Ensuring trustworthiness for P2P-based M2M applications

Besfort Shala, Patrick Wacht, Ulrich Trick, Armin Lehmann, Bogdan Ghita, Stavros Shiaeles

Research output: Chapter in Book/Report/Conference proceedingConference contribution


P2P-based M2M application frameworks have several advantages, such as increased flexibility, efficiency and a lack of single point of failure as compared to centralised approaches. However, there are several security drawbacks which need to be addressed in order to provide the user a secure environment for the provision and usage of M2M applications. This publication presents different security issues inside P2P-based M2M application frameworks and evaluates P2P protocols based on security. In order to avoid different security attacks, the concept of trust and its importance are emphasized. Furthermore, a trust management system with special trust metric parameters is presented which considers the architecture of P2P-based M2M applications. Finally, blockchain principles are integrated for optimising the overall security in the system by improving data storage between peers, avoiding volatility of peers and ensuring correct working M2M applications.

Original languageEnglish
Title of host publication2017 Internet Technologies and Applications, ITA 2017 - Proceedings of the 7th International Conference
EditorsSusan Liggett, Denise Oram, Rich Picking, Nigel Houlden, Julie Mayers, Stuart Cunningham, Vic Grout, Raed A. Abd-Alhameed, Yuriy Vagapov
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Electronic)9781509048151
ISBN (Print)9781509048168
Publication statusPublished - 9 Nov 2017
Event7th International Conference on Internet Technologies and Applications - Wrexham, United Kingdom
Duration: 12 Sept 201715 Sept 2017


Conference7th International Conference on Internet Technologies and Applications
Abbreviated titleITA 2017
Country/TerritoryUnited Kingdom


  • M2M
  • P2P
  • Security
  • Service and Application
  • Trust
  • noissn


Dive into the research topics of 'Ensuring trustworthiness for P2P-based M2M applications'. Together they form a unique fingerprint.

Cite this