Functional Information
Deployment and
Operation
Harden root of
trust
The security policy defines
how the root of trust may
be accessed. (DC T.1)
No impact
Integration of IoT-A
Trust and Reputation
component (DC T.2)
Secure implementation for
protecting a root-of-trust
based on hardware
implementation (DC T.3)
No impact
Integration of a
Physically Unclonable
Function
(PUF) (DC T.4)
Ensure high
quality of data
Protects data integrity and
freshness by using a
secure network encryption
protocol
(DC T.5)
Improvement of
content dimension and
intellectual dimension
(DC T.6)
Integration of a Secure
Network Encryption
Protocol (DC T.7)
Infrastructural
Trust and
Reputation
Agents
Collects user reputation
scores and calculates
service trust levels (DC
T.8)
Service Description
should include
relevant aspects for
what concerns trust
evaluation (DC T.9)
Integration of IoT-A
Trust and Reputation
(DC T.10)
Web of Trust system to
establish the authenticity
of the binding between a
public key and its owner.
(DC T.11)
No impact Decentralized trust
model (DC T.12)
Provide high
system integrity
Evaluation of trust based
on reputation (DC T.13)
No impact
Integration of a
Reputation framework
for high integrity
sensor networks
(RFSN) (DC T.14)
Avoid leap of
faith
Utilizes one-way hash
chain to provide effective
and efficient
authentication (DC T.15)
No impact
Usage of Lightweight
Authentication protocol
(DC T.16)
Table 22 : Tactics and corresponding Design Choices for Trust.
Harden root of trust
The root-of-trust is the core component upon which the trust policy is based.
The notion of a root-of-trust exists at multiple abstraction levels in a system, and
can be software (less secure) as well as hardware (higher security). As an
example for hardware realisation is RFID. The tags can be used to support anti-
counterfeiting by using a security protocol based on public key cryptography. In
this case their root-of-trust is based on a Physically Unclonable Device (PUF)
[Verbauwhede 2007].
Ensure high quality of data
Information quality is improved in the technical dimension (e.g. timeliness and
sampling). The suite of security protocols (SPINS) guarantees that an attack