DOI QR코드

DOI QR Code

A Robust and Adaptive Trust Management System for Guaranteeing the Availability in the Internet of Things Environments

  • Wu, Xu (School of Computer, Electronics and Information, Guangxi University)
  • Received : 2017.09.21
  • Accepted : 2017.12.23
  • Published : 2018.05.31

Abstract

Trust management is one of the most challenging issues for the highly heterogeneous Internet of Things (IoT). In the context of the IoT, it is difficult to evaluate the node's trustworthiness in the same trust model when a node provides different services. Guaranteeing the availability of the trust management service is another significant challenge because of the dynamic nature of IoT environments. With these issues in mind, this paper propose a robust and adaptive trust management system for the IoT that is able to measure the trustworthiness of nodes based on feedbacks collected from participants in a specific context and ensure the availability of trust management services. The main contributions of our system are: 1) Proposing a partly decentralized trust management framework, which improves the resiliency of the trust mechanism; 2) Proposing an adaptive trust evaluation scheme and a three-dimensional context representation makes trust evaluation more accurate and specific; 3) Enhancing the adaptive trust evaluation scheme by incorporating a bad behavior factor in trust estimation, which efficiently distinguishes misleading feedbacks from On-Off attacks. Simulation results show the good performance of the proposed system and especially show effectiveness against On-Off attacks compared to other trust mechanisms.

Keywords

References

  1. W. Abdelghani, C.A. Zayani, and I. Amous,F. Sedes, "Trust management in social Internet of Things: A Survey, " in Proc. of 15th IFIP Conference on e-Business, e-Services and e-Society, pp. 1-12, 2016.
  2. N.B. Truong, G.M. Lee, "A reputation and knowledge based trust service platform for trustworthy social Internet of Things," in Proc. of 19th International Conference on Innovations in Clouds, Internet and Networks, pp. 104-111, 2016.
  3. L. Atzori, A. Iera, G. Morabito, and M. Nitti, "The Social Internet of Things (SIoT) -When social networks meet the Internet of Things: Concept, architecture and network characterization," Computer Networks, vol. 56, no. 16, pp. 3594-3608, November, 2012. https://doi.org/10.1016/j.comnet.2012.07.010
  4. Ray, B.R., Abawajy, J., Chowdhury, M., "Scalable RFID security framework and protocol supporting Internet of Things," Computer Networks, vol. 67, no. 10, pp. 89-103, 2014. https://doi.org/10.1016/j.comnet.2014.03.023
  5. C. V. L. Mendoza, J.H..Kleinschmidt, "Mitigating on-off attacks in the Internet of Things using a distributed trust management scheme," International Journal of Distributed Sensor Networks, vol. 11, no. 11, pp. 1-8, 2015.
  6. Z. Yan, P. Zhang, and A. V. Vasilakos, "A survey on trust management for Internet of Things," Journal of Network and Computer Applications, vol. 42, pp. 120-134, 2014. https://doi.org/10.1016/j.jnca.2014.01.014
  7. Guo, J., Chen, R., "A classification of trust computation models for service-oriented internet of things systems," in Proc. of 2015 IEEE International Conference on Services Computing (SCC), pp. 324-331, 2015.
  8. Xiao, H., Sidhu, N., Christianson, B, "Guarantor and reputation based trust model for social internet of things," in Proc. of International Wireless Communications and Mobile Computing Conference, pp. 600-605, 2015.
  9. M. D. Alshehri, F. K. Hussain, "A comparative analysis of scalable and context-aware trust management approaches for Internet of Things," in Proc. of 22nd International Conference on Neural Information Processing, pp. 596-605, 2015.
  10. F. Bao and I.-R. Chen, "Dynamic trust management for internet of things applications," in Proc. of 1st International Workshop on Self-Aware Internet of Things, pp. 1-6, 2012.
  11. F. Bao and I.-R. Chen, "Trust management for the internet of things and its application to service composition," in Proc. of 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp.1-6, 2012.
  12. N. Labraoui, M. Gueroui, and L. Sekhri, "On-off attacks mitigation against trust systems in wireless sensor networks," in Proc. of 5th IFIP International Conference on Computer Science and Its Applications, vol. 456, pp. 406-415, 2015.
  13. Y. Chae, L. C. DiPippo, and Y. L. Sun, "Trust management for defending on-off attacks," IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 4, pp. 1178-1191, 2015. https://doi.org/10.1109/TPDS.2014.2317719
  14. Y. B. Saied, A. Olivereau, D.Zeghlache and M. Laurent, "Trust management system design for the Internet of Things: A context-aware and multiservice Approach," Computers & Security, Volume 39, Part B, pp.351-365, 2013. https://doi.org/10.1016/j.cose.2013.09.001
  15. I.R. Chen, F. Bao, and J.Guo, "Trust-based service management for social Internet of Things Systems," IEEE Transactions on Dependable and Secure Computing, vol.13, pp. 684-696, 2016. https://doi.org/10.1109/TDSC.2015.2420552
  16. F. Ishmanov, S. W. Kim and S. Y. Nam, "A robust trust establishment scheme for Wireless Sensor Networks," Sensors,vol.15, pp. 7040-7061, 2015. https://doi.org/10.3390/s150307040
  17. M. Jo, V. Odelu, A.K. Das and K.K.R. Choo, "Expressive CP-ABE scheme for mobile devices in IoT satisfying Constant-size Keys and Ciphertexts," IEEE Access, Vol.5, No.1, pp.3273-3283, 2017. https://doi.org/10.1109/ACCESS.2017.2669940
  18. S. Roy, S. Chatterjee, A.K. Das, S. Chattopadhyay and S. Kumari, "Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things," IEEE Internet of Things Journal, 2017.
  19. M.Wazid, A.K. Das, M.K. Khan, A.D. Al-Ghaiheb, N. Kumar, "Secure authentication scheme for medicine anti-counterfeiting system in IoT environment," IEEE Internet of Things Journal, Vol. 4, No. 5, pp. 1634-1646, 2017. https://doi.org/10.1109/JIOT.2017.2706752
  20. S. Challa, M.Wazid, A.K. Das, N. Kumar, A.G. Reddy, "Secure signature-based authenticated key establishment scheme for future IoT applications," IEEE Access, Vol. 5, pp. 3028-3043, 2017. https://doi.org/10.1109/ACCESS.2017.2676119
  21. S. Kumari, M. Karuppiah, A.K. Das, X. Li, F. Wu, "A secure authentication scheme based on elliptic curve cryptography for IoT andcloud servers," The Journal of Supercomputing, 2017.
  22. ns3. Available from: Article (CrossRef Link)