Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges

. With the increasing day-to-day acceptance of IOTcomputing, the issues related to it are also getting more attention. The current IOTcomputing infrastructure brings some security challenges concerned with the users/customers and CSP. The users can store their conﬁdential data at IOT storage and can access them anytime when they need. Lack of trust exists among IOT users and between IOTusers and CSP. The prevention of this risk is a big research issue and it needs to be solved. There is a need for trusted IOT computing in recent times to provide trusted services. Here, we propose the integration of TPM in IOT computing to performs cryptographic operations and provide hardware-based security. In this domain, diﬀerent schemes and methods have been proposed to build trust in IOTcomputing, but the suitable solution has not been presented by these schemes because these schemes lack in terms of some security services. A comparative study based on trusted computing schemes has also been presented in this paper along with diﬀerent implementations of critical analysis. Our study is based on an overview of the main issues and summarizing the literature along with their strengths and limitations. In the end, we integrated the trusted platform module in the IOTarchitecture to establish the trust in IOTcomputing and to enhance the cybersecurity challenges and evaluated it with the help of mathematical/algorithms/


Introduction
With the rapid advancement in computing technologies, people who use smart devices can enjoy the ubiquitous facility of advanced technologies. IOT computing is one of the ubiquitous technologies and is defined as a technology, which provides network access to a pool of distributed shared computing resources such as software applications, storage services, and many other services needed by the customers on demand [1]. IOT computing offers the customers scalability and low-cost services and manages data based on the location-independent setup [2]. IOT computing now becomes worldwide in terms of services provided over the Internet and software applications [3].
e users can store their confidential data at IOT storage service and can access them anytime when they need. e IOT infrastructure is different from other distributive systems such as grid computing and cluster systems because the IOT computing environment is heterogeneously constructed and the IOT users belong to different local organizations having different security policies which join or leave the distributed resources dynamically which presents security problems [4]. e IOT computing brings some security challenges faced by customers between the IOT service provider (CSP) and its users. e users of the IOT are confused about their data stored on the IOT storage server that it is either secured or not and there is a chance for an unauthorized user to access it [3]. To prevent or minimize this risk is a big research issue. e IOT users want a system that provides security services such as confidentiality, authentication, integrity, and availability on time between CSP and IOT users or among IOT users. erefore, there is a need for a trusted relationship (based on security services) to provide trusted services among mentioned entities and to build the IOT environment trustable to everyone. e trust is defined as "An entity can be trusted if it always behaves in the expected manner for the intended purpose" [5,6]. e trusted computing is an emerging technology developed and promoted by the trusted computing group (TCG) [7]. TCG consists of a group of industries that develop standards based on trusted computing techniques [8]. TCG implements one of its specifications, that is, a trusted platform module (TPM).
e TPM chip is mounted on a platform motherboard and provides hardware-based security to the user's cryptographic operations. e TPM performs operations such as hardware encryption, signing, machine authentication, secure key storage, and attestation [8]. Encryption and signing are wellknown techniques, but the TPM makes them stronger by storing keys in protected hardware storage [8]. Hardwarebased TPM provides stronger security as compared to software TPM. Private Master Key is used by TPM to provide security for other pieces of information stored in the IOT computing system and TPM also stores hardware certificate to thwart attacks [9]. So TPM offers a root of trust for users in IOT computing because customers have full information about their identity [9]. In this context, different schemes have been presented along with their strength and weakness. TCG Best Practices Committee [10] proposed a hardware-based data location assurance solution (HDLAS) scheme to verify the geolocation of IOT user's data. e two building blocks of HDLAS are TPM and provable data possession (PDP). HDLAS does not need a third-party entity and provides the users with the preference option for data location. e trust has been established on CSP by the proposed scheme. Too many signaling messages and algorithms are involved in the communication process and make the computation lengthy and as a result, the communication among entities is affected. In Trusted Computing Group study [11], a mechanism is introduced to verify the information based on the geographic location of data. Only the attestation of geographic location information of data has been discussed but the integrity of data stored on the data center was not touched. Bare [6] stated the importance of trusted computing group (TCG) in IOT computing security and virtualization. Paladi [12] recommended DFIOT (data firewall IOT) technique for mobile devices to provide security at the client side. e rest of the paper is organized as follows. In Section 2, the architecture of TPM is illustrated along with a diagram. Different papers are reviewed along with their strengths and weakness in Section 3. In Section 4, paper works are critically analyzed. Section 5 presents the methodology of the TPM integration with IOT to establish trust in IOT computing and to enhance the cybersecurity challenges. e paper is concluded and future work has been proposed in Section 6.

