Skip to main content
Top

2023 | OriginalPaper | Chapter

POM: A Trust-Based AHP-Like Methodology to Solve Conflict Requirements for the IoT

Authors : Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez

Published in: Collaborative Approaches for Cyber Security in Cyber-Physical Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of Things (IoT) is an environment of interconnected entities which are identifiable, usable and controllable via the Internet. Trust is necessary for a system such as the IoT as the entities involved should know the other entities they have to interact with. In order to guarantee trust in an IoT entity, it is useful to consider it during all its System Development Life Cycle (SDLC). The requirements phase is one of the first and the most important phases of the SDLC. In this phase, trust requirements must be elicited in order to guarantee that the built entity can be trusted. However, during this phase, it is possible to raise conflicts among requirements reflecting conflicting needs. Decision-making processes can be helpful in order to solve these issues. The Analytic Hierarchy Process (AHP) is a discipline that supports decision-makers in choosing between heterogeneous and conflicting alternatives, but it has several problems, especially if there are numerous parameters. Thus, we propose an AHP-like methodology called Pairwise Ordination Method (POM). Its aim is to solve issues among conflicting requirements deciding which one is the less important in order to modify or delete it, maximising the trust level of the IoT entity under development.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Agudo I, Fernandez-Gago C, Lopez J (2008) A model for trust metrics analysis. In: International conference on trust, privacy and security in digital business. Springer, pp 28–37 Agudo I, Fernandez-Gago C, Lopez J (2008) A model for trust metrics analysis. In: International conference on trust, privacy and security in digital business. Springer, pp 28–37
2.
go back to reference Altuzarra A, Moreno-Jiménez JM, Salvador M (2007) A Bayesian priorization procedure for AHP-group decision making. Eur J Oper Res 182(1):367–382CrossRefMATH Altuzarra A, Moreno-Jiménez JM, Salvador M (2007) A Bayesian priorization procedure for AHP-group decision making. Eur J Oper Res 182(1):367–382CrossRefMATH
3.
go back to reference Cabała P (2010) Using the analytic hierarchy process in evaluating decision alternatives. Oper Res Decis 20(1):5–23MathSciNetMATH Cabała P (2010) Using the analytic hierarchy process in evaluating decision alternatives. Oper Res Decis 20(1):5–23MathSciNetMATH
4.
go back to reference Erickson J (2009) Trust metrics. In: International symposium on collaborative technologies and systems, 2009, CTS’09. IEEE, pp 93–97 Erickson J (2009) Trust metrics. In: International symposium on collaborative technologies and systems, 2009, CTS’09. IEEE, pp 93–97
5.
go back to reference Fernandez-Gago C, Moyano F, Lopez J (2017) Modelling trust dynamics in the internet of things. Inf Sci 396:72–82CrossRef Fernandez-Gago C, Moyano F, Lopez J (2017) Modelling trust dynamics in the internet of things. Inf Sci 396:72–82CrossRef
6.
go back to reference Ferraris D, Fernandez-Gago C (2019) TrUStAPIS: a trust requirements elicitation method for IoT. Int J Inf Secur 1–17 Ferraris D, Fernandez-Gago C (2019) TrUStAPIS: a trust requirements elicitation method for IoT. Int J Inf Secur 1–17
7.
go back to reference Ferraris D, Fernandez-Gago C, Lopez J (2018) A trust by design framework for the internet of things. In: NTMS’2018—security track (NTMS 2018 security track). Paris, France Ferraris D, Fernandez-Gago C, Lopez J (2018) A trust by design framework for the internet of things. In: NTMS’2018—security track (NTMS 2018 security track). Paris, France
8.
go back to reference Friedenthal S, Moore A, Steiner R (2014) A practical guide to SysML: the systems modeling language. Morgan Kaufmann Friedenthal S, Moore A, Steiner R (2014) A practical guide to SysML: the systems modeling language. Morgan Kaufmann
