Skip to main content
Top
Published in:
Cover of the book

2020 | OriginalPaper | Chapter

Secure Big Data Transmission with Trust Management for the Internet of Things (IoT)

Authors : A. K. Fabi, Sabu M. Thampi

Published in: Combating Security Challenges in the Age of Big Data

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Big data and Internet of Things (IoT) are the highly sought-after frameworks these days because IoT connects abundant amount of data which cannot be labeled and stored in the typical database system. Generating intelligent decisions from enormously increasing data in a real-time system is of major concern. Although big data seems to change our lives, it tries to make a burden in the computing environment due to the proliferation of data. In such a context, the efficient collection, processing, analyzing and secure storage are identified to be some of the crucial steps. The continuous flow of incoming data to the big data is the first and major challenge and this concern may play a key role in designing a viable and secure big data. In addition, the security issues can be even worse when the stored data include highly sensitive and confidential information. Therefore, if strong security measures are not applied in big data storage, it will cause some vital consequences. Trust management can be considered as a critical factor which operates seamlessly behind the scenes in IoT big data era to provide a reliable communication between devices. This chapter aims to disclose the trust management techniques prevailing in IoT with a special focus on big data technologies, and will outline the new developments and approaches that are applicable in these areas.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134CrossRef Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134CrossRef
2.
go back to reference Ahmed E et al (2017) The role of big data analytics in internet of things. Comput Netw 129:459–471CrossRef Ahmed E et al (2017) The role of big data analytics in internet of things. Comput Netw 129:459–471CrossRef
3.
go back to reference Yuan J, Li X (2018) A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. IEEE Access 6(c):23626–23638CrossRef Yuan J, Li X (2018) A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. IEEE Access 6(c):23626–23638CrossRef
4.
go back to reference Bashir AQ, Rizwan M, Gill (2016) Towards an IoT big data analytics framework : smart buildings systems. In: High performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS), pp 1325–1332 Bashir AQ, Rizwan M, Gill (2016) Towards an IoT big data analytics framework : smart buildings systems. In: High performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS), pp 1325–1332
5.
go back to reference Ahmad A, Member S, Rathore MM, Member S, Paul A, Member S (2016) Defining human behaviors using big data analytics in social internet of things. In: Advanced information networking and applications (AINA), 2016 IEEE 30th international conference on Ahmad A, Member S, Rathore MM, Member S, Paul A, Member S (2016) Defining human behaviors using big data analytics in social internet of things. In: Advanced information networking and applications (AINA), 2016 IEEE 30th international conference on
6.
go back to reference Ilapakurti A, Kedari S (2016) The role of big data in creating sense EHR, an integrated approach to create next generation mobile sensor and wearable data driven electronic health record. In: Big data computing service and applications (BigDataService), 2016 IEEE second international conference on Ilapakurti A, Kedari S (2016) The role of big data in creating sense EHR, an integrated approach to create next generation mobile sensor and wearable data driven electronic health record. In: Big data computing service and applications (BigDataService), 2016 IEEE second international conference on
7.
go back to reference Arora D, Li KF, Loffler A (2016) Big data analytics for classification of network enabled devices. In: Advanced information networking and applications workshops (WAINA), 2016 30th international conference on, pp 708–713 Arora D, Li KF, Loffler A (2016) Big data analytics for classification of network enabled devices. In: Advanced information networking and applications workshops (WAINA), 2016 30th international conference on, pp 708–713
8.
go back to reference Herwindra M, Tegar B, Rindang E, Buyung S, Wahana J, Luhung A (2016) Design and implementation of smart environment monitoring and analytics in real-time system framework based on internet of underwater things and big data. In: Electronics symposium (IES), 2016 international, pp 403–408 Herwindra M, Tegar B, Rindang E, Buyung S, Wahana J, Luhung A (2016) Design and implementation of smart environment monitoring and analytics in real-time system framework based on internet of underwater things and big data. In: Electronics symposium (IES), 2016 international, pp 403–408
9.
