1. Introduction
Whenever systems interact with each other and with the physical world, preserving integrity to perform mission-critical tasks is essential. Therefore, in computer security, the concept of trust ensures that each component of software and hardware can be relied upon [
1]. The notion of trust was adopted by the United States National Institute of Standards and Technology, which defined trustworthiness as one of nine essential aspects of cyber–physical systems [
2]. The term has also been adopted by the Internet of Things (IoT) community [
3], and has even been leveraged as a key value indicator for the International Mobile Telecommunications 2030 vision for the future 6G communication standard. While these developments highlight the importance of trustworthiness, it remains a vague term in the literature. Beyond a unified understanding of trustworthiness, practical frameworks that link high-level definitions to concrete realizations are lacking.
Ultra-wideband (UWB) localization services provide accurate positioning. The high bandwidth of typically 500 , allows for precise distance measurements based on the time-of-flight of the radio signals. This technology is particularly advantageous for indoor environments where traditional GPS is ineffective. UWB localization offers centimeter-level accuracy, making it suitable for applications such as asset tracking and indoor navigation.
To close the gap in trustworthiness assessment, a systematic method is proposed for the IoT use case of UWB
self-localization, i.e., specifically for a single node estimating its position relative to multiple anchors. This paper uses the following definitions:
Trustworthiness “Trustworthiness is the demonstrable likelihood that the system performs according to designed behavior under any set of conditions as evidenced by characteristics including, but not limited to, safety, security, privacy, reliability and resilience” [
2].
Trustworthiness metric A trustworthiness metric is considered to be any measurement instance that describes the trustworthiness level of system operation.
Trustworthiness indicator Trustworthiness indicators map trustworthiness metrics to a likelihood interval in the range , where 0 represents the lowest level of trustworthiness and 1 represents the highest level.
Trustworthiness index “A trust[worthiness] index is a composite and relative value that combines multiple trust[worthiness] indicators” [
4].
Threat “Threat against a system refers to anything that can or may bring harmful effects to the state of the system and lead to improper service states” [
5].
Self-localization is an essential service in IoT systems, creating dependencies to other components, services or entities [
6]. Because UWB is used as the main technology for indoor localization [
7], it is a perfect candidate for trustworthiness assessment. Our approach is threat-driven. First, threats to the system are identified and mapped to the attributes of trustworthiness. This correspondence may be used to ensure that no aspect of trustworthiness is missed in the evaluation. From these threats, measurable quantities are identified that indicate the presence of a threat. Using this approach,
meaningful metrics are obtained (i.e., they correspond to realistic threats). Then, metrics are mapped to trustworthiness indicators in the value range from 0 to 1, with values below 0.5 being considered not trustworthy. The indicators are then combined in trustworthiness indices that represent the attributes of trustworthiness. By following this process, the contributions of this work are:
A general framework for trustworthiness assessment that can be adapted to various IoT applications using the presented assessment as a blueprint.
A threat-driven metric selection and indicator computation to identify meaningful system measures.
Experimental evaluation is conducted to provide insights into the strengths and weaknesses of the UWB self-localization service concerning trustworthiness, demonstrating that trustworthiness can improve the overall system performance.
Note that the proposed approach focuses on the novelty of the methodology, and does not claim completeness in terms of trustworthiness assessment.
1.1. Defining Trustworthiness
In this subsection, further key terms used throughout the article are introduced based on the previously provided definitions. As even the basic definitions vary in the literature, the focus is on capturing the essential characteristics of each definition.
Trustworthiness is divided into five main attributes (sometimes called pillars or characteristics) [
2,
3]: safety, security, reliability, privacy, and resilience. In
Figure 1, a graphical summary of these attributes is shown. The main focus of safety is to mitigate damage and harm to humans, objects, and the environment in which the system operates. Within the scope of this work (i.e., localization), safety is not considered a standalone attribute but is rather supported by reliability and security.
