Skip to main content
Erschienen in:
Buchtitelbild

2020 | OriginalPaper | Buchkapitel

Secure Big Data Transmission with Trust Management for the Internet of Things (IoT)

verfasst von : A. K. Fabi, Sabu M. Thampi

Erschienen in: Combating Security Challenges in the Age of Big Data

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Big data and Internet of Things (IoT) are the highly sought-after frameworks these days because IoT connects abundant amount of data which cannot be labeled and stored in the typical database system. Generating intelligent decisions from enormously increasing data in a real-time system is of major concern. Although big data seems to change our lives, it tries to make a burden in the computing environment due to the proliferation of data. In such a context, the efficient collection, processing, analyzing and secure storage are identified to be some of the crucial steps. The continuous flow of incoming data to the big data is the first and major challenge and this concern may play a key role in designing a viable and secure big data. In addition, the security issues can be even worse when the stored data include highly sensitive and confidential information. Therefore, if strong security measures are not applied in big data storage, it will cause some vital consequences. Trust management can be considered as a critical factor which operates seamlessly behind the scenes in IoT big data era to provide a reliable communication between devices. This chapter aims to disclose the trust management techniques prevailing in IoT with a special focus on big data technologies, and will outline the new developments and approaches that are applicable in these areas.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134CrossRef Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134CrossRef
2.
Zurück zum Zitat Ahmed E et al (2017) The role of big data analytics in internet of things. Comput Netw 129:459–471CrossRef Ahmed E et al (2017) The role of big data analytics in internet of things. Comput Netw 129:459–471CrossRef
3.
Zurück zum Zitat Yuan J, Li X (2018) A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. IEEE Access 6(c):23626–23638CrossRef Yuan J, Li X (2018) A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. IEEE Access 6(c):23626–23638CrossRef
4.
Zurück zum Zitat Bashir AQ, Rizwan M, Gill (2016) Towards an IoT big data analytics framework : smart buildings systems. In: High performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS), pp 1325–1332 Bashir AQ, Rizwan M, Gill (2016) Towards an IoT big data analytics framework : smart buildings systems. In: High performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS), pp 1325–1332
5.
Zurück zum Zitat Ahmad A, Member S, Rathore MM, Member S, Paul A, Member S (2016) Defining human behaviors using big data analytics in social internet of things. In: Advanced information networking and applications (AINA), 2016 IEEE 30th international conference on Ahmad A, Member S, Rathore MM, Member S, Paul A, Member S (2016) Defining human behaviors using big data analytics in social internet of things. In: Advanced information networking and applications (AINA), 2016 IEEE 30th international conference on
6.
Zurück zum Zitat Ilapakurti A, Kedari S (2016) The role of big data in creating sense EHR, an integrated approach to create next generation mobile sensor and wearable data driven electronic health record. In: Big data computing service and applications (BigDataService), 2016 IEEE second international conference on Ilapakurti A, Kedari S (2016) The role of big data in creating sense EHR, an integrated approach to create next generation mobile sensor and wearable data driven electronic health record. In: Big data computing service and applications (BigDataService), 2016 IEEE second international conference on
7.
Zurück zum Zitat Arora D, Li KF, Loffler A (2016) Big data analytics for classification of network enabled devices. In: Advanced information networking and applications workshops (WAINA), 2016 30th international conference on, pp 708–713 Arora D, Li KF, Loffler A (2016) Big data analytics for classification of network enabled devices. In: Advanced information networking and applications workshops (WAINA), 2016 30th international conference on, pp 708–713
8.
Zurück zum Zitat Herwindra M, Tegar B, Rindang E, Buyung S, Wahana J, Luhung A (2016) Design and implementation of smart environment monitoring and analytics in real-time system framework based on internet of underwater things and big data. In: Electronics symposium (IES), 2016 international, pp 403–408 Herwindra M, Tegar B, Rindang E, Buyung S, Wahana J, Luhung A (2016) Design and implementation of smart environment monitoring and analytics in real-time system framework based on internet of underwater things and big data. In: Electronics symposium (IES), 2016 international, pp 403–408
9.
