Trust Based Security Mechanisms for Resource-Constrained Internet of Things-A Review

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

The Internet of Things (IoT) defined as the assembling of real-world objects that are connected over the Internet to make human lives become well-being. The implementation and success of an IoT depend on how it's secured. But providing security is a critical task because of various natures of IoT devices such as shared and open environment, a wide range of communication protocols, standards, self-organized, lack of central control, heterogeneity of devices, etc. To provide security solutions and mechanisms, key management, cryptographic mechanisms such as private and public-key cryptography, Intrusion Detection System (IDS), and hash functions have been used. Though it is working well, it is not suitable for lightweight IoT devices. Because of such mechanisms always demand high computational, memory, and processing. To overcome these issues, researchers have chosen trust management for providing security. In this article, some of the trust-based solutions have presented. Besides, security issues, security loopholes/attacks in various layers of IoT, security requirements, trust management in IoT, properties of trust, trust management building blocks, the role of trust management in IoT, basic trust calculation methods have presented.

Cite

CITATION STYLE

APA

Prathapchandran, K., & Rutravigneshwaran, P. (2021). Trust Based Security Mechanisms for Resource-Constrained Internet of Things-A Review. In Journal of Physics: Conference Series (Vol. 1850). Institute of Physics. https://doi.org/10.1088/1742-6596/1850/1/012042

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free