Abstract
Cyber-physical systems deeply connect artefacts, systems and people. As we will use these systems on a daily basis, the question arises to what extent we can trust them, and even more, whether and how we can develop computational models for trust in such systems. Trust has been explored in a wide range of domains, starting with philosophy via psychology, sociology, and economy. Also in automation, computing and networking definitions, models and computations have emerged. In this paper we discuss our initial considerations on linking concepts and models of trust and cyber-physical systems. After structuring and selecting basic approaches in both areas, we propose appropriate links, which can be used as action areas for future development of trust models and computations in cyber-physical systems.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ahmadi, A., Sodhro, A.H., Cherifi, C., Cheutet, V., Ouzrout, Y.: Evolution of 3C cyber-physical systems architecture for industry 4.0. In: Borangiu, T., Trentesaux, D., Thomas, A., Cavalieri, S. (eds.) SOHOMA 2018. Studies in Computational Intelligence, vol. 803, pp. 448–459. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-03003-2_35. https://www.springer.com/gp/book/9783030030025
Andersen, B., Kaur, B., Tange, H.: Computational trust. In: Khajuria, S., Bøgh Sørensen, L., Skouby, K.E. (eds.) Cybersecurity and Privacy - Bridging the Gap. River Publishers Series in Communications, pp. 83–98. River Publishers, Aalborg (2017)
Cardin, O.: Classification of cyber-physical production systems applications: proposition of an analysis framework. Comput. Ind. 104, 11–21 (2019). https://doi.org/10.1016/j.compind.2018.10.002
Chang, E., Dillon, T.: Trust, reputation, and risk in cyber physical systems. In: Papadopoulos, H., Andreou, A.S., Iliadis, L., Maglogiannis, I. (eds.) AIAI 2013. IAICT, vol. 412, pp. 1–9. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41142-7_1. https://www.springer.com/de/book/9783642411410
Cho, J.H., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. 48(2), 1–40 (2015). https://doi.org/10.1145/2815595
Griffor, E.R., Greer, C., Wollman, D.A., Burns, M.J.: Framework for cyber-physical systems: volume 1, overview. National Institute of Standards and Technology, Gaithersburg, MD (2017). https://doi.org/10.6028/NIST.SP.1500-201
Jäger, M., Küng, J.: Introducing the factor importance to trust of sources and certainty of data in knowledge processing systems - a new approach for incorporation and processing. In: Proceedings of the 50th Hawaii International Conference on System Sciences, vol. 50, pp. 4298–4307. IEEE, January 2017. https://doi.org/10.24251/HICSS.2017.521. Accessed 07 Sept 2018
Jäger, M., Nadschläger, S., Küng, J.: Concepts for trust propagation in knowledge processing systems - a brief introduction and overview. In: Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2018), pp. 1502–1505 (2018). https://doi.org/10.1109/TrustCom/BigDataSE.2018.00212
Jøsang, A., Knapskog, S.J.: A metric for trusted systems. In: Proceedings of the 21st NIST-NCSC National Information Systems Security Conference, pp. 16–29. NSA, August 1998. http://folk.uio.no/josang/papers/JK1998-NSC.pdf
Jøsang, A., Marsh, S., Pope, S.: Exploring different types of trust propagation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 179–192. Springer, Heidelberg (2006). https://doi.org/10.1007/11755593_14
Lee, I.: Trust management for cyber-physical systems, 19 June 2016
Liu, Y., Peng, Y., Wang, B., Yao, S., Liu, Z.: Review on cyber-physical systems. IEEE/CAA J. Automatica Sinica 4(1), 27–40 (2017). https://doi.org/10.1109/JAS.2017.7510349
Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995). https://doi.org/10.2307/258792
Monostori, L., et al.: Cyber-physical systems in manufacturing. CIRP Ann. 65(2), 621–641 (2016). https://doi.org/10.1016/j.cirp.2016.06.005
Rein, A., Rieke, R., Jäger, M., Kuntze, N., Coppolino, L.: Trust establishment in cooperating cyber-physical systems. In: Bécue, A., Cuppens-Boulahia, N., Cuppens, F., Katsikas, S., Lambrinoudakis, C. (eds.) CyberICS/WOS-CPS -2015. LNCS, vol. 9588, pp. 31–47. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40385-4_3
Rousseau, D., Sitkin, S., Burt, R., Camerer, C.: Not so different after all: a cross-discipline view of trust. Acad. Manag. Rev. 23(3), 393–404 (1998). https://doi.org/10.5465/AMR.1998.926617
Schuh, G., Potente, T., Varandani, R., Hausberg, C., Fränken, B.: Collaboration moves productivity to the next level. Procedia CIRP 17, 3–8 (2014). https://doi.org/10.1016/j.procir.2014.02.037
Acknowledgement
This work has partially been supported by the FFG, Contract No. 854184: “Pro\(^{2}\)Future is funded within the Austrian COMET Program—Competence Centers for Excellent Technologies—under the auspices of the Austrian Federal Ministry of Transport, Innovation and Technology, the Austrian Federal Ministry for Digital and Economic Affairs and of the Provinces of Upper Austria and Styria. COMET is managed by the Austrian Research Promotion Agency FFG.”, and by the LIT Secure and Correct Systems Lab funded by the State of Upper Austria.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Auer, D., Jäger, M., Küng, J. (2019). Linking Trust to Cyber-Physical Systems. In: Anderst-Kotsis, G., et al. Database and Expert Systems Applications. DEXA 2019. Communications in Computer and Information Science, vol 1062. Springer, Cham. https://doi.org/10.1007/978-3-030-27684-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-27684-3_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-27683-6
Online ISBN: 978-3-030-27684-3
eBook Packages: Computer ScienceComputer Science (R0)