Trusted Platform Module (TPM) Architecture
TCG is a group of industries (AMD, Hewlett-Packard, IBM, Intel, and Microsoft) aiming to create standards and specifications [7,8]. TCG recommends the TPM specification in IOT computing to establish trust in the IOT environment.
An international standard provides hardware-based security and is mounted as a chip in computing devices (laptops and desktop computers) and stores passwords, certificates, or encryption keys [8]. TPM guarantees protective computing in all environments such that TPM provides integrity because it measures the platform (computing device) status and ensures that the platform is trustable. TPM provides authentication which guarantees that the platform can prove that it is the intended entity. Attestation is also performed by TPM, which informs the remote party that a process or software on a platform is trustworthy and has not been compromised [13]. TPM chip contains 11 components shown in Figure 1. e detail of each component is beyond the scope of the paper but each was discussed briefly. I/O: it controls the information flow over the communication lines and also performs encoding and decoding of the protocol [14]. Nonvolatile storage: it is a permanent memory used to store the owner authorization and permanent configurations as well as the endorsement key (EK) and storage root key (SRK) (nonmigratable keys) [14]. Platform Configuration Registers (PCRs): it is a 160-bit storage location used for integrity measurements and can be used in either nonvolatile or volatile memory. 16 PCRs are defined by TCG specification [5], 0-7 are kept for use of internal TPM, and 8-15 are used by the operating system and users' applications. Attestation Key Identity (AIK): this portion signs and authenticates the information legitimacy for external attestation purposes. Multiple clients on the same platform are accommodated by AIK, stored in outside data storage in the encrypted form [5,14]. Program code: it is the core root of trust and contains firmware which is used to measure the devices of the platform [5,14]. Execution engine: it depends on program code and performs execution as directed by the logic of program code [5]. Opt-in: it controls and maintains the states of the TPM chip by enabling activation and deactivation [5]. RSA engine: it uses the RSA algorithm and performs asymmetric encryption/ decryption and signing operations [5]. Key generation: it uses protocol [15] based on the RSA algorithm to generate asymmetric encryption keys. SHA-1 engine: it is used to generate a hash which helps in digital signature creation [5]. Random Number Generator (RNG): it helps in key generation and nonce creation and makes stronger pass expression entropy [5].

Literature Review
TCG Best Practices Committee [10] proposed a hardwarebased data location assurance solution (HDLAS) scheme to verify the geolocation of IOT user's data. e two building blocks of HDLAS are TPM and provable data possession (PDP). HDLAS scheme consists of three phases. TPM is a TCG security specification and has the ability to measure integrity and attest the remote party in IOT infrastructure. In HDLAS, TPM works along with a GPS receiver. PDP is a scheme used between client and server based on cryptographic operations. So due to this, IOT users are able to 2 Complexity obtain the correct information about the geolocation of their data stored in the storage server. e HDLAS can be applied to the existing system, that is, the Microsoft Azure; the existing provider of IOT storage used the proposed scheme. e attack model has also been discussed with regard to the IOT storage provider. HDLAS does not need a third-party entity and provides the users with the preference option for data location. e trust has been established on CSP by the proposed scheme. e proposed work is based on the comparative study of different previous techniques. But too many signaling messages and algorithms are involved in the communication process and make the computation lengthy and as a result, the communication among entities is affected. e simulation results have not been shown and discussed. e security services have not been analyzed on which trust is based. In V. et al.'s study [11], a mechanism is introduced to verify the information based on the geographic location of data. e technique is based on TPM and is used to attest location information of data remotely. Verifier, request processor, verification module, GPS device, and reply aggregator are the main entities of CSP and IOT environment used by the proposed approach. e third party has also been involved. During installation of TPM and GPS device, the TPM is set with coordinates of location according to the GPS device. When there is a need for attestation, the coordinates of location stored in TPM have been matched with location coordinates received from GPS at exact time. e attested information (based on matched/ unmatched) is then forwarded to the verifier through different entities. e proposed work is carried out through the comparative study of different techniques. e security issues in relation to some security services have been mentioned. Only the attestation of geographic location information of data has been discussed but the integrity of data stored on data center was not touched. So due to this, there are threats to the integrity of stored data. Prototype is not given as whole work which is carried out descriptively. e simulation results have not been shown and discussed. Devi et al. [16] addressed the security of cloud computing infrastructure (CCI). CCI