go back to reference Ding Z, Gao X, Xu J, Wu H (2013) IOT-StatisticDB : a general statistical database cluster mechanism for big data analysis in the internet of things. In: Green computing and communications (GreenCom) IEEE and internet of things (iThings/CPSCom), IEEE international conference on and IEEE cyber, physical and social computing, pp 535–543 Ding Z, Gao X, Xu J, Wu H (2013) IOT-StatisticDB : a general statistical database cluster mechanism for big data analysis in the internet of things. In: Green computing and communications (GreenCom) IEEE and internet of things (iThings/CPSCom), IEEE international conference on and IEEE cyber, physical and social computing, pp 535–543
10.
go back to reference Lee CKM, Yeung CL, Cheng MN (2015) Research on IoT based cyber physical system for industrial big data analytics. In: Industrial engineering and engineering management (IEEM), IEEE international conference on, pp 1855–1859 Lee CKM, Yeung CL, Cheng MN (2015) Research on IoT based cyber physical system for industrial big data analytics. In: Industrial engineering and engineering management (IEEM), IEEE international conference on, pp 1855–1859
11.
go back to reference Sezer OB, Dogdu E, Ozbayoglu M, Onal A (2016) An extended IoT framework with semantics, big data, and analytics Sezer OB, Dogdu E, Ozbayoglu M, Onal A (2016) An extended IoT framework with semantics, big data, and analytics
12.
go back to reference Wang H, Osen OL, Lit G, Lit W, Dai H, Zeng W (2015) Big data and industrial internet of things for the maritime industry in Northwestern Norway. In: TENCON 2015-2015 IEEE region 10 conference, pp 1–5 Wang H, Osen OL, Lit G, Lit W, Dai H, Zeng W (2015) Big data and industrial internet of things for the maritime industry in Northwestern Norway. In: TENCON 2015-2015 IEEE region 10 conference, pp 1–5
13.
go back to reference Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (1999) The role of trust management in distributed systems security In: Secure internet programming, pp 185–210CrossRef Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (1999) The role of trust management in distributed systems security In: Secure internet programming, pp 185–210CrossRef
14.
go back to reference Ben Abderrahim O (2017) TMCoI-SIOT : a trust management system based on communities of interest for the social internet of things, pp 747–752 Ben Abderrahim O (2017) TMCoI-SIOT : a trust management system based on communities of interest for the social internet of things, pp 747–752
15.
go back to reference Atzori L, Iera A, Morabito G (2011) SIoT: giving a social structure to the internet of things. IEEE Commun Lett 15(11):1193–1195CrossRef Atzori L, Iera A, Morabito G (2011) SIoT: giving a social structure to the internet of things. IEEE Commun Lett 15(11):1193–1195CrossRef
16.
go back to reference Valarmathi AMKML (2017) Trust management in the social internet of things. Wirel Pers Commun 96(2):2681–2691CrossRef Valarmathi AMKML (2017) Trust management in the social internet of things. Wirel Pers Commun 96(2):2681–2691CrossRef
17.
go back to reference Hasan R, Lee AJ, Yurcik W (2005) Toward a threat model for storage systems. In: Proceedings of the 2005 ACM workshop on storage security and survivability, pp 94–102 Hasan R, Lee AJ, Yurcik W (2005) Toward a threat model for storage systems. In: Proceedings of the 2005 ACM workshop on storage security and survivability, pp 94–102
18.
go back to reference Ardagna CA, Damiani E, De Capitani S, Foresti S, Samarati P (2007) Trust management. In: Security, privacy, and trust in modern data management, pp 103–117CrossRef Ardagna CA, Damiani E, De Capitani S, Foresti S, Samarati P (2007) Trust management. In: Security, privacy, and trust in modern data management, pp 103–117CrossRef
19.
go back to reference Alshehri M, Hussain FK (2018) A centralized trust management mechanism for the internet of things (CTM-IoT). Int Conf Broadband Wirel Comput, Commun Appl 12(February):533–543 Alshehri M, Hussain FK (2018) A centralized trust management mechanism for the internet of things (CTM-IoT). Int Conf Broadband Wirel Comput, Commun Appl 12(February):533–543
20.
go back to reference Nitti M, Girau R, Atzori L, Member S (2013) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26:1–14 Nitti M, Girau R, Atzori L, Member S (2013) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26:1–14
21.
go back to reference Ben Y, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the internet of things : a context-aware and multi- service approach. Comput Secur 2013:1–15 Ben Y, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the internet of things : a context-aware and multi- service approach. Comput Secur 2013:1–15
22.
go back to reference Chen D, Chang G, Sun D, Li J, Jia J (2014) TRM-IoT : a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(October 2011):1207–1228 Chen D, Chang G, Sun D, Li J, Jia J (2014) TRM-IoT : a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(October 2011):1207–1228
23.
go back to reference Chen I, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9:482–495CrossRef Chen I, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9:482–495CrossRef
24.
go back to reference Chen I, Triantis KP (2018) Trust-based service management of internet of things systems and its applications Chen I, Triantis KP (2018) Trust-based service management of internet of things systems and its applications
25.
go back to reference Jayasinghe U, Otebolaku A, Um T, Lee GM (2017) Data centric trust evaluation and prediction framework for IOT. ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K) 2017(March):1–7 Jayasinghe U, Otebolaku A, Um T, Lee GM (2017) Data centric trust evaluation and prediction framework for IOT. ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K) 2017(March):1–7
27.
go back to reference Bao F, Chen I (2012) Dynamic trust management for internet of things applications, pp 1–6 Bao F, Chen I (2012) Dynamic trust management for internet of things applications, pp 1–6
28.
go back to reference Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: Wireless communications, vehicular technology, information theory and aerospace \& electronic systems (VITAE), 2013 3rd international conference on, pp 1–5 Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: Wireless communications, vehicular technology, information theory and aerospace \& electronic systems (VITAE), 2013 3rd international conference on, pp 1–5
29.
go back to reference Javanmardi S, Shojafar M, Shariatmadari S, Ahrabi SS (2014) FR TRUST: a fuzzy reputation based model for trust management in semantic P2P grids. Int J Grid Util Comput 2:1–11 Javanmardi S, Shojafar M, Shariatmadari S, Ahrabi SS (2014) FR TRUST: a fuzzy reputation based model for trust management in semantic P2P grids. Int J Grid Util Comput 2:1–11
30.
go back to reference Jayasinghe U, Lee H, Lee GM (2015) A computational model to evaluate honesty in social internet of things Jayasinghe U, Lee H, Lee GM (2015) A computational model to evaluate honesty in social internet of things
31.
go back to reference Singh K, Verma AK (2018) A fuzzy-based trust model for flying ad hoc networks (FANETs). Int J Commun Syst 31(6):e3517CrossRef Singh K, Verma AK (2018) A fuzzy-based trust model for flying ad hoc networks (FANETs). Int J Commun Syst 31(6):e3517CrossRef
32.
go back to reference Bao F, Chen I (2012) Dynamic trust management for the internet of things applications, pp 1–30 Bao F, Chen I (2012) Dynamic trust management for the internet of things applications, pp 1–30
33.
go back to reference Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. Wirel VITAE 2013:1–5 Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. Wirel VITAE 2013:1–5
34.
go back to reference Bao F, Chen I, Chang M, Cho J (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Service Manag 9(2):169–183CrossRef Bao F, Chen I, Chang M, Cho J (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Service Manag 9(2):169–183CrossRef
35.
go back to reference Alhadad N et al (2013) Graph-based trust model for evaluating trust using subjective logic to cite this version : HAL Id : hal-00871138 graph-based trust model for evaluating trust using subjective logic Alhadad N et al (2013) Graph-based trust model for evaluating trust using subjective logic to cite this version : HAL Id : hal-00871138 graph-based trust model for evaluating trust using subjective logic
36.
go back to reference Jayasinghe U, Member G, Lee GM, Member S, Um T (2018) Machine learning based trust computational model for IoT services. IEEE Trans Sustain Comput 3782(c):1–14 Jayasinghe U, Member G, Lee GM, Member S, Um T (2018) Machine learning based trust computational model for IoT services. IEEE Trans Sustain Comput 3782(c):1–14
37.
