Research Article

Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges

Table 1

Critical evaluation of the schemes discussed in the literature.

Lit. ref.Technique usedFocus areaProsCons

[10]Hardware-based data location assurance solution (HDLAS) scheme using TPM and PDPTo enable the IOT users to verify the geographic location of their data stored in any data center accuratelyHDLAS can be applied to the existing system and does not need a third partyToo many signaling messages and algorithms still are involved in the communication process
[11]TPM-based scheme for remote attestationTo allow the clients of IOT computing to verify the information based on the geographic location of their data stored in any data center accuratelySimple architecture to learn and take care of regulatory concerns for the IOT computing environmentStill exist threats to the integrity of data. Proposed work is carried out conceptually; that is, simulation results have not been shown and analyzed
[16]Use of TPM virtualization in IOT computingTo secure and establish trust in the IOT computing environment by using the virtualization of TPMPoint out key research areas and virtualization of TPM can reduce the cost and offer the flexibility of the platformIOT security is not limited to the virtualization of TPM. Proposed work needs to be simulated on the basis of security services
[6]Context and motivations for specifications of TCG based on TPMTo establish trust between the IOT service provider and IOT user by deploying TPM in CCITCG specifications are not mature up till now to secure IOT computing and virtualization. Future research work areasThe author does not have their own technique. Analyzed but without validation
[12]Data firewall IOT (DFIOT) technique based on TPMTo provide security at the server and client side and security to the services of IOT storage and control the access to data in IOT storageRemote attestation protects the leakage of data from malicious software at each client sideSoftware-based TPM (TPM emulator) provides less security as compared to hardware-based TPM and full proof security is based on security services
[17]Tools and techniques to secure virtual IOT computing infrastructure (VCCI)To make the security of VMMs strong and protect them from inside or outside attackers in VCCIPick up an immensely important security issue in current VCCI and explore future research areas from a working and governance point of viewCCI security is not only limited to virtualization. There are other layers that need security. Proposed work needs to be simulated on the basis of security services
[18]Light-weight trusted scheme, that is, dynamic infrastructure trusted bootstrapping protocol (DITBP) based on TPMTo establish trust between two machines in the IOT computing infrastructureIntegrate many solutions in one infrastructure which provides better effects. Provide the foundation of future research areasTrust is also necessary between IOT users and CSP. Proposed work needs to be simulated and analyzed on the basis of security services
[19]Scheme based on trusted service domain (TSD).To deliver services for multiple user domains that are trusted on the virtualization platform of the IOT environment.Have good results as compared to existing schemes, that is, in terms of flexibility and scalability. Mentioned future research areas.Functionalities of TSD and TPM are the same; then why does TPM use directly instead of TSD.
[20]Trusted computing platform (TCP) using trusted platform support services (TSS) based on TPMTo make the system, that is, data and applications, cryptographically secure and provide hardware-based securityMake the CSP trustable to clients. Security provided by hardware TPM is stronger than the security provided by software TPMProposed work needs to be simulated and analyzed on the basis of security services for IOT computing infrastructure
[21]IOT computing security scheme, that is, trusted network platform architecture based on virtualizationTo produce trusted relations between the IOT client and IOT server and also ensure the integrity of IOT servicesEstablish trust between server and client. Provide the security service such as integrity of IOT serviceGiven work is too short and not enough to understand. Proposed work needs to be simulated and analyzed on the basis of security services for the IOT computing environment
[22]Efficient and secure educational platform (ESEP) schemeTo make CSP trustable to educational organizations by providing features such as scalability, flexibility, security, availability, recovery, software on demand, and omnipresent accessibility of IOT computingBit-locker software enabled by TPM provides better security as compared to others. Explore many key research areas of IOT computing. ESEP is based on all in oneThe prototype of ESEP is not given. It is difficult to implement ESEP because it works on more than one feature. Proposed work needs to be simulated and analyzed on the basis of security services
[23]Integration of a trusted computing platform (TCP) in the IOT computing environmentTo establish trust by integrating a trusted computing platform in the IOT computing environment to provide security services such as confidentiality, integrity, and authenticationEncryption of data is performed in a very short interval of time, that is, nanoseconds, due to which, computation time is reduced and better performance is achieved. Security services is carried out by the RC4The encryption process takes short time, that is, nanoseconds, which can affect the security of the IOT computing system. The encryption process time is directly proportional to the size of the data
[24]Provable data possession scheme together with trusted computing technology for mobile nodes in IOT computing environmentTo allow the resource-constrained devices such as mobile nodes to use the services of IOT computing without any trouble and reduce the workload on mobile nodes by using TPM chip mounted on client mobile nodeThe workload is minimized by TPM. Clients can verify and update data unlimitedly at the same time. TPM chip avoids man in the middle attack. CSP cannot understand client dataOne security service is left, that is, availability. The prototype of the proposed system is necessary to show the performance of the scheme which has not been discussed
[25]Integration of trusted computing with IOT computing environmentTo build trust by integrating a trusted computing platform with an IOT computing environment to provide security services such as confidentiality, integrity, and authenticationSecurity services such as confidentiality, integrity, and authentication can build trust up to some extent in the IOT computing environment. The origin of the users can also be tracedAvailability is also very important which has not been discussed. The proposed method has not been validated and implemented because the prototype of the proposed approach along with simulation results is not discussed