is based on virtualization. Authors recommend the extension to IOT computing that makes it trustable and suggest the use of TPM in virtualized environment to provide protection to key storage and integrity. Existing approaches and techniques such as virtualized hardware TPM, virtualized software TPM, para virtualization of TPM, and property-based virtualization of TPM have been analyzed by the authors. e softwarebased virtualized TPM offers interface to the hardwarebased v-TPM and implementation of various operations is normally carried out by software-based v-TPM. e hardware-based v-TPM provides more security than software-based v-TPM. e para virtualization technique is achieved through hardware v-TPM and one hardware v-TPM is shared among some virtual machines. e property-based technique of virtualization of TPM provides updates of software and support migration of virtual machine. Some important and key research areas such as protocol for migration of virtual machine to v-TPM and attestation based on property-based technique have been discussed. e virtualization of TPM can reduce the cost. Every technique of v-TPM has been described along with their strengths and weak points. Only the structure and use of virtualized TPM have been discussed but how it is implemented has not been discussed. e security measures/services such as authentication, authorization, and confidentiality have not been clearly described. Bare [6] stated the importance of trusted computing group (TCG) in IOT computing security and virtualization. TCG provides standards, that is, IPM using trusted computing techniques for PC, laptop, mobile phones, storage, and networking security. TCG is used to address IOT security. TPM provides hardware-based security and is considered root of trust. Security features such as attestation, access control, measurements, logging, and reporting are provided by TPM. Credentials such as validation, endorsement, conformance, and platform identity, exchange of secure messages with TPM, and management of key are defined by TCG and used to establish trust chain. e authors analyze some approaches and techniques based on  Complexity 3 TPM in IOT computing and virtualization along with functionalities of TPM, which are used to provide trust in IOT computing infrastructure and in virtualization. According to authors, these approaches and techniques do not present the required solution (i.e., to establish trust between IOT users and IOT service provider) and need fresh research work which extends or improves the specifications of TCG and secure IOT computing infrastructure and virtualization. Some future research work areas are pointed out with respect to TCG specifications in IOT computing security and virtualization. ere is no new technique which has been discussed by the authors. is work is only based on analysis. No validation of the work is given; just the solution is descriptively given. Paladi [12] have analyzed the current existing technique for services of IOT storage such as Dropbox, which provides security at the server side based on encryption. It is still unsecure, because it does not provide encryption at client side, integrity of client platform attestation, and management of key based on hardware. In this paper, DFIOT (data firewall IOT) technique for mobile devices has been presented. is technique is used to provide security to the services of IOT storage and control the access to data in IOT storage. e problems (such as loss of data, data modification, and data leakage) found in Dropbox have been addressed by DFIOT. Proposed technique controls the data leakage at the server side by using encryption at the client side. DFIOT deploys TPM in mobile devices which provide management of keys. TPM also defines a protocol which shares or distributes keys among clients (users). e clients have mobile devices using ARM (advanced RISC machines) trust zone technology which manages keys based on hardware. Remote attestation is carried out by DFIOT to protect the leakage of data from malicious software at each client side. Softwarebased TPM (TPM emulator) has been used which provides less security as compared to hardware-based TPM. Full proof security and trust based on security services (authentication, access control, availability, and confidentiality) have also not been considered. TC Group [17] have analyzed the threats and security issues in IOT computing infrastructure (CCI). e CCI consists of some virtual machines (VMs) and uses virtualization technology. Virtualization is a technique by which one or more VMs are allocated to each client. e virtual machine monitor (VMM) also known as hypervisor is software based on kernel, which controls and manages the VMs. According to the authors, there are threats of attacks to security of VMM. e attacks are possible from inside and outside environment and therefore suggest some techniques and tools used to secure and protect the virtual IOT computing infrastructure (VCCI) from attacks. e tools and techniques are intrusion detection tools, virtual trusted platform module, virtual firewalls, encryption and management of keys, mechanisms used for access control, and trusted virtual domains (TVDs). e protection of VCCI is possible if the mentioned techniques and tools are carried out completely. e work of this paper addressed very important critical security issues in current VCCI and also explored future research areas which belong to security issues from working and governance point of view in IOT computing. All of the suggestions have been discussed conceptually but their validation results have not been discussed and have not been shown. Rivest et al. [18] have analyzed problem in virtual infrastructure due to the provisioning based on dynamic management of security. Dynamic infrastructure trusted bootstrapping protocol (DITBP) has been introduced to make trust between two machines. e DITBP is designed to improve advanced architecture such as the Dynamic Access Control Infrastructure (DACI). e proposed approach consists of those mechanisms and infrastructure that is based on TCG and TCG provides TPM. TPM provides hardware security and root of trust. TPM generates pair keys and handles exchange of keys. TCP (transmission control protocol) and TLS (transport layer security) are utilized by DITBP for communication between nodes. e process of DITBP is event driven, that is, consisting of request and response. e components involved in the bootstrapping process which are domain authentication server (DAS) produce trust for proxy type domain, bootstrap initiator (BI) is an application that makes sure of the position of the remote machine when it is transferred, bootstrap requester (BREQ) is an client type application used to provision infrastructure and executes on the remote machine, and bootstrap responder (BRES) is a server type application used to authenticate the machine to a distant client machine and allows the client to bootstrap the machine. e proposed technique is based on the comparative study of different frameworks and provides foundation of future research work for those who want to do more work in security of dynamic establishment infrastructure through trusted bootstrapping protocol. But the proposed work still missed some requirements for implementation, that is, does not show simulation results. e DITBP does not explain the security services on which TPM is based.
Noman and Adams [19] analyzed the need of establishing trust in the virtualized IOT platform. An approach based on a trusted service domain (TSD) has been proposed to establish trust on the virtualization platform of IOT. TSD is considered the root of trust for the IOT virtualization environment. TSD is based on TPM, which provides hardware security and generates keys. Extended trusted chain for TSD security and TSD is associated with TPM based on the generation of keys to control user domains or virtual machines (VMs). TSD offers trusted services to multiple user domains based on independent functional domain specifically. e scheme based on TSD has been presented to protect data and make safe communication among domains. e migration of user domains based on TSD is also presented. e proposed mechanism is based on the comparative study of previous models, that is, private virtual infrastructure (PVI), trusted virtual environment module (TVEM), and so on. e communication among TSD, Admin Dom, and user Dom has clearly been discussed and achieved some good results as compared to existing schemes. TSD provides flexibility and scalability. Future research areas have been mentioned by the proposed work. In the proposed work, the established trust in the virtualized 4 Complexity IOT platform has not been explained clearly.
e functionalities of TSD and TPM are the same; then why does TPM use directly instead of TSD? e architecture is composed of too many components, that is, TPM, VMM, Admin doom, and TSD, and user domains can affect the performance of IOT platform services. e security services have not been explained. In Vaish et al.'s study [20], the technology that is trusted in the IOT computing environment is recommended. e technology is provided by TCG (trusted computing group), that is, the trusted computing platform (TCP) making the system, that is, data and applications, cryptographically secure. e TCP is based on trusted platform support services (TSS) and TSS is a part of TCP. TSS in turn depends upon the trusted platform module (TPM) and provides hardware-based security. e TSS acts as a bridge between upper layer applications and lower layer hardware. TPM can contact TSS and provide security services (authentication and access control) via TSS. TPM chip is mounted on the motherboard of a PC for the purpose of authenticating hardware and offers the trusted information about the internal state of the system. e encryption keys, certificates, and passwords which help in maintaining data privacy are stored by TPM. It also protects unencrypted keys from software-based attack. e strength of the work is that trusted computing technology specifications are deployed in IOT computing environment. Security provided by hardware (TPM) is stronger than security provided by software. e proposed strategy explained security services such as access control, protection of data, and authentication. e authors just discussed the work conceptually but how it is implemented has not been shown. Simulation results have not been given and analyzed. Wan et al. [21] have analyzed the platform and virtualization of IOT computing, reference model related to security of IOT computing, TPM, trusted network access, and architecture of network platform that is trusted. For trusted network platform architecture, TNA (trusted network access) and TPM are necessary. TPM is installed on both IOT client terminal and IOT server systems to produce trusted relations between the IOT client and IOT server. Clients trusts in server and server trusts in clients. Due to this, the services belonging to IOT will be offered to clients by server. e architecture of trusted IOT client terminal system and trusted IOT server is also explained. TPM