Skip to main content

Trust Handling Framework for Networks in Cyber Physical Systems of Industry 4.0

  • Conference paper
  • First Online:
Perspectives in Business Informatics Research (BIR 2018)

Abstract

Industry 4.0 is a concept of automation and data exchange in a manufacturing environment that combines advances of cyber physical systems, Internet of Things, cloud computing, and cognitive computing. It is a highly networked system where only trustworthy elements are allowed to participate in the network. Therefore, the possibility of having tools for indicating whether a particular node can or cannot be trusted in the network becomes an essential issue in the successful functioning of cyber physical systems in Industry 4.0. The paper proposes a trust handling framework as a base for such tools. The framework is based on knowledge derived from related work in social sciences, information technology and computer sciences, and also distributed sensing systems. The framework consists of several components that can handle initial and continuous trust issues at the level of nodes and at the level of network in cyber physical system of Industry 4.0.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kagermann, H., Wahlster, W., Helbig, J.: Securing the future of German manufacturing industry – Recommendations for implementing the strategic initiative industrie 4.0. Acatech (2013)

    Google Scholar 

  2. i-SCOOP, 17 March 2018. https://www.i-scoop.eu/industry-4-0/

  3. Li, X., Li, D., Wan, J., Vasilakos, A.V., Lai, C.F., Wang, S.: A review of industrial wireless networks in the context of Industry 4.0. Wirel. Netw. 23(1), 23–41 (2017)

    Article  Google Scholar 

  4. National Science Foundation, Cyber-Physical Systems (CPS), 27 April 2018. https://www.nsf.gov/pubs/2018/nsf18538/nsf18538.pdf

  5. Denmark, MADE casekatalog. http://www.made.dk/media/1720/made-casekatalog-2016-one-page.pdf. Accessed 23 Feb 2018

  6. Harlamova, M., Kirikova, M.: Towards the trust model for Industry 4.0. In: 13th International Baltic Conference on Databases and Information Systems (Baltic DB&IS 2018), 1–4 July 2018, Trakai, Lithuania (2018)

    Google Scholar 

  7. Andress, J.: What is Information Security? In: The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, 2nd edn, pp. 1–22. Syngress (2014)

    Google Scholar 

  8. Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)

    Article  Google Scholar 

  9. Rousseau, D.M., Sitkin, S.B., Burt, R.S., Camerer, C.: Not so different after all: a cross-discipline view of trust. Acad. Manag. Rev. 23(3), 393–404 (1998)

    Article  Google Scholar 

  10. Nooteboom, B.: Trust: Forms, Foundations, Functions, Failures and Figures. Edward Elgar, Cheltenham (2002)

    Book  Google Scholar 

  11. Heimer, C.A.: Solving the problem of trust. In: Cook, K.S. (ed.) Trust in Society, pp. 40–88. Russell Sage Foundation, New York (2001)

    Google Scholar 

  12. Hardin, R.: Conceptions and explanations of trust. In: Cook, K.S. (ed.) Trust in Society, pp. 3–39. Russell Sage Foundation, New York (2001)

    Google Scholar 

  13. Schoorman, F.D., Mayer, R.C., Davis, J.H.: An integrative model of organizational trust: past, present, and future. Acad. Manag. Rev. 32(2), 344–354 (2007)

    Article  Google Scholar 

  14. Eisenegger, M.: Trust and reputation in the age of globalisation. In: Klewes, J., Wreschniok, R. (eds.) Reputation Capital, pp. 11–22. Springer, Berlin (2009). https://doi.org/10.1007/978-3-642-01630-1_2

    Chapter  Google Scholar 

  15. Trček, D.: A brief overview of trust and reputation over various domains. In: Trček, D. (ed.) Trust and Reputation Management Systems. SIS, pp. 5–19. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-62374-0_2

    Chapter  Google Scholar 

  16. Söllner, M., Hoffmann, A., Hoffmann, H., Wacker, A., Leimeister, J.M.: Understanding the formation of trust in IT artifacts. In: Proceedings of the International Conference on Information Systems, Orlando, Florida (2012)

    Google Scholar 

  17. Noor, T.H., Sheng, Q.Z., Bouguettaya, A.: Trust Management in Cloud Services. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12250-2

    Book  Google Scholar 

  18. Pawar, P.S., Rajarajan, M., Dimitrakos, T., Zisman, A.: Trust model for cloud based on cloud characteristics. In: Fernández-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) IFIPTM 2013. IAICT, vol. 401, pp. 239–246. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38323-6_18

