Skip to main content

2022 | OriginalPaper | Buchkapitel

Distributed Trust and Reputation Services in Pervasive Internet-of-Things Deployments

verfasst von : Borja Bordel, Ramón Alcarria

Erschienen in: Mobile Internet Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyberprotection in the context of Internet-of-Things (IoT) includes three basic areas: security, privacy and trust. Security and privacy technologies are related to mechanisms such as cryptography or authentication protocols that have been extensively explored and adapted to IoT requirements. However, new risks such as cyber-physical attacks and novel distributed, and pervasive architectures reveal new weaknesses where trust and reputation issues are the main challenges to be addressed. Nevertheless, both, trust and reputation, are intrinsically subjective and distributed, and algorithms guaranteeing a dynamic and efficient management of these properties tend to be computationally heavy and complex. In this context, new trust and reputation services for pervasive IoT deployments are needed. Therefore, in this paper we propose a new distributed architecture for the provision of trust and reputation services in IoT systems. The architecture is based on Blockchain technologies and the composition of different conceptual models (cognitive, computational, neurological, and game-theoretical) using stochastic functions. The resulting probability may be employed by nodes to create their own trustworthy subsystem. In order to validate the performance and usability of the proposal, an experimental validation based on simulation technologies is provided.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abhishta, A., van Heeswijk, W., Junger, M., Nieuwenhuis, L.J.M., Joosten, R.: Why would we get attacked? An analysis of attacker’s aims behind DDoS attacks. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(2), 3–22 (2020) Abhishta, A., van Heeswijk, W., Junger, M., Nieuwenhuis, L.J.M., Joosten, R.: Why would we get attacked? An analysis of attacker’s aims behind DDoS attacks. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(2), 3–22 (2020)
2.
Zurück zum Zitat Alcarria, R., Bordel, B., Robles, T., Martín, D., Manso-Callejo, M.Á.: A blockchain-based authorization system for trustworthy resource monitoring and trading in smart communities. Sensors 18(10), 3561 (2018)CrossRef Alcarria, R., Bordel, B., Robles, T., Martín, D., Manso-Callejo, M.Á.: A blockchain-based authorization system for trustworthy resource monitoring and trading in smart communities. Sensors 18(10), 3561 (2018)CrossRef
3.
Zurück zum Zitat Alizadeh, M., Andersson, K., Schelen, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020) Alizadeh, M., Andersson, K., Schelen, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020)
4.
Zurück zum Zitat Anada, H.: Decentralized multi-authority anonymous authentication for global identities with non-interactive proofs. J. Internet Serv. Inf. Secur. (JISIS) 10(4), 23–37 (2020) Anada, H.: Decentralized multi-authority anonymous authentication for global identities with non-interactive proofs. J. Internet Serv. Inf. Secur. (JISIS) 10(4), 23–37 (2020)
5.
Zurück zum Zitat Bordel, B., Alcarria, R.: Assessment of human motivation through analysis of physiological and emotional signals in industry 4.0 scenarios. J. Ambient Intell. Hum. Comput. 1–21 (2017) Bordel, B., Alcarria, R.: Assessment of human motivation through analysis of physiological and emotional signals in industry 4.0 scenarios. J. Ambient Intell. Hum. Comput. 1–21 (2017)
6.
Zurück zum Zitat Bordel, B., Alcarria, R., De Andres, D.M., You, I.: Securing internet-of-things systems through implicit and explicit reputation models. IEEE Access 6, 47472–47488 (2018)CrossRef Bordel, B., Alcarria, R., De Andres, D.M., You, I.: Securing internet-of-things systems through implicit and explicit reputation models. IEEE Access 6, 47472–47488 (2018)CrossRef
7.
Zurück zum Zitat Bordel, B., Alcarria, R., de Rivera, D.S., Robles, T.: Process execution in cyber-physical systems using cloud and cyber-physical internet services. J. Supercomput. 74(8), 4127–4169 (2018)CrossRef Bordel, B., Alcarria, R., de Rivera, D.S., Robles, T.: Process execution in cyber-physical systems using cloud and cyber-physical internet services. J. Supercomput. 74(8), 4127–4169 (2018)CrossRef
8.
Zurück zum Zitat Bordel, B., Alcarria, R., Martín, D., Sánchez-de Rivera, D.: An agent-based method for trust graph calculation in resource constrained environments. Integr. Comput.-Aided Eng. 27(1), 37–56 (2020)CrossRef Bordel, B., Alcarria, R., Martín, D., Sánchez-de Rivera, D.: An agent-based method for trust graph calculation in resource constrained environments. Integr. Comput.-Aided Eng. 27(1), 37–56 (2020)CrossRef