is arranged in IOT client terminal system to confirm the identity of IOT server. Similarly, the TPM is used in IOT server to prove the identity of IOT client terminal. e trusted network platform approach protects the clients of IOT and its relevant services and provides system of measurement. It also offers the trustworthiness of identity between server and client. e given approach based on TPM allows TNA make the IOT computing environment secure. e proposed approach not only provides security between client and server but also provides the security service such as integrity of IOT service. e given work is too short and not enough to understand. Security services such as authentication, confidentiality, access control, nonrepudiation, and its mechanisms have not been discussed. e effects on IOT client system and IOT server have not been discussed. Achemlal et al. [22] analyzed the challenges (such as scalability of platform, software up gradation and licensing, recovery, availability, accessibility, and system security) faced to CSP and on the basis of these challenges, efficient and secure educational platform (ESEP) has been proposed. ESEP is mainly based on security of data stored on IOT. Some security techniques and tools such as TPM, v-TPM, trusted virtual domain (TVD), intrusion detection system (IDS), and security as a service (SE-CaaS) have been recommended by author. e authors claim that when a user signs SLA (service level agreement) with CSP, then this user becomes trusted user such as Microsoft Live@edu. HRMS, LMS, and untrusted users are general public registered users who use CSP online. e layer based on virtualization has also been secured using mention techniques and tools. e physical layer is secured by TPM trusted execution technology (TXT). e security as a service is achieved through software that is bit locker enabled by TPM to protect data storage through cryptographic operations. e authors discussed reason of lack of confidence on CSP by educational organizations. ESEP is based on all in one. But ESEP has been discussed conceptually; that is, no prototype has been given in the proposed work. Simulation results have not been given upon discussion and analysis is based on the simulation but results are not given. e full proof security and trust based on security services have also not been analyzed. Shin et al. [23] proposed an approach used to establish trust in IOTcomputing environment by integrating trusted computing platform (TCP). e TCP based on TPM and TPM on behalf of TCP provides some security services such as confidentiality, integrity, and authentication in IOT computing infrastructure. e proposed approach uses stream cipher algorithm; that is, RC4 (R. Cipher-4) offers the mentioned security services. RC4 algorithm is comprised of two parts such as key scheduling algorithm (KSA) and pseudorandom generator algorithm (PRGA) and encryption/decryption process is carried out in two phases. RC4 algorithm performs the encryption of data in a very short interval of time, that is, in nanoseconds, due to which, computation time is reduced and better performance is achieved. e proposed approach is based on security services. On the other hand, the encryption process which takes short time, that is, nanoseconds, can affect the security of the IOT computing system. e encryption process time is directly proportional to the size of the data. Brohi et al. [24] highlighted the problem faced currently by mobile nodes when verifying or updating their data on the IOT storage server at the same time. e provable data possession (PDP) is the existing scheme used by mobile node in IOT environment. e mobile nodes are resource constrained, that is, low in processing and small in storage, and therefore cannot support computation workload and burden of storage services in IOT environment. e author recommends the use of TCG specification such as TPM and modifies the PDP scheme, in which trusted-third-party agent (TPA) has been introduced. e TPA performs most of the computations of end user (mobile device) on behalf of the end user/mobile node. First of all, end user and TPA authenticate each other and build a secure path. en Daffier-Hellman protocol is used to exchange symmetric keys between end user and TPA Complexity Hardware-based data location assurance solution (HDLAS) scheme using TPM and PDP To enable the IOT users to verify the geographic location of their data stored in any data center accurately HDLAS can be applied to the existing system and does not need a third party Too many signaling messages and algorithms still are involved in the communication process [11] TPM-based scheme for remote attestation To allow the clients of IOT computing to verify the information based on the geographic location of their data stored in any data center accurately Simple architecture to learn and take care of regulatory concerns for the IOT computing environment Still exist threats to the integrity of data. Proposed work is carried out conceptually; that is, simulation results have not been shown and analyzed [16] Use of TPM virtualization in IOT computing To secure and establish trust in the IOT computing environment by using the virtualization of TPM To provide security at the server and client side and security to the services of IOT storage and control the access to data in IOT storage Remote attestation protects the leakage of data from malicious software at each client side Software-based TPM (TPM emulator) provides less security as compared to hardware-based TPM and full proof security is based on security