Exploring challenge-response mechanism designs for IoT initial trust establishment
- Publication Type:
- Conference Proceeding
- 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018 - Proceedings, 2018, pp. 1 - 6
- Issue Date:
Copyright Clearance Process
- Recently Added
- In Progress
- Open Access
This item is currently unavailable due to the publisher's embargo.
The embargo period expires on 3 Jul 2020
© 2018 IEEE. More than ever, with the proliferation of IoT devices interconnected by 5G networks, it is crucial that IoT devices and subsystems are protected from being compromised and deployed for security attacks. Trust has been playing an essential role in admitting an IoT device into a 5G system. However, trust evaluation usually relies on historical interactions and recommendations which are often not available at the first encounter of the device and the system. As demonstrated in our previous studies, the challenge-response mechanism is an effective approach to learn the device's behavior and build the knowledge about its trustworthiness when prior knowledge is limited. It is essential to design the challenge-response mechanism with the intention of revealing the relevant and reliable information about the trustworthiness of IoT devices. The question is how to design the challenge and the common knowledge between the system (challenger) and the devices (respondents) so that the design engineers the devices to reveal their trustworthiness. This paper tackles this question by exploring challenge-response mechanism designs for the initial trust establishment in a mobile and dynamic environment called personal space IoT system. The paper develops principles for workable and consistent designs. Extensive simulations are conducted to consolidate the principles with numerous designs.
Please use this identifier to cite or link to this item: