{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:09:49Z","timestamp":1775066989815,"version":"3.50.1"},"reference-count":30,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["IITP-2020-2018-0-01426"],"award-info":[{"award-number":["IITP-2020-2018-0-01426"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["2019R1F1A1059125"],"award-info":[{"award-number":["2019R1F1A1059125"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["IITP-2020-2018-0-01426"],"award-info":[{"award-number":["IITP-2020-2018-0-01426"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2019R1F1A1059125"],"award-info":[{"award-number":["2019R1F1A1059125"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2020,12,21]]},"abstract":"<jats:p>With the increasing day-to-day acceptance of IOT computing, the issues related to it are also getting more attention. The current IOT computing infrastructure brings some security challenges concerned with the users\/customers and CSP. The users can store their confidential data at IOT storage and can access them anytime when they need. Lack of trust exists among IOT users and between IOT users and CSP. The prevention of this risk is a big research issue and it needs to be solved. There is a need for trusted IOT computing in recent times to provide trusted services. Here, we propose the integration of TPM in IOT computing to performs cryptographic operations and provide hardware-based security. In this domain, different schemes and methods have been proposed to build trust in IOT computing, but the suitable solution has not been presented by these schemes because these schemes lack in terms of some security services. A comparative study based on trusted computing schemes has also been presented in this paper along with different implementations of critical analysis. Our study is based on an overview of the main issues and summarizing the literature along with their strengths and limitations. In the end, we integrated the trusted platform module in the IOT architecture to establish the trust in IOT computing and to enhance the cybersecurity challenges and evaluated it with the help of mathematical\/algorithms\/graph theory\/matrices and logical diagrams.<\/jats:p>","DOI":"10.1155\/2020\/6612919","type":"journal-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T02:35:26Z","timestamp":1608604526000},"page":"1-9","source":"Crossref","is-referenced-by-count":17,"title":["Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6823-5592","authenticated-orcid":true,"given":"Mohammad","family":"Faisal","sequence":"first","affiliation":[{"name":"Department of CS & IT, University of Malakand, KPK 18800, Pakistan"}]},{"given":"Ikram","family":"Ali","sequence":"additional","affiliation":[{"name":"School of Automation Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1119-6999","authenticated-orcid":true,"given":"Muhammad Sajjad","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Korea Polytechnic University, Siheung, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5951-9208","authenticated-orcid":true,"given":"Su Min","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Korea Polytechnic University, Siheung, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9583-7978","authenticated-orcid":true,"given":"Junsu","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Korea Polytechnic University, Siheung, Republic of Korea"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8850096"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8859454"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/1751285"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1142\/s0218843016300011"},{"issue":"3","key":"5","article-title":"A novel and cost-effective approach for privacy","volume":"2","author":"S. L. M. Deepthi","year":"2014","journal-title":"International Journal of Advanced Computer Communications and Control"},{"key":"6","volume-title":"Attestation and Trusted Computing-CSEP 590: Practical Aspects of Modern Cryptography","author":"J. C. Bare","year":"2006"},{"key":"7","article-title":"Security issues in IOT computing","author":"S. Goyal"},{"key":"8","article-title":"Security issues and challenges in IOT computing: a mirror review","author":"C. Kumari"},{"key":"9","doi-asserted-by":"crossref","first-page":"67","DOI":"10.9790\/0661-1902046772","article-title":"Security issues and solutions in IOT computing","volume":"19","author":"A. K. Sen","year":"2020","journal-title":"IOSR Journal of Computer Engineering"},{"key":"10","volume-title":"Design, Implementation, and Usage Principles Version 2.0","author":"TCG Best Practices Committee","year":"2005"},{"key":"11","volume-title":"IOT Computing and Security\u2013A Natural Match","author":"Trusted Computing Group (TCG)","year":"2010"},{"key":"12","volume-title":"Trusted Computing and Secure Virtualization in IOT Computing","author":"N. Paladi","year":"2012"},{"key":"13","unstructured":"MellP.GanceT.The nistdenition of IOT computing2011Gaithersburg, ML, USANational Institute of Standards and TechnologyTech. Rep."},{"key":"14","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2012.4101"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.14257\/ijhit.2015.8.3.17"},{"issue":"1","key":"16","article-title":"The trusted computing exemplary with astonishing security for IOT computing","volume":"11","author":"M. R. Devi","year":"2011","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"17","unstructured":"TC GroupTCG specification, architecture overview, revision 1.42007Beaverton, OR, USATrusted Computing GroupTech. Rep."},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"19","first-page":"280","article-title":"Hardware-Based DLAS: achieving geo-location guarantees for IOT data using TPM and provable data possession","author":"A. Noman"},{"issue":"12","key":"20","doi-asserted-by":"crossref","first-page":"23","DOI":"10.5120\/11632-7104","article-title":"Data location verification in IOT computing","volume":"68","author":"A. Vaish","year":"2013","journal-title":"International Journal of Computer Applications (0975\u20138887)"},{"key":"21","first-page":"59","article-title":"Building trust into IOT computing using virtualization of TPM","author":"X. Wan"},{"key":"22","article-title":"Trusted platform module as an enabler for security in IOT computing","author":"M. Achemlal"},{"key":"23","first-page":"551","article-title":"DFIOT: a TPM-based secure data access control method of IOT storage in mobile devices","author":"J. Shin"},{"key":"24","first-page":"151","article-title":"Identifying and analyzing security threats to virtualized IOT computing infrastructures","author":"S. N. Brohi"},{"key":"25","first-page":"350","article-title":"Trusted virtual infrastructure bootstrapping for on demand services","author":"P. Membrey"},{"key":"26","first-page":"119","article-title":"TSD: a flexible root of trust for the IOT","author":"D. Chang"},{"key":"27","first-page":"942","article-title":"IOT computing system based on trusted computing platform","author":"Z. Shen"},{"key":"28","first-page":"890","article-title":"A trusted network platform architecture scheme on IOTing computing model","author":"Y. Liu"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2872115"},{"key":"30","first-page":"145","article-title":"Towards an efficient and secure educational platform on IOT infrastructure","author":"S. N. Brohi"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/6612919.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/6612919.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/6612919.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,30]],"date-time":"2021-01-30T16:57:21Z","timestamp":1612025841000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/complexity\/2020\/6612919\/"}},"subtitle":[],"editor":[{"given":"M. Irfan","family":"Uddin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":30,"alternative-id":["6612919","6612919"],"URL":"https:\/\/doi.org\/10.1155\/2020\/6612919","relation":{},"ISSN":["1099-0526","1076-2787"],"issn-type":[{"value":"1099-0526","type":"electronic"},{"value":"1076-2787","type":"print"}],"subject":[],"published":{"date-parts":[[2020,12,21]]}}}