Traditionally, the primary goals of security are to protect the confidentiality (i.e., prevent unauthorized access), integrity (i.e., prevent unauthorized alterations), and availability (i.e., provide uninterrupted access to authorized subjects) of a system. For the purposes of this work, (service) availability is considered to fit better under the attribute of reliability, as the primary emphasis in security is on preventing malicious activities rather than merely ensuring operational functionality. Reliability is the ability of a system to provide a service under normal conditions, whereas resilience is the ability to adapt and recover from a state when a system is disrupted (e.g., by an attack). The related sub-attributes of reliability have the following meanings: accuracy is a measure of the deviation of a measurement from the true value, while timeliness refers to the ability to deliver results within the required time frame. The sub-attributes of resilience are adaptability (i.e., ability to adjust to new conditions), maintainability (i.e., the ease with which a system can be maintained and restored), and fault tolerance (i.e., the capability to continue operating properly in the event of the failure).
Privacy refers to the right of an individual to control access to and confidentiality of their personally identifiable information. In this setting, the focus is on protecting users’ location information and ranging data from unauthorized access or disclosure. Unlinkability is a property ensuring that different transactions cannot be associated with a specific user. Undetectability is an ability ensuring that a user’s presence cannot be identified.
Note that these attributes may overlap. For instance, reliability and resilience are sometimes considered as subsets of availability. However, the focus of these attributes is different. Availability generally focuses on maximizing uptime, while reliability deals with the probability of failures, and resilience emphasizes speed of recovery.
1.2. Related Work
The concept of trustworthiness has been studied across various communication domains, and substantial growth in relevance has recently been seen within the IoT and wireless sensor network research communities. To provide guidelines for developing trusted communication infrastructure and services, the Telecommunication Standardization Sector of the International Telecommunication Union (ITU-T) has published a recommendation that discusses the concepts, provision, and evaluation processes of trustworthiness [
4]. Although this report introduces several trustworthiness attributes, it lacks clarity on how these attributes contribute to the overall assessment process. A more comprehensive set of attributes contributing to system trustworthiness is proposed in [
5]. While key metrics for trustworthiness evaluation are discussed at the system level, the report does not offer quantitative approaches for assessing systems in operation. Focusing on industrial IoT applications, Ref. [
8] identifies five main trustworthiness attributes, namely, reliability, security, privacy, resilience, and safety. The authors propose a generic framework for trustworthiness assessment based on these characteristics. However, they do not provide practical methods for implementing the assessment in specific industrial IoT applications or consider their unique requirements and limitations.
The notion of what constitutes a trustworthy system and how to assess the trustworthiness status of a system and its services highly depends on the specific application and the services that the system offers. In the realm of localization applications, a few studies in the literature have addressed trustworthiness evaluation from various perspectives. Considering only the reliability aspect of trustworthiness, Ref. [
9] proposed an algorithm that integrates a trustworthiness index to evaluate the reliability of the information reported by nodes, thereby mitigating the impact of faulty nodes on localization accuracy. Ref. [
10] presented a blockchain-based trustworthiness evaluation and management model for wireless sensor networks. The authors defined trustworthiness metrics, e.g., honesty and intimacy, which can be computed based on measurements from high network layers, e.g., the number of successful and unsuccessful interactions and the time of interaction. These metrics were used to evaluate the trustworthiness of anchors, which the nodes rely on for localization. While evaluating anchors’ trustworthiness is crucial, it is equally important to use meaningful metrics to assess the trustworthiness of all other entities in the network, including the nodes themselves, as well as the overall trustworthiness of the whole system. In [
11], the authors presented a simulation framework focused on assessing the resilience of indoor ultrasound localization systems. However, their approach relies on metrics derived from the localization error, which requires ground truth information on the actual location, an impractical requirement in real-world implementations. A trustworthiness evaluation scheme for UWB communications was introduced in [
12]. This scheme evaluates reliability and security using machine learning (ML) techniques; however, its reliance on only one metric, i.e., the channel impulse response, limits its ability to provide a holistic assessment of system trustworthiness.
