Methods for Determining Trustworthiness and Authenticity for Internet of Things Devices
Abstract
Methods for Determining Trustworthiness and Authenticity for Internet of Things Devices
Incoming article date: 09.11.2025This article presents a systematic review of methods for ensuring the trustworthiness and authenticity of devices in the Internet of Things (IoT) ecosystem. Key vulnerabilities, architectural features, and resource constraints of IoT systems that determine the choice of security mechanisms are analyzed. Cryptographic solutions, dynamic trust models, access control approaches, and authentication protocols for industrial and distributed environments are considered. A comparative analysis of methods identifies relevant research gaps and identifies promising areas for developing comprehensive, adaptive security systems for heterogeneous IoT infrastructures.
Keywords: Internet of Things system, security, reliability, authenticity, devices, methods