Skip to main content
Erschienen in: Soft Computing 8/2020

30.08.2019 | Focus

A dynamic trust model in internet of things

verfasst von: Eric Ke Wang, Chien-Ming Chen, Dongning Zhao, Wai Hung Ip, Kai Leung Yung

Erschienen in: Soft Computing | Ausgabe 8/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Indicating trust or distrust of a node is a key issue in the trust management of IoT. However, there are some challenges for the management with anonymous nodes, inaccurate communication, etc. Due to huge number of nodes in IoT, one of the possible solutions is predicting trust and distrust values. In this paper, we propose a dynamic trust model based on direct and indirect trust computation, and the most important part of a model, trust prediction. The prediction method mainly depends on the combination of exponential smoothing and a Markov chain. We employ exponential smoothing to predict trustiness and a Markov chain to fix the deviation of the prediction. To test our scheme, we create a simulation to evaluate its performance and effectiveness. The simulation results are encouraging.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ben Saied Y, Olivereau A, Zeghlache D et al (2013) Trust management system design for the internet of things: a context-aware and multi-service approach. Comput Secur 39:351–365CrossRef Ben Saied Y, Olivereau A, Zeghlache D et al (2013) Trust management system design for the internet of things: a context-aware and multi-service approach. Comput Secur 39:351–365CrossRef
Zurück zum Zitat Beth T, Borcherding M, Klein B (1994) Valuation of trust in open networks. In: Proceedings of the European symposium on research in computer security (ESORICS) 1994, Brighton, UK, LNCS 875, pp 3–18 Beth T, Borcherding M, Klein B (1994) Valuation of trust in open networks. In: Proceedings of the European symposium on research in computer security (ESORICS) 1994, Brighton, UK, LNCS 875, pp 3–18
Zurück zum Zitat Caverlee J et al (2010) SocialTrust++: building community-based trust in Social Information Systems. In: 2010 6th international conference on collaborative computing: networking, applications and worksharing (CollaborateCom), Chicago, USA Caverlee J et al (2010) SocialTrust++: building community-based trust in Social Information Systems. In: 2010 6th international conference on collaborative computing: networking, applications and worksharing (CollaborateCom), Chicago, USA
Zurück zum Zitat Caverlee J, Liu L, Webb S (2008) Socialtrust: tamper-resilient trust establishment in online communities. In: Proceedings of the 8th ACM/IEEE-CS joint conference on digital libraries. ACM, pp 104–114 Caverlee J, Liu L, Webb S (2008) Socialtrust: tamper-resilient trust establishment in online communities. In: Proceedings of the 8th ACM/IEEE-CS joint conference on digital libraries. ACM, pp 104–114
Zurück zum Zitat Chen CM, Xiang B et al (2019) A secure authentication protocol for internet of vehicles. IEEE Access Chen CM, Xiang B et al (2019) A secure authentication protocol for internet of vehicles. IEEE Access
Zurück zum Zitat Chen D, Chang G, Sun D et al (2011) TRM-IoT: a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(4):1207–1228CrossRef Chen D, Chang G, Sun D et al (2011) TRM-IoT: a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(4):1207–1228CrossRef
Zurück zum Zitat Chen CM, Wang KH et al (2019) Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J Ambient Intell Hum Comput 10(8):3133–3142CrossRef Chen CM, Wang KH et al (2019) Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J Ambient Intell Hum Comput 10(8):3133–3142CrossRef
Zurück zum Zitat Hu JL, Wu QY, Zhou B, Liu JH (2009) Robust feedback credibility-based distributed P2P trust model. J Softw 20(10):2885–2898CrossRef Hu JL, Wu QY, Zhou B, Liu JH (2009) Robust feedback credibility-based distributed P2P trust model. J Softw 20(10):2885–2898CrossRef
Zurück zum Zitat Jøsang A, Haller J (2007) Dirichlet reputation systems. In: The second international conference on availability, reliability and security, ARES 2007. IEEE, pp 112–119 Jøsang A, Haller J (2007) Dirichlet reputation systems. In: The second international conference on availability, reliability and security, ARES 2007. IEEE, pp 112–119
Zurück zum Zitat Kalkan K, Zeadally S (2017) Securing internet of things (IoT) with software defined networking (SDN). IEEE Commun Mag 2017:1–7 Kalkan K, Zeadally S (2017) Securing internet of things (IoT) with software defined networking (SDN). IEEE Commun Mag 2017:1–7
Zurück zum Zitat Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web (WWW’03). ACM, New York, USA, pp 640–651 Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web (WWW’03). ACM, New York, USA, pp 640–651
Zurück zum Zitat Li X, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857CrossRef Li X, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857CrossRef