go back to reference Jorge L (2015) Towards a generic trust management framework using a machine-learning-based trust model, pp 1343–1348 Jorge L (2015) Towards a generic trust management framework using a machine-learning-based trust model, pp 1343–1348
38.
go back to reference Mahmud M et al (2018) A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications. Cognit Comput 10:1–10CrossRef Mahmud M et al (2018) A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications. Cognit Comput 10:1–10CrossRef
39.
go back to reference Caminha J, Perkusich A, Perkusich M (2018) A smart trust management method to detect on-off attacks in the internet of things. Security Commun Netw 2018:1–10CrossRef Caminha J, Perkusich A, Perkusich M (2018) A smart trust management method to detect on-off attacks in the internet of things. Security Commun Netw 2018:1–10CrossRef
40.
go back to reference Deng S, Huang L, Xu G (2016) On deep learning for trust-aware recommendations in social networks. IEEE Trans Neural Netw Learn Syst 28:1–14CrossRef Deng S, Huang L, Xu G (2016) On deep learning for trust-aware recommendations in social networks. IEEE Trans Neural Netw Learn Syst 28:1–14CrossRef
41.
go back to reference A. Engineering (2010) TrustWalker: a RandomWalk model for combining trust-based and item-based recommendation Mohsen. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, no. 1990, pp 397–406 A. Engineering (2010) TrustWalker: a RandomWalk model for combining trust-based and item-based recommendation Mohsen. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, no. 1990, pp 397–406
42.
go back to reference Baras JS (2009) Graph algebraic interpretation of trust establishment in autonomic networks. Prepr. Wiley J. Networks Baras JS (2009) Graph algebraic interpretation of trust establishment in autonomic networks. Prepr. Wiley J. Networks
43.
go back to reference Garmsiri S, Hamzeh A (2015) New graph based trust similarity measure. Ciência e Nat 37(December):339–343CrossRef Garmsiri S, Hamzeh A (2015) New graph based trust similarity measure. Ciência e Nat 37(December):339–343CrossRef
44.
go back to reference George G, Thampi SM (2018) A graph-based security framework for securing industrial IoT networks from vulnerability exploitations. IEEE Access 6(September):43586–43601CrossRef George G, Thampi SM (2018) A graph-based security framework for securing industrial IoT networks from vulnerability exploitations. IEEE Access 6(September):43586–43601CrossRef
45.
go back to reference Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proc. twelfth Int. Conf. World Wide Web – WWW ’03, p 640 Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proc. twelfth Int. Conf. World Wide Web – WWW ’03, p 640
46.
go back to reference Khan ZA, Ullrich J, Herrmann P (2017) A trust-based resilient routing mechanism for the internet of things Khan ZA, Ullrich J, Herrmann P (2017) A trust-based resilient routing mechanism for the internet of things
47.
go back to reference Nizamkari NS (2017) A graph-based trust-enhanced recommender system for service selection in IOT. In: Inventive systems and control (ICISC), 2017 international conference on, pp 1–5 Nizamkari NS (2017) A graph-based trust-enhanced recommender system for service selection in IOT. In: Inventive systems and control (ICISC), 2017 international conference on, pp 1–5
48.
go back to reference Li L, Cai W, Liang L, Fan L (2010) Design and analysis of Bayesian game in role based trust management. In: Information theory and information security (ICITIS), 2010 IEEE international conference on, pp 394–398 Li L, Cai W, Liang L, Fan L (2010) Design and analysis of Bayesian game in role based trust management. In: Information theory and information security (ICITIS), 2010 IEEE international conference on, pp 394–398
49.
go back to reference Feng R, Che S, Wang X, Wan J (2014) An incentive mechanism based on game theory for trust management. Security Commun Netw March:2318–2325CrossRef Feng R, Che S, Wang X, Wan J (2014) An incentive mechanism based on game theory for trust management. Security Commun Netw March:2318–2325CrossRef
50.
go back to reference Lim H, Ghinita G, Bertino E, Kantarcioglu M (2012) A game-theoretic approach for high-assurance of data trustworthiness in sensor networks Lim H, Ghinita G, Bertino E, Kantarcioglu M (2012) A game-theoretic approach for high-assurance of data trustworthiness in sensor networks
51.