    Chapter  Google Scholar 

  19. Palmer, G., Selwyn, A., Zwillinger, D.: The “Trust V”: building and measuring trust in autonomous systems. In: Mittu, R., Sofge, D., Wagner, A., Lawless, W.F. (eds.) Robust Intelligence and Trust in Autonomous Systems, pp. 55–77. Springer, Boston, MA (2016). https://doi.org/10.1007/978-1-4899-7668-0_4

    Chapter  Google Scholar 

  20. Vance, A., Elie-Dit-Cosaque, C., Straub, D.: Examining trust in information technology artifacts: the effects of system quality and culture. J. Manag. Inf. Syst. 24(4), 73–100 (2008)

    Article  Google Scholar 

  21. Talboom, S., Pierson, J.: Understanding trust within online discussion boards: trust formation in the absence of reputation systems. In: Fernández-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) IFIPTM 2013. IAICT, vol. 401, pp. 83–99. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38323-6_6

    Chapter  Google Scholar 

  22. Gefen, D., Karahanna, E., Staub, D.W.: Trust and TAM in online shopping: an integrated model. MIS Q. 27(1), 51–90 (2003)

    Article  Google Scholar 

  23. McKnight, D.H., Choudhury, V., Kacmarc, C.: The impact of initial consumer trust on intentions to transact with a web site: a trust building model. J. Strateg. Inf. Syst. 11, 297–323 (2002)

    Article  Google Scholar 

  24. Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security. ITIFIP, vol. 100, pp. 107–121. Springer, Boston, MA (2002). https://doi.org/10.1007/978-0-387-35612-9_9

    Chapter  Google Scholar 

  25. Buchegger, S., Boudec, J.Y.L.: Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes – Fairness In Dynamic Ad-hoc NeTworks). In: The 3rd ACM International Symposium Mobile Ad-Hoc Networking & Computing (MobiHoc 2002), Lausanne, CH (2002)

    Google Scholar 

  26. Feng, R., Che, S., Wang, X.: A credible routing based on a novel trust mechanism in ad hoc networks. Int. J. Distrib. Sens. Netw. 9(4), 1–12 (2013)

    Article  Google Scholar 

  27. Ganeriwal, S., Balzano, L., Srivastava, M.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. 4, 1–37 (2008)

    Article  Google Scholar 

  28. Zhang, Q., Yu, T., Ning, P.: A framework for identifying compromised nodes in sensor networks. In: Securecomm and Workshops (2006)

    Google Scholar 

  29. Hur, J., Lee, Y., Yoon, H., Choi, D., Jin, S.: Trust evaluation model for wireless sensor networks. In: The 7th International Conference on Advanced Communication Technology. IEEE, Phoenix Park (2005)

    Google Scholar 

  30. Yao, Z., Kim, D., Doh, Y.: PLUS: parameterized and localized trust management scheme for sensor networks security. In: International Conference on Mobile Ad Hoc and Sensor Systems (2006)

    Google Scholar 

  31. Momani, M., Challa, S.: Survey of trust models in different network domains. Int. J. Ad Hoc Sens. Ubiquitous Comput. 1(3), 1 (2010)

    Article  Google Scholar 

  32. Cordasco, J., Wetzel, S.: Cryptographic versus trust-based methods for MANET routing security. Electron. Notes Theor. Comput. Sci. 197(2), 131–140 (2008)

    Article  Google Scholar 

  33. Janani, V.S., Manikandan, M.S.: Efficient trust management with Bayesian-evidence theorem to secure public key infrastructure-based mobile ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2018(25), 1–27 (2018)

    Google Scholar 

  34. Rajkumar, B., Narsimha, D.: Trust based certificate revocation for secure routing. Proc. Comput. Sci. 92, 431–441 (2016)

    Article  Google Scholar 

  35. Ye, Z., Wen, T., Liu, Z., Song, X., Fu, C.: An efficient dynamic trust evaluation model for wireless sensor networks. J. Sens. 2017, 1–16 (2017)

    Article  Google Scholar 

Download references

Acknowledgement

This research was partly done within the Erasmus+ Strategic Partnership “Improving Employability through Internationalisation and Collaboration” (EPIC) project, with the support of the Erasmus+ programme of the European Union.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marite Kirikova .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Harlamova, M., Kirikova, M. (2018). Trust Handling Framework for Networks in Cyber Physical Systems of Industry 4.0. In: Zdravkovic, J., Grabis, J., Nurcan, S., Stirna, J. (eds) Perspectives in Business Informatics Research. BIR 2018. Lecture Notes in Business Information Processing, vol 330. Springer, Cham. https://doi.org/10.1007/978-3-319-99951-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-99951-7_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-99950-0

  • Online ISBN: 978-3-319-99951-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics