ABSTRACT

Trust and security are based on tokens or credentials, provided by a trust management infrastructure, which are embedded in and potentially shared between devices (note that this chapter will use the terms peers, devices, and (end) entities to describe IoT nodes). The integrity and robustness of these tokens (which can, for example, be symmetric keys or digital certificates) are the cornerstone of trust and security. They are useful in deflecting external attacks initiated by entities

that are not in possession of credentials, but fail to deflect internal attacks, where credentials or nodes that own credentials have been compromised.