9.
Zurück zum Zitat Bordel, B., Alcarria, R., Martín, D., Sánchez-Picot, Á.: Trust provision in the internet of things using transversal blockchain networks. Intell. Autom. Soft Comput. 25(1), 155–170 (2019) Bordel, B., Alcarria, R., Martín, D., Sánchez-Picot, Á.: Trust provision in the internet of things using transversal blockchain networks. Intell. Autom. Soft Comput. 25(1), 155–170 (2019)
10.
Zurück zum Zitat Bordel, B., Alcarria, R., Robles, T.: Denial of chain: evaluation and prediction of a novel cyberattack in blockchain-supported systems. Futur. Gener. Comput. Syst. 116, 426–439 (2021)CrossRef Bordel, B., Alcarria, R., Robles, T.: Denial of chain: evaluation and prediction of a novel cyberattack in blockchain-supported systems. Futur. Gener. Comput. Syst. 116, 426–439 (2021)CrossRef
12.
Zurück zum Zitat Bordel, B., Alcarria, R., Robles, T., Iglesias, M.S.: Data authentication and anonymization in IoT scenarios and future 5G networks using chaotic digital watermarking. IEEE Access 9, 22378–22398 (2021)CrossRef Bordel, B., Alcarria, R., Robles, T., Iglesias, M.S.: Data authentication and anonymization in IoT scenarios and future 5G networks using chaotic digital watermarking. IEEE Access 9, 22378–22398 (2021)CrossRef
13.
Zurück zum Zitat Bordel, B., Alcarria, R., Robles, T., Sanchez-Picot, A.: Stochastic and information theory techniques to reduce large datasets and detect cyberattacks in ambient intelligence environments. IEEE Access 6, 34896–34910 (2018)CrossRef Bordel, B., Alcarria, R., Robles, T., Sanchez-Picot, A.: Stochastic and information theory techniques to reduce large datasets and detect cyberattacks in ambient intelligence environments. IEEE Access 6, 34896–34910 (2018)CrossRef
14.
Zurück zum Zitat Bordel, B., Alcarria, R., Sánchez-de-Rivera, D.: Detecting malicious components in large-scale internet-of-things systems and architectures. In: Rocha, Á., Correia, A.M., Adeli, H., Reis, L.P., Costanzo, S. (eds.) WorldCIST 2017. AISC, vol. 569, pp. 155–165. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56535-4_16CrossRef Bordel, B., Alcarria, R., Sánchez-de-Rivera, D.: Detecting malicious components in large-scale internet-of-things systems and architectures. In: Rocha, Á., Correia, A.M., Adeli, H., Reis, L.P., Costanzo, S. (eds.) WorldCIST 2017. AISC, vol. 569, pp. 155–165. Springer, Cham (2017). https://​doi.​org/​10.​1007/​978-3-319-56535-4_​16CrossRef
15.
Zurück zum Zitat Bordel, B., Alcarria, R., Sánchez de Rivera, D., Martín, D., Robles, T.: Fast self-configuration in service-oriented smart environments for real-time applications. J. Ambient Intell. Smart Environ. 10(2), 143–167 (2018)CrossRef Bordel, B., Alcarria, R., Sánchez de Rivera, D., Martín, D., Robles, T.: Fast self-configuration in service-oriented smart environments for real-time applications. J. Ambient Intell. Smart Environ. 10(2), 143–167 (2018)CrossRef
17.
Zurück zum Zitat Haroon, A., Akram, S., Shah, M.A., Wahid, A.: E-lithe: a lightweight secure DTLS for IoT. In: IEEE Vehicular Technology Conference, vol. 2017-September, pp. 1–5, February 2018 Haroon, A., Akram, S., Shah, M.A., Wahid, A.: E-lithe: a lightweight secure DTLS for IoT. In: IEEE Vehicular Technology Conference, vol. 2017-September, pp. 1–5, February 2018
18.
Zurück zum Zitat Huang, Z., Su, X., Zhang, Y., Shi, C., Zhang, H., Xie, L.: A decentralized solution for IoT data trusted exchange based-on blockchain. In: 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017, vol. 2018-January, pp. 1180–1184, March 2018 Huang, Z., Su, X., Zhang, Y., Shi, C., Zhang, H., Xie, L.: A decentralized solution for IoT data trusted exchange based-on blockchain. In: 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017, vol. 2018-January, pp. 1180–1184, March 2018
19.
Zurück zum Zitat Ju, C., Wang, J., Xu, C.: A novel application recommendation method combining social relationship and trust relationship for future internet of things. Multimed. Tools Appl. 78(21), 29867–29880 (2018)CrossRef Ju, C., Wang, J., Xu, C.: A novel application recommendation method combining social relationship and trust relationship for future internet of things. Multimed. Tools Appl. 78(21), 29867–29880 (2018)CrossRef
20.
Zurück zum Zitat Kasturi, G., Jain, A., Singh, J.: Detection and classification of radio frequency jamming attacks using machine learning. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 49–62 (2020) Kasturi, G., Jain, A., Singh, J.: Detection and classification of radio frequency jamming attacks using machine learning. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 49–62 (2020)
21.
Zurück zum Zitat Kim, E., Keum, C.: Trustworthy gateway system providing IoT trust domain of smart home. In: International Conference on Ubiquitous and Future Networks, ICUFN, pp. 551–553, July 2017 Kim, E., Keum, C.: Trustworthy gateway system providing IoT trust domain of smart home. In: International Conference on Ubiquitous and Future Networks, ICUFN, pp. 551–553, July 2017
22.
Zurück zum Zitat König, L., Unger, S., Kieseberg, P., Tjoa, S.: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 110–127 (2020) König, L., Unger, S., Kieseberg, P., Tjoa, S.: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 110–127 (2020)
23.
Zurück zum Zitat Liu, N., Yu, M., Zang, W., Sandhu, R.: Cost and effectiveness of TrustZone defense and side-channel attack on arm platform. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 1–15 (2020) Liu, N., Yu, M., Zang, W., Sandhu, R.: Cost and effectiveness of TrustZone defense and side-channel attack on arm platform. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 1–15 (2020)
24.
Zurück zum Zitat Murayama, Y., Hauser, C., Hikage, N., Chakraborty, B.: The sense of security and trust. In: Handbook of Research on Social and Organizational Liabilities in Information Security, pp. 493–502 (2008) Murayama, Y., Hauser, C., Hikage, N., Chakraborty, B.: The sense of security and trust. In: Handbook of Research on Social and Organizational Liabilities in Information Security, pp. 493–502 (2008)
25.
Zurück zum Zitat U. S. Premarathne: MAG-SIoT: a multiplicative attributes graph model based trust computation method for social Internet of Things. In: 2017 IEEE International Conference on Industrial and Information Systems, ICIIS 2017 - Proceedings, vol. 2018-January, pp. 1–6, February 2018 U. S. Premarathne: MAG-SIoT: a multiplicative attributes graph model based trust computation method for social Internet of Things. In: 2017 IEEE International Conference on Industrial and Information Systems, ICIIS 2017 - Proceedings, vol. 2018-January, pp. 1–6, February 2018
26.
Zurück zum Zitat Raza, S., Shafagh, H., Hewage, K., Hummen, R., Voigt, T.: Lithe: lightweight secure CoAP for the internet of things. IEEE Sens. J. 13(10), 3711–3720 (2013)CrossRef Raza, S., Shafagh, H., Hewage, K., Hummen, R., Voigt, T.: Lithe: lightweight secure CoAP for the internet of things. IEEE Sens. J. 13(10), 3711–3720 (2013)CrossRef
27.
Zurück zum Zitat Robles, T., Bordel, B., Alcarria, R., Martín, D.: Mobile wireless sensor networks: modeling and analysis of three-dimensional scenarios and neighbor discovery in mobile data collection. Ad-Hoc Sens. Wirel. Netw. 35(1–2), 67–104 (2017) Robles, T., Bordel, B., Alcarria, R., Martín, D.: Mobile wireless sensor networks: modeling and analysis of three-dimensional scenarios and neighbor discovery in mobile data collection. Ad-Hoc Sens. Wirel. Netw. 35(1–2), 67–104 (2017)
29.
Zurück zum Zitat Sánchez, B.B., Sánchez-Picot, Á., De Rivera, D.S.: Using 5G technologies in the internet of things handovers, problems and challenges. In: Proceedings - 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015, pp. 364–369, September 2015 Sánchez, B.B., Sánchez-Picot, Á., De Rivera, D.S.: Using 5G technologies in the internet of things handovers, problems and challenges. In: Proceedings - 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015, pp. 364–369, September 2015
31.
Zurück zum Zitat Talreja, R., Sathish, S., Nenwani, K., Saxena, K.: Trust and behavior based system to prevent collision in IoT enabled VANET. In: International Conference on Signal Processing, Communication, Power and Embedded System, SCOPES 2016 - Proceedings, pp. 1588–1591, June 2017 Talreja, R., Sathish, S., Nenwani, K., Saxena, K.: Trust and behavior based system to prevent collision in IoT enabled VANET. In: International Conference on Signal Processing, Communication, Power and Embedded System, SCOPES 2016 - Proceedings, pp. 1588–1591, June 2017
32.
Zurück zum Zitat Ud Din, I., Guizani, M., Kim, B.S., Hassan, S., Khan, M.K.: Trust management techniques for the internet of things: a survey. IEEE Access 7, 29763–29787 (2019)CrossRef Ud Din, I., Guizani, M., Kim, B.S., Hassan, S., Khan, M.K.: Trust management techniques for the internet of things: a survey. IEEE Access 7, 29763–29787 (2019)CrossRef
33.
Zurück zum Zitat Wortmann, F., Flüchter, K.: Internet of things. Bus. Inf. Syst. Eng. 57(3), 221–224 (2015)CrossRef Wortmann, F., Flüchter, K.: Internet of things. Bus. Inf. Syst. Eng. 57(3), 221–224 (2015)CrossRef
Metadaten
Titel
Distributed Trust and Reputation Services in Pervasive Internet-of-Things Deployments
verfasst von
Borja Bordel
Ramón Alcarria
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-9576-6_2

Premium Partner