On the Internet of Things, Trust is Relative
End-users on the Internet of Things (IoT) will encounter many different devices and services; they will need to decide whether or not they can trust these devices and services with their information. We identify three items of trust information that end-users will need to determine if they should trust something on the IoT. We create a taxonomy of the likely scenarios end-users will encounter on the IoT and present five trust strategies for obtaining this trust information. Upon applying these strategies to our scenarios, we find that there is no strategy that can work efficiently and effectively in every situations; end-users will need to apply the strategy that best fits their current situation. Offering multiple trust strategies in parallel and having this information transparent to end-users will ensure a sustainable IoT.
KeywordsInternet of Things trust trust strategies mobile Internet usability accessibility privacy
Unable to display preview. Download preview PDF.
- 1.Bassi, A., Horn, G.: Internet of Things in 2020: A Roadmap for the Future. European Commission: Information Society and Media (2008)Google Scholar
- 2.Maghiros, L., Punie, Y., Delaitre, S., Hert, P.D., Gutwirth, S., Schreurs, W., Moscibroda, A., Friedewald, M., Linden, R., Wright, D., Vildjiounaite, E., Alahuhta, P.: Safeguards in a world of ambient intelligence. In: Intelligent, E. (ed.) 2nd IET International Conference on Intelligent Environments, vol. 2. IEEE Computer Society, Athens (2006)Google Scholar
- 3.Naumann, I., Hogben, G., Fritsch, L., et al.: Security issues in the context of authentication using mobile devices, Mobile eID (2008)Google Scholar
- 4.Walter, T., Bussard, L., Roudier, Y., Haller, J., Kilian-Kehr, R., Posegga, J., Robinson, P.: Secure mobile business applications – framework, architecture and implementation11IST-Programme / KA2 / AL: IST-2001-2.1.3. Inf. Secur. Tech. Rep. 9, 6–21 (2004)Google Scholar
- 5.O’Hara, K., Alani, H., Kalfoglou, Y., Shadbolt, N.: Trust Strategies for the Semantic Web. In: ISWC 3rd International Workshop on Trust, Security, and Reputation on the Semantic Web (2004)Google Scholar
- 6.Fritsch, L.: Business risks from naive use of RFID in tracking, tracing and logistics. In: RFID Systech 2009 – 5th European Workshop on RFID Systems and Technologies. VDE Verlag (2009)Google Scholar
- 7.Fritsch, L., Fuglerud, K.S.: Time and Usability as Upper Boundary in Friend and Family Security and Privacy, vol. DART/11/2010, p. 11. Norsk Regnesentral, Notat (2010)Google Scholar