In conclusion, existing studies such as [
4,
5,
8] lack comprehensive quantitative assessment methods and practical implementation guidelines. They often focus narrowly on single aspects, such as reliability in [
9], or assess resilience with impractical requirements, such as ground truth localization, as in [
11]. Other studies, such as [
10,
12], perform trustworthiness assessment only on anchors and are based on limited metrics from higher network layers, which may not be readily available or cover all trustworthiness attributes. Additionally, approaches such as [
12] assess reliability and security based on only one metric, for example, the channel impulse response, which fails to provide a holistic evaluation. Building upon these limitations in the current literature, we propose a structured, practical, and general trustworthiness assessment framework. This framework can evaluate the state of all involved entities in the network, including the anchors, nodes, and the overall system, from the aspects of reliability, security, resilience, privacy and safety. It can also be easily adapted to new use cases and applications. In addition, the proposed method utilizes a handful of metrics covering these aspects of trustworthiness and is driven by measurement data from lower network layers, thereby enhancing the generality and agility of the scheme.
1.3. Methodology
This study presents a methodology aimed at developing an application-centric trustworthiness assessment framework tailored specifically for UWB localization services.
Figure 2 illustrates the workflow of the proposed methodology. By running through this workflow, trustworthiness can also be assessed for other IoT use cases, with the presented one serving as a blueprint. The proposed methodology consists of two main phases: metric development (
Figure 2, left) and trustworthiness assessment (
Figure 2, right). The final output is the trustworthiness index of the system.
The metric development phase links the general concept of trustworthiness to measurable quantities in the specific application. It consists of the following steps:
- (i)
Trustworthiness attributes: Trustworthiness is defined as a holistic measure that signals whether the system is working as intended. Hence, it first requires an understanding of which aspects of the system have to be observed. As proposed in literature [
2,
3], the currently considered system attributes include reliability, security, privacy, resilience, and safety (c.f.
Section 1.1).
- (ii)
Service definition: To match the trustworthiness attributes to UWB self-localization, a clear understanding of the operational principle is required. This step establishes a clear and comprehensive understanding of the system under evaluation, laying the groundwork for the subsequent step of threat analysis.
- (iii)
Threat analysis: The threat analysis is a critical step aimed at identifying potential vulnerabilities of the defined service. It leverages critical parameters of the system at hand. The most challenging aspect is to address the entire set of identified trustworthiness attributes.
- (iv)
Metrics and trust indicators: While there are many possible measurable service parameters (referred to as metrics), this step identifies those that are relevant to detecting the likelihood of a threat. To make relevant metrics comparable, they have to be further mapped to trustworthiness indicators with a value range in the interval [0,1] where 0 and 1, respectively, indicate not trustworthy and trustworthy.
- (v)
Assign metrics and indicators to attributes: In order to obtain a measure for each trustworthiness attribute, the identified metrics and indicators first have to be assigned to the corresponding trustworthiness attributes. The indicators are then combined to indices that provide a high-level trustworthiness assessment.
Note that a coherent mapping between quantitative evaluation metrics and qualitative trust attributes can be established by defining potential threats and risks in UWB localization systems. This mapping ensures that the framework remains tightly aligned with the ultimate goal of trustworthiness assessment in UWB localization services and is achieved in the final step of the metric development phase (’Assign metrics and indicators to attributes’). Depending on which entity in the localization service is measured, the trustworthiness indicators are categorized as node (referring to the state of the node), link (referring to the state of the link between the node and each anchor), or system (referring to the state of whole localization system) indicators.
Section 3,
Section 4, and
Section 5 respectively describe threat analysis, metric derivation, and assignment in detail.
The second phase of the proposed method is trustworthiness assessment, where the system’s trustworthiness is evaluated online. This evaluation involves monitoring the defined indicators and combining them to obtain a unified trustworthiness index for each attribute as well as an overall trustworthiness index for the entire system over time. Trustworthiness is assessed based on link, node, and system indicators. Two methods are proposed, called the basic and sequential methods. In the basic method, trustworthiness evaluation is conducted based on all metrics and their corresponding indicators, which are monitored in the system. In contrast, the sequential method involves filtering out anchors with untrusted links and then updating the node, link, and system indicators. This approach eventually enhances the robustness of the localization service, as shown in the results. The results reveal that considering trustworthiness in this way not only provides valuable insights into the system’s status but can also enhance its overall performance. In terms of scalability and deployment, trustworthiness is assessed locally on a node in a decentralized manner. The complexity does, therefore, not increase with the number of nodes present in the network but linearly with the number of available anchors.
