Abstract
AbstractThe Internet of Things (IoT) provides a way of communication between devices in everyday life. The range of IoT applications, including intelligent homes, intelligent cities, wearables, e-health, etc., is very wide. The IoT, which has diverse application areas, has been one of the most important developments in recent years. The range of applications contributes to an abundance of private information dissemination by users, which is a major safety problem. Trust Management is an essential security feature that ensures the system's reliability by monitoring device activity over time to detect its malicious activities. However, conventional IoT data management is vulnerable and weak. If the collected data is rejected or the stored data is intentionally manipulated by the internal users or targeted by an external hacker, then it is difficult for the manipulated data to be used. The IoT big data and its applications become more and better. Node authentication is a vital element in the IoT environment because it enables the users to connect securely with the system. The incorporation of IoT node authentication technologies provides safe retrieval of information and robust control of access. A detailed review of trust management strategies and their advantages and drawbacks are discussed in this paper. A study about the existing trust models in order that researchers understand how various systems work together to bring desired functionalities are discussed in this paper. A brief description of the most important trust management technologies discussed in this manuscript.KeywordsTrust managementNode validationData securityAttackersData modificationsMalicious actions
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.