services [17] Tools and techniques to secure virtual IOT computing infrastructure (VCCI) To make the security of VMMs strong and protect them from inside or outside attackers in VCCI Pick up an immensely important security issue in current VCCI and explore future research areas from a working and governance point of view CCI security is not only limited to virtualization. ere are other layers that need security. Proposed work needs to be simulated on the basis of security services [18] Light-weight trusted scheme, that is, dynamic infrastructure trusted bootstrapping protocol (DITBP) based on TPM To establish trust between two machines in the IOT computing infrastructure Integrate many solutions in one infrastructure which provides better effects. Provide the foundation of future research areas Trust is also necessary between IOT users and CSP. Proposed work needs to be simulated and analyzed on the basis of security services [19] Scheme based on trusted service domain (TSD).
To deliver services for multiple user domains that are trusted on the virtualization platform of the IOT environment.
Have good results as compared to existing schemes, that is, in terms of flexibility and scalability. Mentioned future research areas.
Functionalities of TSD and TPM are the same; then why does TPM use directly instead of TSD. [20] Trusted computing platform (TCP) using trusted platform support services (TSS) based on TPM To make the system, that is, data and applications, cryptographically secure and provide hardware-based security Make the CSP trustable to clients. Security provided by hardware TPM is stronger than the security provided by software TPM Proposed work needs to be simulated and analyzed on the basis of security services for IOT computing infrastructure [21] IOT computing security scheme, that is, trusted network platform architecture based on virtualization To produce trusted relations between the IOT client and IOT server and also ensure the integrity of IOT services Establish trust between server and client. Provide the security service such as integrity of IOT service Given work is too short and not enough to understand. Proposed work needs to be simulated and analyzed on the basis of security services for the IOT computing environment [22] Efficient and secure educational platform (ESEP) scheme To make CSP trustable to educational organizations by providing features such as scalability, flexibility, security, availability, recovery, software on demand, and omnipresent accessibility of IOT computing Bit-locker software enabled by TPM provides better security as compared to others. Explore many key research areas of IOT computing. ESEP is based on all in one e prototype of ESEP is not given. It is difficult to implement ESEP because it works on more than one feature.
Proposed work needs to be simulated and analyzed on the basis of security services 6 Complexity and encrypt data files. Merle hash tree (MHT) is used to show the integrity of the data blocks and update data dynamically. Bilinear map is a signature work together with MHT to minimize the computation workload at mobile node and storage services of data at IOT server. With the integration of trusted computing technology, the TPM chip is mounted at client mobile node to generate and store secrete keys and random numbers to avoid man in middle attack. e file transferred from TPA to CSP is encrypted and is not known by CSP. Whole work is based on the comparative study of the existing and previous schemes. Due to TPM chip, TPA verifies the accurateness, integrity, and privacy of data and minimizes the burden of processing workload and storage services on client/mobile device. e proposed scheme is as simple as three entities which are involved such as mobile node, TPA, and CSP. e three main security services such as privacy, integrity, and authentication are carried out. But one security service is left, that is, availability. Prototype of the proposed system is necessary to show that the performance of the scheme has not been discussed. Membrey et al. and Chang et al. [25,26] addressed the requirements of security for IOT computing systems. e requirements are based on trusted computing in IOT computing. In this paper, a method to establish trust in IOT computing environment through the integration of trusted computing platform (TCP) which is based on TPM is presented. TPM is considered as root of trust of users. e proposed method is based on four main mechanisms. With TCP, everyone who wants to access IOT computing systems must be authenticated. With TCP, unauthorized access to IOT computing services and resources is impossible and protected [27][28][29][30]. With TCP, the security of data is also improved because session keys and random numbers are created. TPM generates encryption key and session key due to which, the data stored in computer are encrypted. With TCP, the IOT computing systems can trace the users' origin through a mechanism based on user personal key which proves the user identity and the mechanism is kept in hardware such as TPM and BIOS. If security services such as confidentiality, integrity, and authentication are achieved correctly, this can build trust up to some extent in IOT computing environment. e security service, that is, availability, is also very important and has not been discussed. e proposed method has not been implemented or validated because prototype of the proposed approach is not given and simulation results are not given often analysis is based on simulation and not given in literature by the authors [29,30].

