Skip to main content
Top
Published in: Mobile Networks and Applications 3/2018

22-02-2018

Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT)

Authors: Mohammad Dahman Alshehri, Farookh Khadeer Hussain, Omar Khadeer Hussain

Published in: Mobile Networks and Applications | Issue 3/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The growth and adoption of the Internet of Things (IoT) is increasing day by day. The large number of IoT devices increases the risk of security threats such as (but not limited to) viruses or cyber-attacks. One possible approach to achieve IoT security is to enable a trustworthy IoT environment in IoT wherein the interactions are based on the trust value of the communicating nodes. Trust management and trust assessment has been extensively studied in distributed networks in general and the IoT in particular, but there are still outstanding pressing issues such as bad-mouthing of trust values which prevent them from being used in practical IoT applications. Furthermore, there is no research in ensuring that the developed IoT trust solutions are scalable across billions of IoT nodes. To address the above-mentioned issues, we propose a methodology for scalable trust management solution in the IoT. The methodology addresses practical and pressing issues related to IoT trust management such as trust-based IoT clustering, intelligent methods for countering bad-mouthing attacks on trust systems, issues of memory-efficient trust computation and trust-based migration of IoT nodes from one cluster to another. Experimental results demonstrate the effectiveness of the proposed approaches.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Alshehri MD, Hussain FK (2015) A comparative analysis of scalable and context-aware trust management approaches for internet of things. In: International conference on neural information processing. Springer, Berlin, pp 596–605 Alshehri MD, Hussain FK (2015) A comparative analysis of scalable and context-aware trust management approaches for internet of things. In: International conference on neural information processing. Springer, Berlin, pp 596–605
2.
go back to reference Bao F, Chen R, Guo J (2013) Scalable, adaptive and survivable trust management for community of interest based internet of things systems. In: 2013 IEEE 11th international symposium on autonomous decentralized systems (ISADS). IEEE, pp 1–7 Bao F, Chen R, Guo J (2013) Scalable, adaptive and survivable trust management for community of interest based internet of things systems. In: 2013 IEEE 11th international symposium on autonomous decentralized systems (ISADS). IEEE, pp 1–7
3.
go back to reference Bellavista P, Zanni A (2016) Towards better scalability for IoT-cloud interactions via combined exploitation of MQTT and CoAP. In: 2016 IEEE 2nd international forum on research and technologies for society and industry leveraging a better tomorrow (RTSI). IEEE, pp 1–6 Bellavista P, Zanni A (2016) Towards better scalability for IoT-cloud interactions via combined exploitation of MQTT and CoAP. In: 2016 IEEE 2nd international forum on research and technologies for society and industry leveraging a better tomorrow (RTSI). IEEE, pp 1–6
4.
go back to reference Gharbieh M, ElSawy H, Bader A, Alouini M-S (2017) Spatiotemporal stochastic modeling of IoT enabled cellular networks: Scalability and stability analysis. IEEE Transactions on Communications Gharbieh M, ElSawy H, Bader A, Alouini M-S (2017) Spatiotemporal stochastic modeling of IoT enabled cellular networks: Scalability and stability analysis. IEEE Transactions on Communications
5.
go back to reference Chen R, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9(3):482–495CrossRef Chen R, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9(3):482–495CrossRef
6.
go back to reference Han S, NDN-Based Woo H (2016) Pub/sub system for scalable IoT cloud. In: Cloud computing technology and science (CloudCom). IEEE Han S, NDN-Based Woo H (2016) Pub/sub system for scalable IoT cloud. In: Cloud computing technology and science (CloudCom). IEEE
7.
go back to reference Jabeur N, Yasar AU-H, Shakshuki E, Haddad H (2017) Toward a bio-inspired adaptive spatial clustering approach for IoT applications. Future Generation Computer Systems Jabeur N, Yasar AU-H, Shakshuki E, Haddad H (2017) Toward a bio-inspired adaptive spatial clustering approach for IoT applications. Future Generation Computer Systems
8.
go back to reference Jiang H, Shen F, Chen S, Li K-C, Jeong Y-S (2015) A secure and scalable storage system for aggregate data in IoT. Futur Gener Comput Syst 49:133–141CrossRef Jiang H, Shen F, Chen S, Li K-C, Jeong Y-S (2015) A secure and scalable storage system for aggregate data in IoT. Futur Gener Comput Syst 49:133–141CrossRef
9.
go back to reference Khan ZA, Herrmann PA (2017) Trust based distributed intrusion detection mechanism for internet of things. In: 2017 IEEE 31st international conference on advanced information networking and applications (AINA). IEEE, pp 1169–1176 Khan ZA, Herrmann PA (2017) Trust based distributed intrusion detection mechanism for internet of things. In: 2017 IEEE 31st international conference on advanced information networking and applications (AINA). IEEE, pp 1169–1176
10.
