IIC Journal of Innovation 9th Edition | Page 33

Trustworthiness Model Representation described by NIST 3 , 4 . This approach greatly simplifies the implementation of trust verification systems. In this paper, we attempt to provide a human-centric approach to establishing trust for IIoT systems. Our proposed model and framework endeavors to provide an average user with a reasonable understanding of the integrity of their connected devices. Practical Considerations Establishing Trustworthiness requires a Trust Model and a Trust management system or framework. Trust as a computational concept has been discussed for many decades. Stephen Marsh formalized Trust as a computational concept in 1994 5 . Since that time, many Trust models and frameworks have been proposed. Keep in mind that the main users of IIoT systems (e.g., in a connected smart factory) are in many cases very pragmatic, mostly driven by keeping the system running in order to meet production goals. They are often just looking to add simple confirmation of trust to their legacy situational awareness tools (addressing a common blind spot today). It is therefore important that trustworthiness models result in simple informative tools with minimal additional complexity. A trustworthiness representation has to be practical and intuitive in order for it to be valuable. Of particular note is the framework introduced by Carmen Fernandez-Gago, et al, for developers to incorporate trust in IoT solutions 6 . The proposed framework addressed trust, privacy and identity requirements for inclusion of trust in the IoT. Dario Ruiz Lopez, et al, also proposed a trust model and a framework. In their paper, they highlight the importance of providing a clear method to interpret and act on alerts from a trust system 7 . And David Maher has called for a human-centric trust model for the Internet of Things. In his article, Maher suggests “For IoT security to be successful, there needs to be an effective way to reason about how humanity can trust the security, safety, and privacy of this massive transformation of the world.” 8 Here are a few key guidelines to be considered for an effective representation: ● Context matters – depending on the application, different aspects contribute to trustworthiness. An effective presentation will allow for customization to include/exclude aspects that are important to the user. 3 Brian A. Weiss, Michael Sharp, and Alexander Klinger, “Developing a hierarchical decomposition methodology to increase manufacturing process and equipment health awareness,” https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=925101, 2018. 4 E. R. Griffor, “Toward a Calculus for Optimizing CPS to Trustworthiness,” http://www.ices.kth.se/upload/events/172/a77727a10d7f4a07b982404fab4effc8.pdf, 2017. 5 Stephen Paul Marsh, “Formalising Trust as a Computational Concept,” https://www.nr.no/~abie/Papers/TR133.pdf, 1994. 6 Carmen Fernandez-Gago, Francisco Moyano, and Javier Lopez, “Modelling Trust Dynamics in the Internet of Things,” https://www.nics.uma.es/pub/papers/Fer_IS17.pdf, 2017. 7 Dario Ruiz Lopez, et al, “Modelling the trustworthiness of the IoT,” https://www.researchgate.net/publication/308928730_Modelling_the_trustworthiness_of_the_IoT , 2016. 8 David Maher, “A human-centric trust model for the Internet of Things,” https://www.oreilly.com/learning/a-human-centric- trust-model-for-the-internet-of-things, 2017. - 29 - IIC Journal of Innovation