Linking Trust to Cyber-Physical Systems

  • Dagmar AuerEmail author
  • Markus Jäger
  • Josef Küng
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1062)


Cyber-physical systems deeply connect artefacts, systems and people. As we will use these systems on a daily basis, the question arises to what extent we can trust them, and even more, whether and how we can develop computational models for trust in such systems. Trust has been explored in a wide range of domains, starting with philosophy via psychology, sociology, and economy. Also in automation, computing and networking definitions, models and computations have emerged. In this paper we discuss our initial considerations on linking concepts and models of trust and cyber-physical systems. After structuring and selecting basic approaches in both areas, we propose appropriate links, which can be used as action areas for future development of trust models and computations in cyber-physical systems.


Cyber-physical systems Trust Trust models Linking 



This work has partially been supported by the FFG, Contract No. 854184: “Pro\(^{2}\)Future is funded within the Austrian COMET Program—Competence Centers for Excellent Technologies—under the auspices of the Austrian Federal Ministry of Transport, Innovation and Technology, the Austrian Federal Ministry for Digital and Economic Affairs and of the Provinces of Upper Austria and Styria. COMET is managed by the Austrian Research Promotion Agency FFG.”, and by the LIT Secure and Correct Systems Lab funded by the State of Upper Austria.


  1. 1.
    Ahmadi, A., Sodhro, A.H., Cherifi, C., Cheutet, V., Ouzrout, Y.: Evolution of 3C cyber-physical systems architecture for industry 4.0. In: Borangiu, T., Trentesaux, D., Thomas, A., Cavalieri, S. (eds.) SOHOMA 2018. Studies in Computational Intelligence, vol. 803, pp. 448–459. Springer, Cham (2019). Scholar
  2. 2.
    Andersen, B., Kaur, B., Tange, H.: Computational trust. In: Khajuria, S., Bøgh Sørensen, L., Skouby, K.E. (eds.) Cybersecurity and Privacy - Bridging the Gap. River Publishers Series in Communications, pp. 83–98. River Publishers, Aalborg (2017)Google Scholar
  3. 3.
    Cardin, O.: Classification of cyber-physical production systems applications: proposition of an analysis framework. Comput. Ind. 104, 11–21 (2019). Scholar
  4. 4.
    Chang, E., Dillon, T.: Trust, reputation, and risk in cyber physical systems. In: Papadopoulos, H., Andreou, A.S., Iliadis, L., Maglogiannis, I. (eds.) AIAI 2013. IAICT, vol. 412, pp. 1–9. Springer, Heidelberg (2013). Scholar
  5. 5.
    Cho, J.H., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. 48(2), 1–40 (2015). Scholar
  6. 6.
    Griffor, E.R., Greer, C., Wollman, D.A., Burns, M.J.: Framework for cyber-physical systems: volume 1, overview. National Institute of Standards and Technology, Gaithersburg, MD (2017).
  7. 7.
    Jäger, M., Küng, J.: Introducing the factor importance to trust of sources and certainty of data in knowledge processing systems - a new approach for incorporation and processing. In: Proceedings of the 50th Hawaii International Conference on System Sciences, vol. 50, pp. 4298–4307. IEEE, January 2017. Accessed 07 Sept 2018
  8. 8.
    Jäger, M., Nadschläger, S., Küng, J.: Concepts for trust propagation in knowledge processing systems - a brief introduction and overview. In: Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2018), pp. 1502–1505 (2018).
  9. 9.
    Jøsang, A., Knapskog, S.J.: A metric for trusted systems. In: Proceedings of the 21st NIST-NCSC National Information Systems Security Conference, pp. 16–29. NSA, August 1998.
  10. 10.
    Jøsang, A., Marsh, S., Pope, S.: Exploring different types of trust propagation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 179–192. Springer, Heidelberg (2006). Scholar
  11. 11.
    Lee, I.: Trust management for cyber-physical systems, 19 June 2016Google Scholar
  12. 12.
    Liu, Y., Peng, Y., Wang, B., Yao, S., Liu, Z.: Review on cyber-physical systems. IEEE/CAA J. Automatica Sinica 4(1), 27–40 (2017). Scholar
  13. 13.
    Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995). Scholar
  14. 14.
    Monostori, L., et al.: Cyber-physical systems in manufacturing. CIRP Ann. 65(2), 621–641 (2016). Scholar
  15. 15.
    Rein, A., Rieke, R., Jäger, M., Kuntze, N., Coppolino, L.: Trust establishment in cooperating cyber-physical systems. In: Bécue, A., Cuppens-Boulahia, N., Cuppens, F., Katsikas, S., Lambrinoudakis, C. (eds.) CyberICS/WOS-CPS -2015. LNCS, vol. 9588, pp. 31–47. Springer, Cham (2016). Scholar
  16. 16.
    Rousseau, D., Sitkin, S., Burt, R., Camerer, C.: Not so different after all: a cross-discipline view of trust. Acad. Manag. Rev. 23(3), 393–404 (1998). Scholar
  17. 17.
    Schuh, G., Potente, T., Varandani, R., Hausberg, C., Fränken, B.: Collaboration moves productivity to the next level. Procedia CIRP 17, 3–8 (2014). Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Institute for Application-oriented Knowledge Processing (FAW)Johannes Kepler University Linz (JKU)LinzAustria
  2. 2.LIT Secure and Correct Systems Lab, Linz Institute of Technology (LIT)Johannes Kepler University Linz (JKU)LinzAustria
  3. 3.Pro2Future GmbHLinzAustria

Personalised recommendations