Zurück zum Zitat Ding Z, Gao X, Xu J, Wu H (2013) IOT-StatisticDB : a general statistical database cluster mechanism for big data analysis in the internet of things. In: Green computing and communications (GreenCom) IEEE and internet of things (iThings/CPSCom), IEEE international conference on and IEEE cyber, physical and social computing, pp 535–543 Ding Z, Gao X, Xu J, Wu H (2013) IOT-StatisticDB : a general statistical database cluster mechanism for big data analysis in the internet of things. In: Green computing and communications (GreenCom) IEEE and internet of things (iThings/CPSCom), IEEE international conference on and IEEE cyber, physical and social computing, pp 535–543
10.
Zurück zum Zitat Lee CKM, Yeung CL, Cheng MN (2015) Research on IoT based cyber physical system for industrial big data analytics. In: Industrial engineering and engineering management (IEEM), IEEE international conference on, pp 1855–1859 Lee CKM, Yeung CL, Cheng MN (2015) Research on IoT based cyber physical system for industrial big data analytics. In: Industrial engineering and engineering management (IEEM), IEEE international conference on, pp 1855–1859
11.
Zurück zum Zitat Sezer OB, Dogdu E, Ozbayoglu M, Onal A (2016) An extended IoT framework with semantics, big data, and analytics Sezer OB, Dogdu E, Ozbayoglu M, Onal A (2016) An extended IoT framework with semantics, big data, and analytics
12.
Zurück zum Zitat Wang H, Osen OL, Lit G, Lit W, Dai H, Zeng W (2015) Big data and industrial internet of things for the maritime industry in Northwestern Norway. In: TENCON 2015-2015 IEEE region 10 conference, pp 1–5 Wang H, Osen OL, Lit G, Lit W, Dai H, Zeng W (2015) Big data and industrial internet of things for the maritime industry in Northwestern Norway. In: TENCON 2015-2015 IEEE region 10 conference, pp 1–5
13.
Zurück zum Zitat Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (1999) The role of trust management in distributed systems security In: Secure internet programming, pp 185–210CrossRef Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (1999) The role of trust management in distributed systems security In: Secure internet programming, pp 185–210CrossRef
14.
Zurück zum Zitat Ben Abderrahim O (2017) TMCoI-SIOT : a trust management system based on communities of interest for the social internet of things, pp 747–752 Ben Abderrahim O (2017) TMCoI-SIOT : a trust management system based on communities of interest for the social internet of things, pp 747–752
15.
Zurück zum Zitat Atzori L, Iera A, Morabito G (2011) SIoT: giving a social structure to the internet of things. IEEE Commun Lett 15(11):1193–1195CrossRef Atzori L, Iera A, Morabito G (2011) SIoT: giving a social structure to the internet of things. IEEE Commun Lett 15(11):1193–1195CrossRef
16.
Zurück zum Zitat Valarmathi AMKML (2017) Trust management in the social internet of things. Wirel Pers Commun 96(2):2681–2691CrossRef Valarmathi AMKML (2017) Trust management in the social internet of things. Wirel Pers Commun 96(2):2681–2691CrossRef
17.
Zurück zum Zitat Hasan R, Lee AJ, Yurcik W (2005) Toward a threat model for storage systems. In: Proceedings of the 2005 ACM workshop on storage security and survivability, pp 94–102 Hasan R, Lee AJ, Yurcik W (2005) Toward a threat model for storage systems. In: Proceedings of the 2005 ACM workshop on storage security and survivability, pp 94–102
18.
Zurück zum Zitat Ardagna CA, Damiani E, De Capitani S, Foresti S, Samarati P (2007) Trust management. In: Security, privacy, and trust in modern data management, pp 103–117CrossRef Ardagna CA, Damiani E, De Capitani S, Foresti S, Samarati P (2007) Trust management. In: Security, privacy, and trust in modern data management, pp 103–117CrossRef
19.
Zurück zum Zitat Alshehri M, Hussain FK (2018) A centralized trust management mechanism for the internet of things (CTM-IoT). Int Conf Broadband Wirel Comput, Commun Appl 12(February):533–543 Alshehri M, Hussain FK (2018) A centralized trust management mechanism for the internet of things (CTM-IoT). Int Conf Broadband Wirel Comput, Commun Appl 12(February):533–543
20.
Zurück zum Zitat Nitti M, Girau R, Atzori L, Member S (2013) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26:1–14 Nitti M, Girau R, Atzori L, Member S (2013) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26:1–14
21.
Zurück zum Zitat Ben Y, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the internet of things : a context-aware and multi- service approach. Comput Secur 2013:1–15 Ben Y, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the internet of things : a context-aware and multi- service approach. Comput Secur 2013:1–15
22.
