Trust-based composition of M2M application services

Besfort Shala, Ulrich Trick, Armin Lehmann, Bogdan Ghita, Stavros Shiaeles

Research output: Chapter in Book/Report/Conference proceedingConference contribution


The end-user integration for M2M application service creation and the decentralisation of M2M application service platforms are creating new possibilities for different application fields in the M2M domain. However, besides several advantages, these improvements inherit several security-related issues such as intentionally or accidentally misconfigured M2M application services harming other end-users in the M2M community. This research focuses on evaluating the trustworthiness of new joining decentralised M2M application services provided by end-users. Therefore, this publication presents a novel concept for trust evaluation by combining several model-based testing techniques. Moreover, it defines an approach for trust-based M2M application service selection and composition for end-user consumption. Finally, the overall framework for functional verification and trust evaluation is optimised by full decentralisation of all involved entities.

Original languageEnglish
Title of host publicationICUFN 2018 - 10th International Conference on Ubiquitous and Future Networks
PublisherIEEE Computer Society
Number of pages6
ISBN (Electronic)9781538646465
ISBN (Print)9781538646472
Publication statusPublished - 16 Aug 2018
Event10th International Conference on Ubiquitous and Future Networks - Prague, Czech Republic
Duration: 3 Jul 20186 Jul 2018

Publication series

NameIEEE ICUFN Proceedings Series
ISSN (Electronic)2165-8536


Conference10th International Conference on Ubiquitous and Future Networks
Abbreviated titleICUFN 2018
Country/TerritoryCzech Republic


  • M2M
  • Model-based Testing
  • P2P
  • Security
  • Service and Application
  • Trust


Dive into the research topics of 'Trust-based composition of M2M application services'. Together they form a unique fingerprint.

Cite this