms such as private and public-key cryptography, Intrusion Detection System (IDS), and hash functions have been used. Though it is working well, it is not suitable for lightweight IoT devices. Because of such mechanisms always demand high computational, memory, and processing. To overcome these issues, researchers have chosen trust management for providing security. In this article, some of the trust-based solutions have presented. Besides, security issues, security loopholes/attacks in various layers of IoT, security requirements, trust management in IoT, properties of trust, trust management building blocks, the role of trust management in IoT, basic trust calculation methods have presented.

Volume 1850
Pages None
DOI 10.1088/1742-6596/1850/1/012042
Language English
Journal Journal of Physics: Conference Series

Full Text