2. Service Definition
A 2D self-localization service of one battery-powered node in an environment with multiple cable-powered anchors is considered. The service relies on UWB range measurements and subsequently processes the distance estimates (ranges) to obtain a location estimate. Finally, the location estimate can serve an application as a functional basis.
2.1. Range-Based Self-Localization
The node performs ranging with a subset
of all existing anchors
. The subset is selected either through the communication range of the node or through another criterion introduced later in
Section 4.4. For ranging, three packets have to be exchanged; the measured time intervals are then converted into a range estimate. This packet exchange is referred to as
double-sided two-way ranging [
13]. In
Figure 3a, the packet exchange cycle between node and anchor
with the measured timestamps at the node
and the anchor
, and channel impulse responses
is illustrated. Based on the round trip intervals,
and
, and the response delays,
and
, the ranges are computed according to [
13] by
where
c is the speed of light. Processing time-of-flight according to (
1) is known as
asymmetric double-sided two-way ranging. The method provides implicit synchronization of node and anchor and does not impose constraints on the response delays
and
. Detailed derivation can be found in the reference. The anchor
is located at known position
. The ranges are collected in
and the anchor positions in
, respectively:
Anchor A uses the payload of packet b to share , and with the node. To provide it with and , a fourth packet is used.
For each localization sequence, the node first carries out ranging with all available anchors. Then, the node estimates its position
by computing
where the localization function
can be chosen according to the system requirements. Here, a simple least-squares localization [
14] is considered. The channel impulse responses and other channel-related features (e.g., the received signal strength indicator (RSSI)) are simultaneously recorded at the transceiver and frequently used for non line-of-sight detection [
15].
Figure 3.
(
a) Double-sided two-way ranging message exchange using four packets with channel measurements; the superscripts are omitted for simplicity, e.g.,
is used instead of
. (
b) UWB packet configuration possibilities and the position of timestamping within the packet according to the IEEE 802.15.4z-2020 [
16]. specification.
Figure 3.
(
a) Double-sided two-way ranging message exchange using four packets with channel measurements; the superscripts are omitted for simplicity, e.g.,
is used instead of
. (
b) UWB packet configuration possibilities and the position of timestamping within the packet according to the IEEE 802.15.4z-2020 [
16]. specification.
2.2. UWB Packet Structure
According to the 802.15.4-2011 standard [
7], the exchanged packets consist of four fields: the SYNC and SFD which together form the synchronization header (SHR), the physical layer header (PHR), and the PHY payload field for data transmission (see
Figure 3b, configuration 0). Within the packet, a timestamping event is defined at the end of the SHR. It serves as a reference point for measuring the time intervals needed for (
1). The exchanged physical layer (PHY) packets have one of the logical structures shown in
Figure 3b, selected through node configuration. Configurations 0, 1, and 2 enable payload data to be appended, while configuration 3 serves purely for time measurements. Moreover, configurations 1, 2, and 3 include the scrambled timestamp sequence (STS) field, which adds an additional security mechanism. The use of the STS requires common knowledge of the keys and cryptographic scheme between transmitter and receiver. The location of the STS may vary depending on the configuration (see
Figure 3b, configurations 1–3).
2.3. Receive Time Estimation for Ranging
Time measurements used for ranging refer to the moment the timestamping event occurs, i.e., when the end of the SHR appears at the antenna. The timestamp at packet reception is based on a leading-edge detection algorithm, denoted by
, i.e.,
While currently no UWB transceiver manufacturer discloses information about its leading-edge detection implementation, it is understood that these algorithms rely either on the received SHR or on the STS waveform, and that the accuracy is influenced by the propagation channel.
Implementations using the SHR sequences for timestamping are vulnerable to distance spoofing attacks. This can be prevented by using the STS sequence for timestamping, which is derived from a cryptographic function depending on a key only known to legitimate devices. However, Ref. [
17] have demonstrated that injection of a random signal with high power at the same time as the legitimate transmitter sends the sequence can cause distance reductions in certain cases, as the sequence seems not to be evaluated bit-wise but only through correlation of the received signal with a template of the sequence.
