skip to main content
10.1145/3603166.3632551acmconferencesArticle/Chapter ViewAbstractPublication PagesuccConference Proceedingsconference-collections
research-article

Trust Evaluation in IoT Systems: Extracting User Trust Levels based on Security Profiles in Water Treatment Facilities

Published: 04 April 2024 Publication History

Abstract

The integration of Internet of Things (IoT) systems into water treatment facilities has transformed resource management, presenting new security and trust management challenges. This paper presents an innovative approach to assess user trust levels within IoT systems, particularly in water treatment contexts. Our method addresses the critical need for a comprehensive evaluation of user trustworthiness, encompassing factors such as user behavior, human resource data, and post-task surveys. By considering these elements, our approach contributes to enhance trust evaluation in IoT systems, thereby bolstering the security and reliability of water treatment facilities.

References

[1]
Tuptuk, N., Hazell, P., Watson, J., Hailes, S. (2021). A systematic review of the state of cyber-security in water systems. Water, 13(1), 81.
[2]
Meng, L., Huang, D., An, J., Zhou, X., Lin, F. (2022). A continuous authentication protocol without trust authority for zero trust architecture. China Communications, 19(8), 198--213.
[3]
Rose, Karen, Eldridge, Scott, et Chapin, Lyman. The internet of things: An overview. The internet society (ISOC), 2015, vol. 80, p. 1--50.
[4]
Spellman, Frank R. Handbook of water and wastewater treatment plant operations. CRC press, 2008.
[5]
Aman, Muhammad Naveed, Basheer, Mohamed Haroon, et SIKDAR, Biplab. Two-factor authentication for IoT with location information. IEEE Internet of Things Journal, 2018, vol. 6, no 2, p. 3335--3351.
[6]
Akhundov, Haji, Van Der Sluis, Erik, Hamdioui, Said, et al. Public-key based authentication architecture for IoT devices using PUF. arXiv preprint arXiv:2002.01277, 2020.
[7]
Forsby, Filip. Digital certificates for the Internet of Things. 2017.
[8]
Lau, Chi Ho, ALAN, Kai-Hau Yeung, et YAN, Fan. Blockchain-based authentication in IoT networks. In : 2018 IEEE conference on dependable and secure computing (DSC). IEEE, 2018. p. 1--8.
[9]
Nikolov, Neven et Nakov, Ognyan. Research of secure communication of Esp32 IoT embedded system to. NET core cloud structure using MQTTS SSL/TLS. In : 2019 IEEE XXVIII International Scientific Conference Electronics (ET). IEEE, 2019. p. 1--4.
[10]
Kumar, Sam, HU, Yuncong, Andersen, Michael P., et al. JEDI:Many-to-ManyEnd-to-End Encryption and Key Delegation for IoT. In : 28th USENIX Security Symposium (USENIX Security 19). 2019. p. 1519--1536.
[11]
Shafagh, Hossein, Hithnawi, Anwar, Dröscher, Andreas, et al. Poster: Towards encrypted query processing for the Internet of Things. In : Proceedings of the 21st annual international conference on mobile computing and networking. 2015. p. 251--253.
[12]
El Jaouhari, Saad et Bouvet, Eric. Secure firmware Over-The-Air updates for IoT: Survey, challenges, and discussions. Internet of Things, 2022, vol. 18, p. 100508.
[13]
Farahani, Shahin. ZigBee wireless networks and transceivers. newnes, 2011.
[14]
Arefin, Md Taslim, ALI, Mohammad Hanif, et Haque, AKM Fazlul. Wireless body area network: An overview and various applications. Journal of Computer and Communications, 2017, vol. 5, no 7, p. 53--64.
[15]
Heidari, Arash et Jabraeil Jamali, Mohammad Ali. Internet of Things intrusion detection systems: A comprehensive review and future directions. Cluster Computing, 2022, p. 1--28.
[16]
Panigrahi, Ranjit et Borah, Samarjeet. A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems. International Journal of Engineering & Technology, 2018, vol. 7, no 3.24, p. 479--482.
[17]
Meera, Akhil Jabbar, Kantipudi, MVV Prasad, et Aluvalu, Rajanikanth. Intrusion detection system for the IoT: A comprehensive review. In : Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019) 11. Springer International Publishing, 2021. p. 235--243.
[18]
Lampe, Brooke et Meng, Weizhi. Intrusion Detection in the Automotive Domain: A Comprehensive Review. IEEE Communications Surveys & Tutorials, 2023.
[19]
Wang, P. U., & Zhang, P. (2016, June). A review on trust evaluation for internet of things. In Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications (pp. 34--39).
[20]
Chen, J., Tian, Z., Cui, X., Yin, L., & Wang, X. (2019). Trust architecture and reputation evaluation for internet of things. Journal of Ambient Intelligence and Humanized Computing, 10, 3099--3107.
[21]
Suryani, V. (2016, October). A survey on trust in Internet of Things. In 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE) (pp. 1--6). IEEE.
[22]
Carbo, J., Molina, J. M., & Davila, J. (2003). Trust management through fuzzy reputation. International Journal of Cooperative Information Systems, 12(01), 135--155.
[23]
Chung, H., Iorga, M., Voas, J., & Lee, S. (2017). Alexa, can I trust you?. Computer, 50(9), 100--104.
[24]
[5] Salem, Malek Ben, Hershkop, Shlomo, et Stolfo, Salvatore J. A survey of insider attack detection research. Insider Attack and Cyber Security: Beyond the Hacker, 2008, p. 69--90.
[25]
[6] Liu, Liu, De Vel, Olivier, Han, Qing-Long, et al. Detecting and preventing cyber insider threats: A survey. IEEE Communications Surveys Tutorials, 2018, vol. 20, no 2, p. 1397--1417.
[26]
https://www.kaggle.com/datasets/pavansubhasht/ibm-hr-analytics-attrition-dataset (accessed on 21/09/2023)

Index Terms

  1. Trust Evaluation in IoT Systems: Extracting User Trust Levels based on Security Profiles in Water Treatment Facilities
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image ACM Conferences
            UCC '23: Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing
            December 2023
            502 pages
            ISBN:9798400702341
            DOI:10.1145/3603166
            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Sponsors

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            Published: 04 April 2024

            Check for updates

            Author Tags

            1. trust levels
            2. IoT systems
            3. user trustworthiness
            4. security context
            5. water treatment facilities

            Qualifiers

            • Research-article

            Conference

            UCC '23
            Sponsor:

            Acceptance Rates

            Overall Acceptance Rate 38 of 125 submissions, 30%

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • 0
              Total Citations
            • 40
              Total Downloads
            • Downloads (Last 12 months)40
            • Downloads (Last 6 weeks)3
            Reflects downloads up to 28 Feb 2025

            Other Metrics

            Citations

            View Options

            Login options

            View options

            PDF

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            Figures

            Tables

            Media

            Share

            Share

            Share this Publication link

            Share on social media