Skip to main content

Linking Trust to Cyber-Physical Systems

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1062))

Abstract

Cyber-physical systems deeply connect artefacts, systems and people. As we will use these systems on a daily basis, the question arises to what extent we can trust them, and even more, whether and how we can develop computational models for trust in such systems. Trust has been explored in a wide range of domains, starting with philosophy via psychology, sociology, and economy. Also in automation, computing and networking definitions, models and computations have emerged. In this paper we discuss our initial considerations on linking concepts and models of trust and cyber-physical systems. After structuring and selecting basic approaches in both areas, we propose appropriate links, which can be used as action areas for future development of trust models and computations in cyber-physical systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ahmadi, A., Sodhro, A.H., Cherifi, C., Cheutet, V., Ouzrout, Y.: Evolution of 3C cyber-physical systems architecture for industry 4.0. In: Borangiu, T., Trentesaux, D., Thomas, A., Cavalieri, S. (eds.) SOHOMA 2018. Studies in Computational Intelligence, vol. 803, pp. 448–459. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-03003-2_35. https://www.springer.com/gp/book/9783030030025

    Chapter  Google Scholar 

  2. Andersen, B., Kaur, B., Tange, H.: Computational trust. In: Khajuria, S., Bøgh Sørensen, L., Skouby, K.E. (eds.) Cybersecurity and Privacy - Bridging the Gap. River Publishers Series in Communications, pp. 83–98. River Publishers, Aalborg (2017)

    Google Scholar 

  3. Cardin, O.: Classification of cyber-physical production systems applications: proposition of an analysis framework. Comput. Ind. 104, 11–21 (2019). https://doi.org/10.1016/j.compind.2018.10.002

    Article  Google Scholar 

  4. Chang, E., Dillon, T.: Trust, reputation, and risk in cyber physical systems. In: Papadopoulos, H., Andreou, A.S., Iliadis, L., Maglogiannis, I. (eds.) AIAI 2013. IAICT, vol. 412, pp. 1–9. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41142-7_1. https://www.springer.com/de/book/9783642411410

    Chapter  Google Scholar 

  5. Cho, J.H., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. 48(2), 1–40 (2015). https://doi.org/10.1145/2815595

    Article  Google Scholar 

  6. Griffor, E.R., Greer, C., Wollman, D.A., Burns, M.J.: Framework for cyber-physical systems: volume 1, overview. National Institute of Standards and Technology, Gaithersburg, MD (2017). https://doi.org/10.6028/NIST.SP.1500-201

  7. Jäger, M., Küng, J.: Introducing the factor importance to trust of sources and certainty of data in knowledge processing systems - a new approach for incorporation and processing. In: Proceedings of the 50th Hawaii International Conference on System Sciences, vol. 50, pp. 4298–4307. IEEE, January 2017. https://doi.org/10.24251/HICSS.2017.521. Accessed 07 Sept 2018

  8. Jäger, M., Nadschläger, S., Küng, J.: Concepts for trust propagation in knowledge processing systems - a brief introduction and overview. In: Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2018), pp. 1502–1505 (2018). https://doi.org/10.1109/TrustCom/BigDataSE.2018.00212

  9. Jøsang, A., Knapskog, S.J.: A metric for trusted systems. In: Proceedings of the 21st NIST-NCSC National Information Systems Security Conference, pp. 16–29. NSA, August 1998. http://folk.uio.no/josang/papers/JK1998-NSC.pdf

  10. Jøsang, A., Marsh, S., Pope, S.: Exploring different types of trust propagation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 179–192. Springer, Heidelberg (2006). https://doi.org/10.1007/11755593_14

    Chapter  Google Scholar 

  11. Lee, I.: Trust management for cyber-physical systems, 19 June 2016

    Google Scholar 

  12. Liu, Y., Peng, Y., Wang, B., Yao, S., Liu, Z.: Review on cyber-physical systems. IEEE/CAA J. Automatica Sinica 4(1), 27–40 (2017). https://doi.org/10.1109/JAS.2017.7510349

    Article  Google Scholar 

  13. Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995). https://doi.org/10.2307/258792

    Article  Google Scholar 

  14. Monostori, L., et al.: Cyber-physical systems in manufacturing. CIRP Ann. 65(2), 621–641 (2016). https://doi.org/10.1016/j.cirp.2016.06.005

    Article  Google Scholar 

  15. Rein, A., Rieke, R., Jäger, M., Kuntze, N., Coppolino, L.: Trust establishment in cooperating cyber-physical systems. In: Bécue, A., Cuppens-Boulahia, N., Cuppens, F., Katsikas, S., Lambrinoudakis, C. (eds.) CyberICS/WOS-CPS -2015. LNCS, vol. 9588, pp. 31–47. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40385-4_3

    Chapter  Google Scholar 

  16. Rousseau, D., Sitkin, S., Burt, R., Camerer, C.: Not so different after all: a cross-discipline view of trust. Acad. Manag. Rev. 23(3), 393–404 (1998). https://doi.org/10.5465/AMR.1998.926617

    Article  Google Scholar 

  17. Schuh, G., Potente, T., Varandani, R., Hausberg, C., Fränken, B.: Collaboration moves productivity to the next level. Procedia CIRP 17, 3–8 (2014). https://doi.org/10.1016/j.procir.2014.02.037

    Article  Google Scholar 

Download references

Acknowledgement

This work has partially been supported by the FFG, Contract No. 854184: “Pro\(^{2}\)Future is funded within the Austrian COMET Program—Competence Centers for Excellent Technologies—under the auspices of the Austrian Federal Ministry of Transport, Innovation and Technology, the Austrian Federal Ministry for Digital and Economic Affairs and of the Provinces of Upper Austria and Styria. COMET is managed by the Austrian Research Promotion Agency FFG.”, and by the LIT Secure and Correct Systems Lab funded by the State of Upper Austria.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dagmar Auer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Auer, D., Jäger, M., Küng, J. (2019). Linking Trust to Cyber-Physical Systems. In: Anderst-Kotsis, G., et al. Database and Expert Systems Applications. DEXA 2019. Communications in Computer and Information Science, vol 1062. Springer, Cham. https://doi.org/10.1007/978-3-030-27684-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-27684-3_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-27683-6

  • Online ISBN: 978-3-030-27684-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics