Page 55 - Trust in ICT 2017
P. 55

Trust in ICT                                                1


            A trust management concerns part or all of trust properties in different contexts for different purposes and
            should achieve the following goals [30]:
            (1)     Trust  relationship  and  decision:  trust  management  provides  an  effective  way  to  evaluate  trust
                    relationships of any two entities and assist them to make a wise decision to communicate and
                    collaborate with each other.
            (2)     Data  perception  trust:  data  sensing  and  collection  should  be  reliable  in  the  trust  management
                    system.

            (3)     Privacy preservation: user privacy including user data and personal information should be flexibly
                    preserved according to the policy and expectation of IoT users. This objective relates to the IoT
                    system objective properties in general.
            (4)     Data fusion and mining trust: the huge amount of data collected in IoT should be processed and
                    analyzed  in  a  trustworthy  way  with  regard  to  reliability,  holographic  data  process,  privacy
                    preservation and accuracy.
            (5)     Data  transmission  and  communication  trust:  data  should  be  transmitted  and  communicated
                    securely in the IoT system. Unauthorized system entities cannot access private data of others in data
                    communications and transmission.
            (6)     Quality of services: QoS should be ensured.
            (7)     System security and robustness: trust management should effectively counter system attacks to
                    gain sufficient confidence of system users.
            (8)     Generality: trust management for various systems and services is preferred to be generic that can
                    be widely applied, which is a system objective property.
            (9)     Human-Computer  Trust  Interaction:  trust  management  provides  sound  usability  and  supports
                    human–computer interaction in a trustworthy way, thus can be easily accepted by its users.
            (10)    Identity trust: The identifiers of system entities are well managed for the purpose of trustworthy.
                    Scalable and efficient identity management in is expected.
            [31] proposed a mechanism for extracting trust information from the security system of a service based on
            the needs of an entity. Trust is used as a security metric between an entity and systems. [32] proposed a P2P
            trust model. An adaptive trusted decision making method based on historical evidences window is used to
            improve system efficiency. In Ad hoc network, an entropy theory based distributed trust model provided a
            mechanism to select trusted paths [33]. The trust value of each path is obtained through multi-layer and
            multi-level calculation, and someone can choose credible routes to implement the interaction. For WSN, a
            cluster-based layered trust scheme is characterized as a typical model [34]. Based on the trust values, a node
            assigns a trust state to other nodes. It calculates the trust value of the sensor nodes at each level, and choose
            a set of nodes to participate in the transaction. From above investigated trust solutions, some elements or
            attributes of trust management can be extracted:
            •       Service. It defines the role of the trust management. The basic idea of trust management is that the
                    security decision needs to rely on the additional safety information provided by a trusted third party.
                    Trust, as a “soft” third party, provides a service for the service requester and the service provider in
                    a network system.

            •       Decision making - the purpose of the trust management. Trust is collected to judge the credibility of
                    the cooperative nodes, based on which make a decision to deliver a service, select a credible routing
                    and transmit a data.
            •       Self-organizing. It depicts the way of the trust management. Based on trust decision, a series of
                    nodes  or  even  sub-networks  can  be  selected  and  self-organized  to  perform  a  certain  task  (i.e.
                    forwarding the packages, sensing the data) cooperatively in network scene (i.e. IoT).

            In this trust management approach, service, decision making and self-organizing are the three basic essential
            elements.
            Trust management in MANETs is needed when participating nodes, without any previous interactions, desire
            to establish a network with an acceptable level of trust relationships among themselves. Examples would be

                                                                                                           47
   50   51   52   53   54   55   56   57   58   59   60