go back to reference Fang H, Xu L, Huang X (2015) Self-adaptive trust management based on game theory in fuzzy large-scale networks. Soft Comput 21:907–921MATHCrossRef Fang H, Xu L, Huang X (2015) Self-adaptive trust management based on game theory in fuzzy large-scale networks. Soft Comput 21:907–921MATHCrossRef
52.
go back to reference Xu G, Xu C, Tian X (2012) PSO-TPS : an optimal trust path selection algorithm based on particle swarm optimization in small world network, pp 12–16 Xu G, Xu C, Tian X (2012) PSO-TPS : an optimal trust path selection algorithm based on particle swarm optimization in small world network, pp 12–16
53.
go back to reference Huang W, Deng Z, Li R, Tang X (2013) Trust-based particle swarm optimization for grid task scheduling. Appl Mech Mater 240:1331–1335 Huang W, Deng Z, Li R, Tang X (2013) Trust-based particle swarm optimization for grid task scheduling. Appl Mech Mater 240:1331–1335
54.
go back to reference Eray U, Sen S, Burak A (2015) GenTrust : a genetic trust management model for peer-to-peer systems. Appl Soft Comput 34:693–704CrossRef Eray U, Sen S, Burak A (2015) GenTrust : a genetic trust management model for peer-to-peer systems. Appl Soft Comput 34:693–704CrossRef
56.
go back to reference Sanadhya S, Singh S (2015) Trust calculation with ant colony optimization in online social Networks. Proc Comput Sci 54:186–195CrossRef Sanadhya S, Singh S (2015) Trust calculation with ant colony optimization in online social Networks. Proc Comput Sci 54:186–195CrossRef
57.
go back to reference Sun M, Shi Z, Chen S, Zhou Z, Duan Y (2017) Energy-efficient composition of configurable internet of things services. IEEE Access 99:25609–25622CrossRef Sun M, Shi Z, Chen S, Zhou Z, Duan Y (2017) Energy-efficient composition of configurable internet of things services. IEEE Access 99:25609–25622CrossRef
58.
go back to reference Gómez Mármol F, Martínez Pérez G, Gómez Skarmeta AF (2009) TACS, a trust model for P2P networks. Wirel Pers Commun 51(1):153–164CrossRef Gómez Mármol F, Martínez Pérez G, Gómez Skarmeta AF (2009) TACS, a trust model for P2P networks. Wirel Pers Commun 51(1):153–164CrossRef
59.
go back to reference Bao F, Chen I, Tech V (2012) Trust management for the internet of things and its application to service composition. In: World of wireless, mobile and multimedia networks (WoWMoM), 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) Bao F, Chen I, Tech V (2012) Trust management for the internet of things and its application to service composition. In: World of wireless, mobile and multimedia networks (WoWMoM), 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
60.
go back to reference Wu G, Liu Z, Yao L, Xu Z, Wang W (2013) A fuzzy-based trust management in WSNs. J Internet Serv Inf … 2:124–135 Wu G, Liu Z, Yao L, Xu Z, Wang W (2013) A fuzzy-based trust management in WSNs. J Internet Serv Inf … 2:124–135
61.
go back to reference Wang Y (2011) A probabilistic approach for maintaining trust based on evidence. J Artif Intell Res 40:221–267MATHCrossRef Wang Y (2011) A probabilistic approach for maintaining trust based on evidence. J Artif Intell Res 40:221–267MATHCrossRef
62.
go back to reference Jøsang A (2002) The Beta reputation system. In: Proceedings of the 15th bled electronic commerce conference, pp 1–14 Jøsang A (2002) The Beta reputation system. In: Proceedings of the 15th bled electronic commerce conference, pp 1–14
63.
go back to reference Ganeriwal S, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. Reputation-based Framew high Integr Sens networks 4:15 Ganeriwal S, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. Reputation-based Framew high Integr Sens networks 4:15
64.
go back to reference Sun Z, Zhang Z, Xiao C, Qu G (2017) D-S evidence theory based trust ant colony routing in WSN. China Commun 6:27–41 Sun Z, Zhang Z, Xiao C, Qu G (2017) D-S evidence theory based trust ant colony routing in WSN. China Commun 6:27–41
65.