Zurück zum Zitat Chen D, Chang G, Sun D, Li J, Jia J (2014) TRM-IoT : a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(October 2011):1207–1228 Chen D, Chang G, Sun D, Li J, Jia J (2014) TRM-IoT : a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(October 2011):1207–1228
23.
Zurück zum Zitat Chen I, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9:482–495CrossRef Chen I, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9:482–495CrossRef
24.
Zurück zum Zitat Chen I, Triantis KP (2018) Trust-based service management of internet of things systems and its applications Chen I, Triantis KP (2018) Trust-based service management of internet of things systems and its applications
25.
Zurück zum Zitat Jayasinghe U, Otebolaku A, Um T, Lee GM (2017) Data centric trust evaluation and prediction framework for IOT. ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K) 2017(March):1–7 Jayasinghe U, Otebolaku A, Um T, Lee GM (2017) Data centric trust evaluation and prediction framework for IOT. ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K) 2017(March):1–7
27.
Zurück zum Zitat Bao F, Chen I (2012) Dynamic trust management for internet of things applications, pp 1–6 Bao F, Chen I (2012) Dynamic trust management for internet of things applications, pp 1–6
28.
Zurück zum Zitat Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: Wireless communications, vehicular technology, information theory and aerospace \& electronic systems (VITAE), 2013 3rd international conference on, pp 1–5 Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: Wireless communications, vehicular technology, information theory and aerospace \& electronic systems (VITAE), 2013 3rd international conference on, pp 1–5
29.
Zurück zum Zitat Javanmardi S, Shojafar M, Shariatmadari S, Ahrabi SS (2014) FR TRUST: a fuzzy reputation based model for trust management in semantic P2P grids. Int J Grid Util Comput 2:1–11 Javanmardi S, Shojafar M, Shariatmadari S, Ahrabi SS (2014) FR TRUST: a fuzzy reputation based model for trust management in semantic P2P grids. Int J Grid Util Comput 2:1–11
30.
Zurück zum Zitat Jayasinghe U, Lee H, Lee GM (2015) A computational model to evaluate honesty in social internet of things Jayasinghe U, Lee H, Lee GM (2015) A computational model to evaluate honesty in social internet of things
31.
Zurück zum Zitat Singh K, Verma AK (2018) A fuzzy-based trust model for flying ad hoc networks (FANETs). Int J Commun Syst 31(6):e3517CrossRef Singh K, Verma AK (2018) A fuzzy-based trust model for flying ad hoc networks (FANETs). Int J Commun Syst 31(6):e3517CrossRef
32.
Zurück zum Zitat Bao F, Chen I (2012) Dynamic trust management for the internet of things applications, pp 1–30 Bao F, Chen I (2012) Dynamic trust management for the internet of things applications, pp 1–30
33.
Zurück zum Zitat Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. Wirel VITAE 2013:1–5 Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. Wirel VITAE 2013:1–5
34.
Zurück zum Zitat Bao F, Chen I, Chang M, Cho J (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Service Manag 9(2):169–183CrossRef Bao F, Chen I, Chang M, Cho J (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Service Manag 9(2):169–183CrossRef
35.
Zurück zum Zitat Alhadad N et al (2013) Graph-based trust model for evaluating trust using subjective logic to cite this version : HAL Id : hal-00871138 graph-based trust model for evaluating trust using subjective logic Alhadad N et al (2013) Graph-based trust model for evaluating trust using subjective logic to cite this version : HAL Id : hal-00871138 graph-based trust model for evaluating trust using subjective logic
36.
Zurück zum Zitat Jayasinghe U, Member G, Lee GM, Member S, Um T (2018) Machine learning based trust computational model for IoT services. IEEE Trans Sustain Comput 3782(c):1–14 Jayasinghe U, Member G, Lee GM, Member S, Um T (2018) Machine learning based trust computational model for IoT services. IEEE Trans Sustain Comput 3782(c):1–14
37.
Zurück zum Zitat Jorge L (2015) Towards a generic trust management framework using a machine-learning-based trust model, pp 1343–1348 Jorge L (2015) Towards a generic trust management framework using a machine-learning-based trust model, pp 1343–1348
38.
Zurück zum Zitat Mahmud M et al (2018) A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications. Cognit Comput 10:1–10CrossRef Mahmud M et al (2018) A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications. Cognit Comput 10:1–10CrossRef
39.
