On the Internet of Things, Trust is Relative

  • Lothar Fritsch
  • Arne-Kristian Groven
  • Trenton Schulz
Part of the Communications in Computer and Information Science book series (CCIS, volume 277)


End-users on the Internet of Things (IoT) will encounter many different devices and services; they will need to decide whether or not they can trust these devices and services with their information. We identify three items of trust information that end-users will need to determine if they should trust something on the IoT. We create a taxonomy of the likely scenarios end-users will encounter on the IoT and present five trust strategies for obtaining this trust information. Upon applying these strategies to our scenarios, we find that there is no strategy that can work efficiently and effectively in every situations; end-users will need to apply the strategy that best fits their current situation. Offering multiple trust strategies in parallel and having this information transparent to end-users will ensure a sustainable IoT.


Internet of Things trust trust strategies mobile Internet usability accessibility privacy 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bassi, A., Horn, G.: Internet of Things in 2020: A Roadmap for the Future. European Commission: Information Society and Media (2008)Google Scholar
  2. 2.
    Maghiros, L., Punie, Y., Delaitre, S., Hert, P.D., Gutwirth, S., Schreurs, W., Moscibroda, A., Friedewald, M., Linden, R., Wright, D., Vildjiounaite, E., Alahuhta, P.: Safeguards in a world of ambient intelligence. In: Intelligent, E. (ed.) 2nd IET International Conference on Intelligent Environments, vol. 2. IEEE Computer Society, Athens (2006)Google Scholar
  3. 3.
    Naumann, I., Hogben, G., Fritsch, L., et al.: Security issues in the context of authentication using mobile devices, Mobile eID (2008)Google Scholar
  4. 4.
    Walter, T., Bussard, L., Roudier, Y., Haller, J., Kilian-Kehr, R., Posegga, J., Robinson, P.: Secure mobile business applications – framework, architecture and implementation11IST-Programme / KA2 / AL: IST-2001-2.1.3. Inf. Secur. Tech. Rep. 9, 6–21 (2004)Google Scholar
  5. 5.
    O’Hara, K., Alani, H., Kalfoglou, Y., Shadbolt, N.: Trust Strategies for the Semantic Web. In: ISWC 3rd International Workshop on Trust, Security, and Reputation on the Semantic Web (2004)Google Scholar
  6. 6.
    Fritsch, L.: Business risks from naive use of RFID in tracking, tracing and logistics. In: RFID Systech 2009 – 5th European Workshop on RFID Systems and Technologies. VDE Verlag (2009)Google Scholar
  7. 7.
    Fritsch, L., Fuglerud, K.S.: Time and Usability as Upper Boundary in Friend and Family Security and Privacy, vol. DART/11/2010, p. 11. Norsk Regnesentral, Notat (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Lothar Fritsch
    • 1
  • Arne-Kristian Groven
    • 1
  • Trenton Schulz
    • 1
  1. 1.Norsk Regnesentral - Norwegian Computing CenterOsloNorway

Personalised recommendations