go back to reference Che S, Feng R, Liang X, Wang X (2015) A lightweight trust management based on Bayesian and Entropy for wireless sensor networks. Scurity Commun Netw 2014:168–175CrossRef Che S, Feng R, Liang X, Wang X (2015) A lightweight trust management based on Bayesian and Entropy for wireless sensor networks. Scurity Commun Netw 2014:168–175CrossRef
66.
go back to reference Qiu X, Zhang L, Wang S, Qian G (2010) A trust transitivity model based-on Dempster-Shafer theory. JNW 5(9):1025–1032CrossRef Qiu X, Zhang L, Wang S, Qian G (2010) A trust transitivity model based-on Dempster-Shafer theory. JNW 5(9):1025–1032CrossRef
67.
go back to reference Feng R, Xu X, Zhou X, Wan J (2011) A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory. Sensors 11(2):1345–1360CrossRef Feng R, Xu X, Zhou X, Wan J (2011) A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory. Sensors 11(2):1345–1360CrossRef
68.
go back to reference Di Pietro R, Salleras X, Signorini M, Waisbard E (2018) A blockchain-based trust system for the internet of things In: Proc. 23nd ACM Symp. Access Control Model. Technol. – SACMAT ’18, pp 77–83 Di Pietro R, Salleras X, Signorini M, Waisbard E (2018) A blockchain-based trust system for the internet of things In: Proc. 23nd ACM Symp. Access Control Model. Technol. – SACMAT ’18, pp 77–83
69.
go back to reference Di Pietro R, Salleras X, Signorini M, Waisbard E (2018) A blockchain-based trust system for the internet of things. Proc ACM Symp Access Control Model Technol SACMAT Part F1371:77–83CrossRef Di Pietro R, Salleras X, Signorini M, Waisbard E (2018) A blockchain-based trust system for the internet of things. Proc ACM Symp Access Control Model Technol SACMAT Part F1371:77–83CrossRef
70.
go back to reference Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: a decentralized Blockchain-based authentication system for IoT. Comput Secur 78:126–142CrossRef Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: a decentralized Blockchain-based authentication system for IoT. Comput Secur 78:126–142CrossRef
71.
go back to reference Zyskind G, Pentland AS (2015) Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops, pp 180–184 Zyskind G, Pentland AS (2015) Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops, pp 180–184
72.
go back to reference Song JC, Demir MA, Prevost JJ, Rad P (2018) Blockchain design for trusted decentralized IoT networks In: 2018 13th Syst. Syst. Eng. Conf. SoSE 2018, pp 169–174 Song JC, Demir MA, Prevost JJ, Rad P (2018) Blockchain design for trusted decentralized IoT networks In: 2018 13th Syst. Syst. Eng. Conf. SoSE 2018, pp 169–174
73.
go back to reference Huang Z, Su X, Zhang Y, Shi C, Zhang H, Xie L (2018) A decentralized solution for IoT data trusted exchange based-on blockchain. In: 2017 3rd IEEE Int. Conf. Comput. Commun. ICCC 2017, vol 2018–Janua, pp 1180–1184 Huang Z, Su X, Zhang Y, Shi C, Zhang H, Xie L (2018) A decentralized solution for IoT data trusted exchange based-on blockchain. In: 2017 3rd IEEE Int. Conf. Comput. Commun. ICCC 2017, vol 2018–Janua, pp 1180–1184
74.
go back to reference Li J, Bai Y, Zaman N, Leung VCM (2017) A decentralized trustworthy context and QoS-aware service discovery framework for the internet of things. IEEE Access 5:19154–19166CrossRef Li J, Bai Y, Zaman N, Leung VCM (2017) A decentralized trustworthy context and QoS-aware service discovery framework for the internet of things. IEEE Access 5:19154–19166CrossRef
Metadata
Title
Secure Big Data Transmission with Trust Management for the Internet of Things (IoT)
Authors
A. K. Fabi
Sabu M. Thampi
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-35642-2_1

Premium Partner