Abstract

Revolution in Machine to Machine (M2M) Communication in Internet of Things (IoT) provides smart services in all verticals. These smart heterogeneous devices can be constraint or powerful devices that are generating sensitive information and introducing new challenges in security, privacy, and trust in devices to get and provide services in a distributed fashion. These challenges are overcome by providing scalable decentralized trust management for the access control system. Trust-based security models are more reliable over cryptographic security to identify and mitigate different inside threats by assessing the trust scores. This paper proposed Scalable Trust Management (STM) using a fuzzy approach and parameters like Experience, Recommendation, and device classification are used to calculate the crisp value of the trust score. While designing rule for trust score capacity of device is considered. The simulation of STM in NS2 ensures good performance and its result guarantees scalability and energy efficiency in the heterogeneous network.

Highlights

  • Many new wireless technologies are invented to support smart applications

  • Different evaluations by different associations are released regarding the likely number of connected devices, varying from 24 billion to 50 billion connected devices

  • Internet of Things (IoT) has created its own universe in which smart things and smart devices communicate over a network and provide a variety of services to all human beings

Read more

Summary

Introduction

Many new wireless technologies are invented to support smart applications. The adoption of Machine-toMachine communication (M2M) or IoT devices and technologies has been increasing at a quicker rate. IoT has created its own universe in which smart things and smart devices communicate over a network and provide a variety of services to all human beings. Cryptography and authentication mechanisms can be used to provide security against various attacks. Powerful authentication and a strong cryptography algorithm can help to reduce some security issues for IoT These techniques and algorithms are used when nodes transfer the message between two nodes and we can say that these are the first step of defence against external attacks. Internal attacks can bypass this authentication mechanism because the attacker is having all the credentials as he is one of the users of the system To overcome these problems, there is need to work on the concept like trust management.

Literature Survey
Performance evaluation
Conclusions and future work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call