×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

Methods for Determining Trustworthiness and Authenticity for Internet of Things Devices

Abstract

Methods for Determining Trustworthiness and Authenticity for Internet of Things Devices

Abramov E.S., Bo P.

Incoming article date: 09.11.2025

This article presents a systematic review of methods for ensuring the trustworthiness and authenticity of devices in the Internet of Things (IoT) ecosystem. Key vulnerabilities, architectural features, and resource constraints of IoT systems that determine the choice of security mechanisms are analyzed. Cryptographic solutions, dynamic trust models, access control approaches, and authentication protocols for industrial and distributed environments are considered. A comparative analysis of methods identifies relevant research gaps and identifies promising areas for developing comprehensive, adaptive security systems for heterogeneous IoT infrastructures.

Keywords: Internet of Things system, security, reliability, authenticity, devices, methods