2.4. Protocol Stack for Data Exchange
Communication is encoded in medium access control (MAC) frames as defined by IEEE802.15.4. The MAC layer offers two addressing modes, namely, extended unique IDs and short IDs, which are dynamically assigned upon association with a private area network. The standard also specifies an authenticated encryption with associated data method for MAC layer security, providing payload data confidentiality, authenticity, and replay protection. Additionally, an MAC frame can request acknowledgment from the receiver to confirm the correct packet reception; if not received, this triggers a retransmission.
2.5. Known Exploits for UWB Ranging
As UWB ranging is used in security-relevant applications, it is a target for attacks. Examples include distance reduction attacks for keyless entry systems. Attacks can occur on the node level (e.g., targeted battery drain), on the link level (e.g., early detect/late commit attacks), or on the system level (e.g., anchor node impersonation). Link-level attacks were specifically studied in [
18,
19,
20].
3. Threat Analysis
In this section, some major threats to the UWB systems described in
Section 2 are classified. Primarily, negative events that can disrupt one or more basic trustworthiness attributes of such systems are discussed. These threats can be divided into two main categories:
native threats to self-localization (i.e., any system that uses UWB localization is subject to these threats), and
application-specific ones (i.e., these threats depend on the broader context of a given application). The main focus of this paper is on native threats.
Furthermore, threats specific to nodes (i.e., the node itself), links (i.e., communication between a node and an anchor), or the system (i.e., localization service) are distinguished. Detailed overviews are provided in
Table 1 for node threats,
Table 2 for link threats, and
Table 3 for system threats. Node threats (e.g., overheating) may apply to anchors as well. Because our focus is on self-localization, threats affecting anchors are manifested as either link threats (e.g., weak signal) or system threats (e.g., not enough threats). Note that the lists in the tables are not meant to be complete; the threat analysis depends on the specific use case. Furthermore, some threats can overlap or propagate. For example, software failure of an anchor could cause a weak signal (link), which in turn might result in a shortage of anchors (system). Moreover, application-specific threats can be implied by native threats (e.g., in a robot-assisted warehouse, one malfunctioning anchor could affect the accuracy of the localization service, which might lead to collisions between robots and humans).
4. Metrics and Trustworthiness Indication
Metrics are used to evaluate the characteristics of a system in terms of its respective attributes. As the attribute definition alone is too general to determine meaningful and relevant metrics, metrics that enable the detection of the previously introduced threats are chosen. The approach of mapping metrics to attributes for the discussed UWB self-localization system is depicted in
Figure 4.
As each chosen metric has a different dynamic range, they are not comparable a priori; thus, mapping them to trustworthiness indicators with specific conditions is required. To further extract high-level evaluation (e.g., the trustworthiness with respect to reliability), such indicators can be unified into trustworthiness indices.
In this section, the general notation of metrics, their mapping to trustworthiness indicators, and their unification into trustworthiness indices is provided. In the following section, the metrics are discussed one by one.
4.1. Metrics
In this work, measurable quantities that are available from the UWB transceiver or from intermediate information within the localization scheme are selected. Those metrics, which are detailed in the subsequent section, are temperature (temp), battery voltage (bat), ML-based anomaly detection [
12] (ml), RSSI (rssi), position dilution of precision (PDoP, pdop), number of anchors in reach (na), encryption used (enc), authentication used (auth), secure ranging used (sr), and dynamic addressing used (da). Metrics are denoted by
, where
i is the abbreviation of the metric (e.g.,
for RSSI), or simply by
m.
For later use, the following sets are defined according to measurements that relate to the node (temp and bat), link with an anchor (ml and rssi), or system configuration (all remaining metrics).
For , denotes the metric measurement between the node and the anchor . Note that a metric can be either real valued (e.g., temperature readings), or binary with (e.g., encryption on/off).
4.2. Mapping to Trustworthiness Indicators
In this step, the selected metrics
are mapped to unified trustworthiness indicators
bound to the interval [0,1]. To simplify the notation of superscripts and subscripts, e.g.,
is written instead of
. Similarly, for
,
is used instead of
. This normalization is required to account for the individual sensitivity of the metrics and their application-specific importance. For real value metrics, a sigmoid function
with the constant
is used for the mapping (c.f.