Critical Evaluation
In Table 1, we critically evaluate the techniques used and the platform of installation with its respective pros and cons.

Methodology
We evaluate our scheme with the help of mathematical algorithms and logical diagram as shown as follows. In Algorithm 1, we elaborated the integration of trusted platform computing in IOT architecture in a stepwise manner.

Logical Diagram.
With the help of graph theory, we evaluated the integration of TPM with IOT architecture to Integration of a trusted computing platform (TCP) in the IOT computing environment To establish trust by integrating a trusted computing platform in the IOT computing environment to provide security services such as confidentiality, integrity, and authentication Encryption of data is performed in a very short interval of time, that is, nanoseconds, due to which, computation time is reduced and better performance is achieved. Security services is carried out by the RC4 e encryption process takes short time, that is, nanoseconds, which can affect the security of the IOT computing system. e encryption process time is directly proportional to the size of the data [24] Provable data possession scheme together with trusted computing technology for mobile nodes in IOT computing environment To allow the resourceconstrained devices such as mobile nodes to use the services of IOT computing without any trouble and reduce the workload on mobile nodes by using TPM chip mounted on client mobile node e workload is minimized by TPM. Clients can verify and update data unlimitedly at the same time. TPM chip avoids man in the middle attack. CSP cannot understand client data One security service is left, that is, availability. e prototype of the proposed system is necessary to show the performance of the scheme which has not been discussed [25] Integration of trusted computing with IOT computing environment To build trust by integrating a trusted computing platform with an IOT computing environment to provide security services such as confidentiality, integrity, and authentication Security services such as confidentiality, integrity, and authentication can build trust up to some extent in the IOT computing environment. e origin of the users can also be traced Availability is also very important which has not been discussed. e proposed method has not been validated and implemented because the prototype of the proposed approach along with simulation results is not discussed enhance the trust and counter cybersecurity challenges as shown in Figure 2.

Mathematical Analysis of the Scheme.
After evaluating by algorithms and logical diagram, the result of TPM integration in IOT architecture is analyzed with the help of matrices. e right diagonal shows that if there is a security lapse, then the right diagonal elements will become off as shown in Figure 3. Else if the diagonal elements are not off, then it will successfully integrate the trusted platform module in the IOT architecture.

Conclusions and Future Work
IOT computing technology is one of the ubiquitous technologies which provides network access to a pool of distributed shared computing resources such as software applications, storage services, and many other services along with scalability and low-cost services and manages data without location limits independently. e IOT computing brings some security challenges faced by customers between IOT service provider (CSP) and its users and among users and this is the lack of trust on CSP. Here, we suggest the use of TPM in IOT computing systems to make it trustable. All operations such as hardware encryption, signing, machine authentication, secure key storage, and attestation are performed by TPM. In this paper, in this context, different techniques and methods concerned with the integration of TCG specification (TPM) in IOT computing to provide trusted IOT computing are studied but the suitable solution has not been presented because these techniques have deficiencies in terms of security services (confidentiality, integrity, authentication, and availability). Trust among IOT users and trust between IOT users and CSP are the main focus of this study. e schemes and techniques based on trusted IOT computing are comparatively studied; one approach offers authentication and integrity but leaves confidentiality and availability; others do the reverse of this. Some different emerging research areas in the field of trusted IOT computing are presented by this research. e next work is based on the integration and improvement of TCG security standard (TPM) in IOT computing to achieve security services as mentioned because trusted computing is based on security services. e review of different schemes based on trusted IOT computing has not presented the appropriate solution, so we are going to plan the technique to provide the optimized solution in comparison with the present state of the art techniques.
Data Availability e data supporting the findings of this study are available within the article.

Conflicts of Interest
e authors declare that they have no conflicts of interest to report regarding the present study.