Trust-based composition of M2M application services

Besfort Shala, Ulrich Trick, Armin Lehmann, Bogdan Ghita, Stavros Shiaeles

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The end-user integration for M2M application service creation and the decentralisation of M2M application service platforms are creating new possibilities for different application fields in the M2M domain. However, besides several advantages, these improvements inherit several security-related issues such as intentionally or accidentally misconfigured M2M application services harming other end-users in the M2M community. This research focuses on evaluating the trustworthiness of new joining decentralised M2M application services provided by end-users. Therefore, this publication presents a novel concept for trust evaluation by combining several model-based testing techniques. Moreover, it defines an approach for trust-based M2M application service selection and composition for end-user consumption. Finally, the overall framework for functional verification and trust evaluation is optimised by full decentralisation of all involved entities.

Original languageEnglish
Title of host publicationICUFN 2018 - 10th International Conference on Ubiquitous and Future Networks
PublisherIEEE Computer Society
Pages250-255
Number of pages6
ISBN (Electronic)9781538646465
ISBN (Print)9781538646472
DOIs
Publication statusPublished - 16 Aug 2018
Event10th International Conference on Ubiquitous and Future Networks - Prague, Czech Republic
Duration: 3 Jul 20186 Jul 2018

Publication series

NameIEEE ICUFN Proceedings Series
PublisherIEEE
ISSN (Electronic)2165-8536

Conference

Conference10th International Conference on Ubiquitous and Future Networks
Abbreviated titleICUFN 2018
Country/TerritoryCzech Republic
CityPrague
Period3/07/186/07/18

Keywords

  • M2M
  • Model-based Testing
  • P2P
  • Security
  • Service and Application
  • Trust

Fingerprint

Dive into the research topics of 'Trust-based composition of M2M application services'. Together they form a unique fingerprint.

Cite this