چكيده به لاتين
The Physical Internet of Things (IoT) gathered together in information networks to bring advanced services for you. Contemporary objects like sensors and mobiles all gather information and present it. Later this information can be aggregated, combined, reinforced, analyzed or maintained to extract useful information for providing accurate and available services. IoT is an example of an attractive network and infrastructure services of the new generation that is being completed. Trust management has an important role in IoT for combination of information, enhancement of services, security of information and privacy of users. It helps people to overcome their distrust, and fears of risking to chose this soloution and have helped to reassure the user of its services. However, IoT brings a series of new issues of trust and credibility.
In literature, the mechanism of credibility and integrity has been studied in wide variety of cases. Nevertheless, in recent studies, there is no comprehensive overview of how to manage honesty and truth in IoT. In this regard, a few studies have been done.
In this study, we review honesty characteristics and propose the goals of trust management in IoT. We will examine a great deal about the credibility and assurance of IoT, so that we can identify issues related to trust management in it. In this thesis, we examine the characteristics of fidelity and propose the goals of managing trust in the Internet of Things. We will examine a number of issues about credibility and ways of trusting the Internet of Things so that we can introduce some issues related to trust management. The proposed trusted model for the IoT considers four dimensions of service quality, credibility, security aspects and social relationships to calculate trust values for objects of the IoT. The proposed model generalizes common access control systems with regard to trust values based on reputation, quality of service, security considerations, and social relationships of devices. In addition, the proposed model is implemented for both restricted and unrestricted devices and evaluated in real time.
Keywords: Internet of Things, Security, Trust, Trust Management