Abstract
End-users on the Internet of Things (IoT) will encounter many different devices and services; they will need to decide whether or not they can trust these devices and services with their information. We identify three items of trust information that end-users will need to determine if they should trust something on the IoT. We create a taxonomy of the likely scenarios end-users will encounter on the IoT and present five trust strategies for obtaining this trust information. Upon applying these strategies to our scenarios, we find that there is no strategy that can work efficiently and effectively in every situations; end-users will need to apply the strategy that best fits their current situation. Offering multiple trust strategies in parallel and having this information transparent to end-users will ensure a sustainable IoT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bassi, A., Horn, G.: Internet of Things in 2020: A Roadmap for the Future. European Commission: Information Society and Media (2008)
Maghiros, L., Punie, Y., Delaitre, S., Hert, P.D., Gutwirth, S., Schreurs, W., Moscibroda, A., Friedewald, M., Linden, R., Wright, D., Vildjiounaite, E., Alahuhta, P.: Safeguards in a world of ambient intelligence. In: Intelligent, E. (ed.) 2nd IET International Conference on Intelligent Environments, vol. 2. IEEE Computer Society, Athens (2006)
Naumann, I., Hogben, G., Fritsch, L., et al.: Security issues in the context of authentication using mobile devices, Mobile eID (2008)
Walter, T., Bussard, L., Roudier, Y., Haller, J., Kilian-Kehr, R., Posegga, J., Robinson, P.: Secure mobile business applications – framework, architecture and implementation11IST-Programme / KA2 / AL: IST-2001-2.1.3. Inf. Secur. Tech. Rep. 9, 6–21 (2004)
O’Hara, K., Alani, H., Kalfoglou, Y., Shadbolt, N.: Trust Strategies for the Semantic Web. In: ISWC 3rd International Workshop on Trust, Security, and Reputation on the Semantic Web (2004)
Fritsch, L.: Business risks from naive use of RFID in tracking, tracing and logistics. In: RFID Systech 2009 – 5th European Workshop on RFID Systems and Technologies. VDE Verlag (2009)
Fritsch, L., Fuglerud, K.S.: Time and Usability as Upper Boundary in Friend and Family Security and Privacy, vol. DART/11/2010, p. 11. Norsk Regnesentral, Notat (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fritsch, L., Groven, AK., Schulz, T. (2012). On the Internet of Things, Trust is Relative. In: Wichert, R., Van Laerhoven, K., Gelissen, J. (eds) Constructing Ambient Intelligence. AmI 2011. Communications in Computer and Information Science, vol 277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31479-7_46
Download citation
DOI: https://doi.org/10.1007/978-3-642-31479-7_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31478-0
Online ISBN: 978-3-642-31479-7
eBook Packages: Computer ScienceComputer Science (R0)