Thesis topic:

Human-Computer Trust Interaction for IoT Systems

  • Supervisor: Abasi-Amefon Obot Affia
    • contact: amefon.affia@ut.ee
  • Human-computer trust interaction (HCTI) trust management helps to ensure that IoT can be readily accepted by its users through support for human-computer interaction in a trustworthy way. HCTI pays more attention to the subjective properties of the trustor (i.e., IoT users) at the IoT application layer. Significant past works on trust management, such as Køien (2011) and Ding et al. (2013), have studied human trust in an IoT setting. Køien (2011) presented a multi-faceted view of trust in software, hardware, devices, and services pointing out that although one cannot fully trust IoT components, this does not mean that humans cannot trust IoT services. Ding et al. (2013) studied user behaviors in IoT interactions between selfish and malicious nodes, showing that malicious user behaviors could be identified with a high probability. However, there is still little work that pays attention to the HCTI issues in IoT, although HCTI plays a decisive role in the final acceptance and success of IoT services and applications.
  • This study can rely on literature as a systematic literature review about efforts in HCTI specific to an IoT case study (i.e., autonomous vehicles (AVs) or other existing and accessible IoT systems), assessing possible user trust issues in the chosen case study and possible solutions to improve HCTI. The work can directly cover the implementation of known methods to study human behavior for the case study.
  • Note: This topic can be adapted specifically for autonomous/connected vehicle systems and can be tested with the help of the Autonomous Vehicle Lab.
  • References
    • 1. Affia, A. O., Matulevičius, R., & Nolte, A. (2019, October). Security risk management in cooperative intelligent transportation systems: a systematic literature review. In OTM Confederated International Conferences" On the Move to Meaningful Internet Systems" (pp. 282-300). Springer, Cham.
    • 2. Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of network and computer applications, 42, 120-134.
    • 3. Køien, G. M. (2011). Reflections on trust in devices: an informal survey of human trust in an internet-of-things context. Wireless personal communications, 61(3), 495-510.
    • 4. Ding, Y., Zhou, X. W., Cheng, Z. M., & Lin, F. H. (2013). A security differential game model for sensor networks in context of the internet of things. Wireless personal communications, 72(1), 375-388.
    • 5. Yan, Z., Kantola, R., & Zhang, P. (2011, November). A research model for human-computer trust interaction. In 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 274-281). IEEE.

<< back