Trust integration for security optimisation in P2P-Based M2M applications

Besfort Shala, Patrick Wacht, Ulrich Trick, Armin Lehmann, Bogdan Ghita, Stavros Shiaeles

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This publication presents a novel concept for securing P2P-based M2M applications using the integration of a trust management system. In addition, this publication presents different security problems inside the P2P-based M2M application (P2P4M2M) framework and evaluates P2P protocols based on security. Furthermore, this paper emphasises the importance of trust for ensuring security. This is done through a novel concept which uses special trust metric parameters for the P2P4M2M framework.

Original languageEnglish
Title of host publicationProceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages949-954
Number of pages6
ISBN (Electronic)9781509049066
ISBN (Print)9781509049073
DOIs
Publication statusPublished - 7 Sep 2017
Event16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017 - Sydney, Australia
Duration: 1 Aug 20174 Aug 2017

Publication series

NameIEEE Trustcom/BigDataSE/ICESS Proceedings Series
PublisherIEEE
ISSN (Electronic)2324-9013

Conference

Conference16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017
Country/TerritoryAustralia
CitySydney
Period1/08/174/08/17

Keywords

  • M2M
  • P2P
  • Security
  • Service and Application
  • Trust

Fingerprint

Dive into the research topics of 'Trust integration for security optimisation in P2P-Based M2M applications'. Together they form a unique fingerprint.

Cite this