Figure 5a). The sigmoid function enables the appropriate mapping
, ensuring that any real-valued input is transformed into a value within the interval [0,1]. Furthermore, the sigmoid function provides a non-zero gradient even in saturated regions, i.e., where
or
. This characteristic is beneficial when the proposed framework is used in the context of trustworthiness management to account for changes in trustworthiness over time. The sensitivity can be adjusted by tuning parameters, such that
marks the transition from not trustworthy to trustworthy at
while
is set to a value representing a reasonable level of trust, i.e.,
. Binary metrics are mapped to 1 if they are considered trustworthy or to 0 otherwise.
4.3. Trustworthiness Index
To obtain a unified trustworthiness index for each attribute (i.e., reliability, resilience, security, and privacy), the trustworthiness indicators must first be combined. Here, trustworthiness is defined by the least trusted component. Therefore, the minimum function is chosen as the evaluation criterion. For
,
The trustworthiness index per attribute is provided by
Note that the corresponding trustworthiness indicators are found through the relations in
Figure 4. Reliability consists of accuracy, timeliness, and service availability. Accuracy links to the threats of hardware or software failure, channel obstruction, active attackers, improper anchor configuration, and not enough anchors. The corresponding metrics (and consequently indicators) are temperature, ML-based anomaly detection, PDoP, and number of anchors. The indicators for timeliness and service availability are found similarly. Most notably, the same metrics can be used for quantification of different attributes.
An overall trustworthiness index is provided by
4.4. Trustworthiness-Enhanced Anchor Selection Scheme
Conventionally, self-localization is performed with all anchors in communication range to the node (here referred to as the
basic approach). However, intermediate results of link level trustworthiness indicators (
4) may be directly used to select only anchors that possess trustworthy links with the node (here referred to as the
sequential approach). This distinction is formalized by the definition of
(c.f.
Section 2.1):
6. Evaluation
The trustworthiness assessment is designed to reflect the system’s operational trustworthiness across various attributes, including reliability, security, privacy, resilience, and safety. This assessment is not tailored to address specific threats; instead, a threat analysis similar to sensitivity analysis is conducted to identify relevant parameters. Ideally, this process encompasses all significant observation parameters that indicate proper system behavior. Consequently, the trustworthiness assessment must be capable of signaling low trustworthiness in the presence of any threat identified in
Section 3 as well as detecting unknown system issues that impact these parameters. In this evaluation, the influence of two specific threats on the trustworthiness assessment is demonstrated, namely, improper anchor configuration and active attackers (c.f.
Section 3). One and the same implementation of the trustworthiness framework was used for both scenarios without any tuning to the specific conditions of each scenario. The machine learning-based anomaly detection indicator was trained using a dataset [
23] comprising range estimates captured in line-of-sight conditions across different environments (an auditorium and a private workshop) than those used in this work. The results are summarized in
Figure 9 and
Figure 10, where trustworthiness indices (
and
I) and trustworthiness indicators (
and
) that are significant for the selected scenarios are depicted. In both scenarios, the assessment methods (c.f.
Section 4.4) basic (colored in blue) and sequential (colored in orange) are compared against each other.
6.1. Improper Anchor Configuration
In this experiment, corresponding to the setup used in
Figure 8a, the node first approaches the borders of the service area covered by a set of four anchors, exceeds them, and then returns to its starting position at a maximum distance of approximately 20 m from the anchors. Initially, the anchors are favorably located, i.e., (
) is low, and the signal strengths (
) are high, resulting in a high reliability index (
) dominated by the number of anchors available (
). As the distance to the anchors increases, the dilution of precision
and signal strength
decrease. After 50 s,
starts to dominate the reliability index, causing
to decline. This decline in trustworthiness corresponds to a loss in accuracy due to the dilution of precision effect. After approximately 75 s, the index reaches the threshold, signaling the transition to an untrustworthy state. As the node moves further away from the anchors, the signal strength
after 100 s also reaches the threshold, i.e., when reduced service availability is anticipated. Breaking links reduce the number of anchors
and cause the system to fail.
