1. Intr oducti on Public key management schemes represent the fundamentals of prevention and management of network risk in the Internet of Things (IoT). Notwithstanding, techniques with hard security approaches often result inefficient in intelligent heterogeneous systems. Consequently, the performance of networks employing traditional security techniques such as encryption or authentication tends to deteriorate, and the use of network resources becomes inefficient . To eliminate security vulnerabilities and maximise performance it is, however, possible to relax security requirements based on the perceived trust of IoT elements and manage public key accordingly . The Social Internet of Things (SIoT) is a paradigm that introduces selected concepts of social networking to studying IoT solutions. It follows the assertion that the popularisation of ambient intelligence solutions and the widespread implementation of smart devices create an environment where the principles of IoT andsocial networking start to converge. Therefore, the adoption of SIoT may facilitate modelling the states and behaviour of agents within an IoT network (Table 1). Under SIoT, the critical objective is ‘to build techniques that allow the network to enhance the level of trust between objects that are “friends" with each other’ . Its primary advantage for network security consists in the possibility to exploit node reputation not only in the context of an entire network but also in node clusters; consequently the exclusion of a high-risk node or entity can be carried out as well using the key management scheme as by breaking connections to its peers or the cluster head unit. This additionally helps to minimise the risk of relying solely on cryptographic tools to provide network security. The primary contribution of this work consists in verifying the assumptions that underly the SIoT paradigm. Moreover, a framework for analysing th[...]
Wyniki 1-1 spośród 1 dla zapytania: authorDesc:"Paweł POPŁAWSKI"