Trustworthiness Model Representation
described by NIST 3 , 4 . This approach greatly
simplifies the implementation of trust
verification systems.
In this paper, we attempt to provide a
human-centric approach to establishing
trust for IIoT systems. Our proposed model
and framework endeavors to provide an
average
user
with
a
reasonable
understanding of the integrity of their
connected devices.
Practical Considerations
Establishing Trustworthiness requires a
Trust Model and a Trust management
system or framework. Trust as a
computational concept has been discussed
for many decades. Stephen Marsh
formalized Trust as a computational concept
in 1994 5 . Since that time, many Trust models
and frameworks have been proposed.
Keep in mind that the main users of IIoT
systems (e.g., in a connected smart factory)
are in many cases very pragmatic, mostly
driven by keeping the system running in
order to meet production goals. They are
often just looking to add simple confirmation
of trust to their legacy situational awareness
tools (addressing a common blind spot
today). It is therefore important that
trustworthiness models result in simple
informative tools with minimal additional
complexity.
A
trustworthiness
representation has to be practical and
intuitive in order for it to be valuable.
Of particular note is the framework
introduced by Carmen Fernandez-Gago, et
al, for developers to incorporate trust in IoT
solutions 6 . The proposed framework
addressed trust, privacy and identity
requirements for inclusion of trust in the IoT.
Dario Ruiz Lopez, et al, also proposed a trust
model and a framework. In their paper, they
highlight the importance of providing a clear
method to interpret and act on alerts from a
trust system 7 . And David Maher has called
for a human-centric trust model for the
Internet of Things. In his article, Maher
suggests “For IoT security to be successful,
there needs to be an effective way to reason
about how humanity can trust the security,
safety, and privacy of this massive
transformation of the world.” 8
Here are a few key guidelines to be
considered for an effective representation:
● Context matters – depending on the
application,
different
aspects
contribute to trustworthiness. An
effective presentation will allow for
customization to include/exclude
aspects that are important to the
user.
3
Brian A. Weiss, Michael Sharp, and Alexander Klinger, “Developing a hierarchical decomposition methodology to increase
manufacturing process and equipment health awareness,” https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=925101,
2018.
4 E. R. Griffor, “Toward a Calculus for Optimizing CPS to Trustworthiness,”
http://www.ices.kth.se/upload/events/172/a77727a10d7f4a07b982404fab4effc8.pdf, 2017.
5 Stephen Paul Marsh, “Formalising Trust as a Computational Concept,” https://www.nr.no/~abie/Papers/TR133.pdf, 1994.
6 Carmen Fernandez-Gago, Francisco Moyano, and Javier Lopez, “Modelling Trust Dynamics in the Internet of Things,”
https://www.nics.uma.es/pub/papers/Fer_IS17.pdf, 2017.
7 Dario Ruiz Lopez, et al, “Modelling the trustworthiness of the IoT,”
https://www.researchgate.net/publication/308928730_Modelling_the_trustworthiness_of_the_IoT , 2016.
8 David Maher, “A human-centric trust model for the Internet of Things,” https://www.oreilly.com/learning/a-human-centric-
trust-model-for-the-internet-of-things, 2017.
- 29 -
IIC Journal of Innovation