With this experiment, the framework’s ability to classify the system’s state as untrustworthy well before a complete loss of localization service occurs is demonstrated. This early detection provides an opportunity to implement countermeasures in a timely manner. Recall that the sequential assessment method differs from the basic method by selecting the subset of anchors with trustworthy link indicators (c.f.
Section 4.4). In this experiment, both assessment methods performed similarly. This is due to the fact that
for all
stayed at a high level as well as
for all
were at similar levels at any point in time.
6.2. Active Attackers
In this scenario, eight anchors are used in a static office environment, positioned at distances ranging from to 4 to the node. A jamming device in proximity of the node is executing an SHR attack on four out of eight anchors, aiming at the reduction of estimated distances, which further yields wrong position estimates. Using the basic method, and are both low due to low values for anchors being subject to jamming. However, is high due to a larger anchor set , also reflected in .
Using the sequential method, in the first step, the trustworthiness of anchor links is evaluated. Based on the subset of trustworthy anchors, in the second step, the location estimate, the remaining trustworthiness indicators and indices are computed. In , this is reflected by maintaining trustworthiness at a level of approximately 0.6, originating from of trusted anchors, i.e., from anchors not subject to jamming. However, by considering a lower number of anchors for the evaluation, is around 0.5, and for some measurements, it is even lower. Despite the lower resilience value, the overall trustworthiness index I indicates that the sequential method can maintain tolerable trustworthiness during the attack on 4 out of 8 anchors.
SensorsThis benefit can also be seen in the accuracy. While the root mean square error in the attack scenario would result in approx. 81 , the basic method classifies all estimates as untrustworthy. The sequential method achieves a root mean square error of 17 with a trustworthiness index . In only 39% of the estimates, it obtains .
6.3. Findings
This subsection summarizes the essential findings from the experimental evaluation.
In both examples, and precisely detect threats to availability, accuracy, and integrity. Because reliability and security are attributes that support safety, this also indicates that the proposed method can detect certain safety threats.
The improved reliability and security of the sequential method in the active attacker use case underlines the potential of using intermediate results from the trustworthiness assessment to increase service performance.
In order to provide a holistic prediction of the system’s proper operation, trustworthiness assessment through carefully selected metrics is essential. Several of these metrics influence multiple attributes, resulting in an interconnected evaluation that advances beyond the isolated analysis of each attribute.
From changes within the trustworthiness indices, it is possible to predict system vulnerabilities before the actual occurrence of failures; c.f.
in
Section 6.1. Hence, trustworthiness has a high potential to be leveraged as an early warning mechanism. Furthermore, this early warning offers the possibility of taking countermeasures to maintain the level of trustworthiness in the system.
7. Conclusions
In this work, a method that systematically links the general definition of trustworthiness to an evidence-based trustworthiness index is proposed. The focus is on UWB self-localization, a critical service in the IoT domain. The threat-driven metric selection approach represents the first holistic assessment of trustworthiness concerning reliability, security, privacy, and resilience. While safety is often seen as an additional attribute, in the context of UWB self-localization its characteristics are considered to be supported by reliability and security.
The proposed method, which connects trustworthiness definitions and attributes to threats, metrics, and trustworthiness indicators and indices, has the potential to serve as a general framework. While future work may extend the threat analysis and metric selection, the proposed approach demonstrates the functional principle. Interestingly, the interconnection of attributes through individual metrics indicates that a holistic evaluation of trustworthiness surpasses the isolated analysis of individual attributes.
Experimental analysis shows that using intermediate trustworthiness indicators can improve service quality. Comparing conventional UWB self-localization with an enhanced method that applies a trustworthiness-based anchor selection scheme reveals clear localization performance improvements without additional costs. Furthermore, while many traditional metrics are model-based or derived from information theory, ML techniques can also significantly contribute to the assessment of trustworthiness.
In conclusion, the presented method proposes a systematic approach for holistic trustworthiness assessment. By leveraging intermediate results and incorporating advanced techniques such as ML-based metrics, substantial improvements in system performance can be achieved, highlighting the potential for future advancements.