Zurück zum Zitat Li F, Wu J, Srinivasan A (2009) Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets. In: INFOCOM 2009, IEEE. IEEE Li F, Wu J, Srinivasan A (2009) Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets. In: INFOCOM 2009, IEEE. IEEE
Zurück zum Zitat Liu Y, Wang K (2010) Trust control in heterogeneous networks for internet of things. In: 2010 International conference on computer application and system modeling (ICCASM 2010) Liu Y, Wang K (2010) Trust control in heterogeneous networks for internet of things. In: 2010 International conference on computer application and system modeling (ICCASM 2010)
Zurück zum Zitat Mahalle PN, Thakre PA, Prasad NR et al. (2013) A fuzzy approach to trust based access control in internet of things. In: Wireless communications, n a context-aware and multi-service trust management system vehicular technology, information theory and aerospace & electronic systems (VITAE). IEEE, pp 1–5 Mahalle PN, Thakre PA, Prasad NR et al. (2013) A fuzzy approach to trust based access control in internet of things. In: Wireless communications, n a context-aware and multi-service trust management system vehicular technology, information theory and aerospace & electronic systems (VITAE). IEEE, pp 1–5
Zurück zum Zitat Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26:1253–1266CrossRef Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26:1253–1266CrossRef
Zurück zum Zitat Tian CQ, Zou SH, Tian HR, Wang WD, Cheng SD (2007) A new trust model based on reputation and risk evaluation for P2P networks. J Electron Inf Technol 29(7) Tian CQ, Zou SH, Tian HR, Wang WD, Cheng SD (2007) A new trust model based on reputation and risk evaluation for P2P networks. J Electron Inf Technol 29(7)
Zurück zum Zitat Tiburski RT et al (2019) Lightweight security architecture based on embedded virtualization and trust mechanisms for IoT edge devices. IEEE Commun Mag 57(2):67–73CrossRef Tiburski RT et al (2019) Lightweight security architecture based on embedded virtualization and trust mechanisms for IoT edge devices. IEEE Commun Mag 57(2):67–73CrossRef
Zurück zum Zitat Venkatraman M, Yu B, Singh MP (2000) Trust and reputation management in a small-world network. In: Proceedings of the fourth international conference on multiagent systems, 2000. IEEE, pp 449–450 Venkatraman M, Yu B, Singh MP (2000) Trust and reputation management in a small-world network. In: Proceedings of the fourth international conference on multiagent systems, 2000. IEEE, pp 449–450
Zurück zum Zitat Wang EK, Li Y, Ye YM, Yiu S-M, Hui LCK (2018) A dynamic trust framework for opportunistic mobile social networks. IEEE Trans Netw Serv Manag 15(1):319–329CrossRef Wang EK, Li Y, Ye YM, Yiu S-M, Hui LCK (2018) A dynamic trust framework for opportunistic mobile social networks. IEEE Trans Netw Serv Manag 15(1):319–329CrossRef
Zurück zum Zitat Weizhi M (2018) intrusion detection in the era of IoT: building trust via traffic filtering and sampling. Computer 51(7):36–43CrossRef Weizhi M (2018) intrusion detection in the era of IoT: building trust via traffic filtering and sampling. Computer 51(7):36–43CrossRef
Zurück zum Zitat Yahalom R, Klein B, Beth T (1994) Trust-based navigation in distributed systems. Comput Syst 7(1):45–73 Yahalom R, Klein B, Beth T (1994) Trust-based navigation in distributed systems. Comput Syst 7(1):45–73
Zurück zum Zitat Yu B, Singh MP (2000) A social mechanism of reputation management in electronic communities. In: Cooperative information agents IV—the future of information agents in cyberspace. Springer, Berlin, Heidelberg, pp 154–165 Yu B, Singh MP (2000) A social mechanism of reputation management in electronic communities. In: Cooperative information agents IV—the future of information agents in cyberspace. Springer, Berlin, Heidelberg, pp 154–165
Zurück zum Zitat Zhou R, Hwang K (2007) PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18:460–473CrossRef Zhou R, Hwang K (2007) PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18:460–473CrossRef
Zurück zum Zitat Zhou L, Kondapalli SH, Aono K, Chakrabartty S (2019) Desynchronization of self-powered FN tunneling timers for trust verification of IoT supply-chain. IEEE Internet Things J 6:6537–6547CrossRef Zhou L, Kondapalli SH, Aono K, Chakrabartty S (2019) Desynchronization of self-powered FN tunneling timers for trust verification of IoT supply-chain. IEEE Internet Things J 6:6537–6547CrossRef
Metadaten
Titel
A dynamic trust model in internet of things
verfasst von
Eric Ke Wang
Chien-Ming Chen
Dongning Zhao
Wai Hung Ip
Kai Leung Yung
Publikationsdatum
30.08.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 8/2020
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-04319-2

Weitere Artikel der Ausgabe 8/2020

Soft Computing 8/2020 Zur Ausgabe