9.
go back to reference Gambetta D et al (2000) Can we trust trust. Trust: making and breaking cooperative relations. 13:213–237 Gambetta D et al (2000) Can we trust trust. Trust: making and breaking cooperative relations. 13:213–237
10.
go back to reference Hoffman LJ, Lawson-Jenkins K, Blum J (2006) Trust beyond security: an expanded trust model. Commun ACM 49(7):94–101CrossRef Hoffman LJ, Lawson-Jenkins K, Blum J (2006) Trust beyond security: an expanded trust model. Commun ACM 49(7):94–101CrossRef
11.
go back to reference Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644CrossRef Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644CrossRef
12.
go back to reference Kassab M, Kilicay-Ergin N (2015) Applying analytical hierarchy process to system quality requirements prioritization. Innov Syst Softw Eng 11(4):303–312CrossRef Kassab M, Kilicay-Ergin N (2015) Applying analytical hierarchy process to system quality requirements prioritization. Innov Syst Softw Eng 11(4):303–312CrossRef
13.
go back to reference Kim B, Kim S (2017) An AHP-based interface and channel selection for multi-channel mac protocol in IoT ecosystem. Wirel Pers Commun 93(1):97–118CrossRef Kim B, Kim S (2017) An AHP-based interface and channel selection for multi-channel mac protocol in IoT ecosystem. Wirel Pers Commun 93(1):97–118CrossRef
14.
go back to reference Lee MC (2014) Information security risk analysis methods and research trends: AHP and fuzzy comprehensive method. Int J Comput Sci Inf Technol 6(1):29 Lee MC (2014) Information security risk analysis methods and research trends: AHP and fuzzy comprehensive method. Int J Comput Sci Inf Technol 6(1):29
15.
go back to reference McKnight DH, Chervany NL (1996) The meanings of trust McKnight DH, Chervany NL (1996) The meanings of trust
16.
go back to reference Metcalfe B (1995) Metcalfe’s law: a network becomes more valuable as it reaches more users. Infoworld 17(40):53 Metcalfe B (1995) Metcalfe’s law: a network becomes more valuable as it reaches more users. Infoworld 17(40):53
17.
go back to reference Pang XY, Wang C (2014) The study of trust evaluation model based on improved AHP and cloud model in IoT. In: Advanced materials research, vol 918. Trans Tech Publ, pp 258–263 Pang XY, Wang C (2014) The study of trust evaluation model based on improved AHP and cloud model in IoT. In: Advanced materials research, vol 918. Trans Tech Publ, pp 258–263
18.
go back to reference Pavlidis M (2011) Designing for trust. In: CAiSE (doctoral consortium), pp 3–14 Pavlidis M (2011) Designing for trust. In: CAiSE (doctoral consortium), pp 3–14
19.
go back to reference Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 44(9):51–58CrossRef Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 44(9):51–58CrossRef
20.
go back to reference Saaty TL (1980) Analytic hierarchy process. Wiley Online Library Saaty TL (1980) Analytic hierarchy process. Wiley Online Library
21.
go back to reference Taha A, Trapero R, Luna J, Suri N (2014) AHP-based quantitative approach for assessing and comparing cloud security. In: 2014 IEEE 13th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 284–291 Taha A, Trapero R, Luna J, Suri N (2014) AHP-based quantitative approach for assessing and comparing cloud security. In: 2014 IEEE 13th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 284–291
23.
go back to reference Voigt P, Von dem Bussche A (2017) The EU general data protection regulation (GDPR). A practical guide, 1st edn. Springer International Publishing, Cham Voigt P, Von dem Bussche A (2017) The EU general data protection regulation (GDPR). A practical guide, 1st edn. Springer International Publishing, Cham
24.
go back to reference Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134CrossRef Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134CrossRef
Metadata
Title
POM: A Trust-Based AHP-Like Methodology to Solve Conflict Requirements for the IoT
Authors
Davide Ferraris
Carmen Fernandez-Gago
Javier Lopez
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-16088-2_7

Premium Partner