go back to reference Kokoris-Kogias E, Voutyras O, Varvarigou T (2016) TRM-SIoT: A scalable hybrid trust & reputation model for the social internet of things. In: 2016 IEEE 21st international conference on emerging technologies and factory automation (ETFA). IEEE, pp 1–9 Kokoris-Kogias E, Voutyras O, Varvarigou T (2016) TRM-SIoT: A scalable hybrid trust & reputation model for the social internet of things. In: 2016 IEEE 21st international conference on emerging technologies and factory automation (ETFA). IEEE, pp 1–9
11.
go back to reference Li F, Vögler M, Claeßens M, Dustdar S (2013) Efficient and scalable IoT service delivery on cloud. In: 2013 IEEE 6th international conference on cloud computing (CLOUD). IEEE, pp 740– 747 Li F, Vögler M, Claeßens M, Dustdar S (2013) Efficient and scalable IoT service delivery on cloud. In: 2013 IEEE 6th international conference on cloud computing (CLOUD). IEEE, pp 740– 747
12.
go back to reference Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134CrossRef Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134CrossRef
13.
go back to reference Ahmed A, Bakar KA, Channa MI, Khan AW (2016) A secure routing protocol with trust and energy awareness for wireless sensor network. Mobile Netw Appl 21(2):272–285CrossRef Ahmed A, Bakar KA, Channa MI, Khan AW (2016) A secure routing protocol with trust and energy awareness for wireless sensor network. Mobile Netw Appl 21(2):272–285CrossRef
14.
go back to reference Ma T, Liu Y, Zhang Z-J (2015) An energy-efficient reliable trust-based data aggregation protocol for wireless sensor networks. Int J Control Autom 8(3):305–318CrossRef Ma T, Liu Y, Zhang Z-J (2015) An energy-efficient reliable trust-based data aggregation protocol for wireless sensor networks. Int J Control Autom 8(3):305–318CrossRef
15.
go back to reference Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164CrossRef Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164CrossRef
16.
go back to reference Varghese R, Chithralekha T, Kharkongor C (2016) Self-organized cluster based energy efficient meta trust model for internet of things. In: 2016 IEEE international conference on engineering and technology (ICETECH). IEEE, pp 382–389 Varghese R, Chithralekha T, Kharkongor C (2016) Self-organized cluster based energy efficient meta trust model for internet of things. In: 2016 IEEE international conference on engineering and technology (ICETECH). IEEE, pp 382–389
17.
go back to reference Tayeb S, Latifi S, Kim Y (2017) A survey on IoT communication and computation frameworks: An industrial perspective. In: 2017 IEEE 7th annual computing and communication workshop and conference (CCWC). IEEE, pp 1–6 Tayeb S, Latifi S, Kim Y (2017) A survey on IoT communication and computation frameworks: An industrial perspective. In: 2017 IEEE 7th annual computing and communication workshop and conference (CCWC). IEEE, pp 1–6
18.
go back to reference Williams R, McMahon E, Samtani S, Patton M, Chen H (2017) Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach. In: 2017 IEEE international conference on intelligence and security informatics (ISI). IEEE, pp 179–181 Williams R, McMahon E, Samtani S, Patton M, Chen H (2017) Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach. In: 2017 IEEE international conference on intelligence and security informatics (ISI). IEEE, pp 179–181
19.
go back to reference Vögler M, Schleicher JM, Inzinger C, Dustdar S (2016) A scalable framework for provisioning large-scale IoT deployments. ACM Trans Internet Technol 16(2):11CrossRef Vögler M, Schleicher JM, Inzinger C, Dustdar S (2016) A scalable framework for provisioning large-scale IoT deployments. ACM Trans Internet Technol 16(2):11CrossRef
20.
go back to reference Wolf T, Nagurney A (2016) A layered protocol architecture for scalable innovation and identification of network economic synergies in the internet of things. In: 2016 IEEE 1st international conference on internet-of-things design and implementation (IoTDI). IEEE, pp 141–151 Wolf T, Nagurney A (2016) A layered protocol architecture for scalable innovation and identification of network economic synergies in the internet of things. In: 2016 IEEE 1st international conference on internet-of-things design and implementation (IoTDI). IEEE, pp 141–151
21.
go back to reference Yu Y, Jia Z, Tao W, Xue B, Lee C (2017) An efficient trust evaluation scheme for node behavior detection in the internet of things. Wirel Pers Commun 93(2):571–587CrossRef Yu Y, Jia Z, Tao W, Xue B, Lee C (2017) An efficient trust evaluation scheme for node behavior detection in the internet of things. Wirel Pers Commun 93(2):571–587CrossRef
22.
go back to reference Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ (2017) IoT middleware: A survey on issues and enabling technologies. IEEE Internet Things J 4(1):1–20CrossRef Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ (2017) IoT middleware: A survey on issues and enabling technologies. IEEE Internet Things J 4(1):1–20CrossRef
Metadata
Title
Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT)
Authors
Mohammad Dahman Alshehri
Farookh Khadeer Hussain
Omar Khadeer Hussain
Publication date
22-02-2018
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 3/2018
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-018-1017-z

Other articles of this Issue 3/2018

Mobile Networks and Applications 3/2018 Go to the issue