• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

A Survey of Trust Management in WSNs, Internet of Things and Future Internet

Vol. 6, No.1, January 30, 2012
10.3837/tiis.2012.01.001, Download Paper (Free):

Abstract

Nowadays, most researchers and manufacturers always pay attention on wireless sensor networks (WSNs) due to its potential applications in many regions such as military, industrial and civilian areas. WSNs are the basic components of Internet of Things (IoT) and the key to machine-to-machine communications and the future Internet. Also, the security is an essential element for deploying WSNs. Recently the concept of trust-based mechanism was proposed in WSNs such as traditional cryptographic and authentication mechanisms. However, there is lack a survey on trust management for WSNs, IoT even future Internet. In this paper, we discuss the concept and potential application areas of trust management for WSNs and IoT worlds. Furthermore, we survey different trust management issues (i.e., cluster, aggregation, reputation). Finally, future research directions with respect to trust management in WSNs and future IoT world are provided. We give not only simple WSNs for IoT environments but also a simulated bootstrap platform to provide the discussion of open challenges and solutions for deploying IoT in Future Internet.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Kai-Di Chang and Jiann-Liang Chen, "A Survey of Trust Management in WSNs, Internet of Things and Future Internet," KSII Transactions on Internet and Information Systems, vol. 6, no. 1, pp. 5-23, 2012. DOI: 10.3837/tiis.2012.01.001

[ACM Style]
Chang, K. and Chen, J. 2012. A Survey of Trust Management in WSNs, Internet of Things and Future Internet. KSII Transactions on Internet and Information Systems, 6, 1, (2012), 5-23. DOI: 10.3837/tiis.2012.01.001