Zurück zum Zitat Caminha J, Perkusich A, Perkusich M (2018) A smart trust management method to detect on-off attacks in the internet of things. Security Commun Netw 2018:1–10CrossRef Caminha J, Perkusich A, Perkusich M (2018) A smart trust management method to detect on-off attacks in the internet of things. Security Commun Netw 2018:1–10CrossRef
40.
Zurück zum Zitat Deng S, Huang L, Xu G (2016) On deep learning for trust-aware recommendations in social networks. IEEE Trans Neural Netw Learn Syst 28:1–14CrossRef Deng S, Huang L, Xu G (2016) On deep learning for trust-aware recommendations in social networks. IEEE Trans Neural Netw Learn Syst 28:1–14CrossRef
41.
Zurück zum Zitat A. Engineering (2010) TrustWalker: a RandomWalk model for combining trust-based and item-based recommendation Mohsen. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, no. 1990, pp 397–406 A. Engineering (2010) TrustWalker: a RandomWalk model for combining trust-based and item-based recommendation Mohsen. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, no. 1990, pp 397–406
42.
Zurück zum Zitat Baras JS (2009) Graph algebraic interpretation of trust establishment in autonomic networks. Prepr. Wiley J. Networks Baras JS (2009) Graph algebraic interpretation of trust establishment in autonomic networks. Prepr. Wiley J. Networks
43.
Zurück zum Zitat Garmsiri S, Hamzeh A (2015) New graph based trust similarity measure. Ciência e Nat 37(December):339–343CrossRef Garmsiri S, Hamzeh A (2015) New graph based trust similarity measure. Ciência e Nat 37(December):339–343CrossRef
44.
Zurück zum Zitat George G, Thampi SM (2018) A graph-based security framework for securing industrial IoT networks from vulnerability exploitations. IEEE Access 6(September):43586–43601CrossRef George G, Thampi SM (2018) A graph-based security framework for securing industrial IoT networks from vulnerability exploitations. IEEE Access 6(September):43586–43601CrossRef
45.
Zurück zum Zitat Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proc. twelfth Int. Conf. World Wide Web – WWW ’03, p 640 Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proc. twelfth Int. Conf. World Wide Web – WWW ’03, p 640
46.
Zurück zum Zitat Khan ZA, Ullrich J, Herrmann P (2017) A trust-based resilient routing mechanism for the internet of things Khan ZA, Ullrich J, Herrmann P (2017) A trust-based resilient routing mechanism for the internet of things
47.
Zurück zum Zitat Nizamkari NS (2017) A graph-based trust-enhanced recommender system for service selection in IOT. In: Inventive systems and control (ICISC), 2017 international conference on, pp 1–5 Nizamkari NS (2017) A graph-based trust-enhanced recommender system for service selection in IOT. In: Inventive systems and control (ICISC), 2017 international conference on, pp 1–5
48.
Zurück zum Zitat Li L, Cai W, Liang L, Fan L (2010) Design and analysis of Bayesian game in role based trust management. In: Information theory and information security (ICITIS), 2010 IEEE international conference on, pp 394–398 Li L, Cai W, Liang L, Fan L (2010) Design and analysis of Bayesian game in role based trust management. In: Information theory and information security (ICITIS), 2010 IEEE international conference on, pp 394–398
49.
Zurück zum Zitat Feng R, Che S, Wang X, Wan J (2014) An incentive mechanism based on game theory for trust management. Security Commun Netw March:2318–2325CrossRef Feng R, Che S, Wang X, Wan J (2014) An incentive mechanism based on game theory for trust management. Security Commun Netw March:2318–2325CrossRef
50.
Zurück zum Zitat Lim H, Ghinita G, Bertino E, Kantarcioglu M (2012) A game-theoretic approach for high-assurance of data trustworthiness in sensor networks Lim H, Ghinita G, Bertino E, Kantarcioglu M (2012) A game-theoretic approach for high-assurance of data trustworthiness in sensor networks
51.
Zurück zum Zitat Fang H, Xu L, Huang X (2015) Self-adaptive trust management based on game theory in fuzzy large-scale networks. Soft Comput 21:907–921MATHCrossRef Fang H, Xu L, Huang X (2015) Self-adaptive trust management based on game theory in fuzzy large-scale networks. Soft Comput 21:907–921MATHCrossRef
52.
Zurück zum Zitat Xu G, Xu C, Tian X (2012) PSO-TPS : an optimal trust path selection algorithm based on particle swarm optimization in small world network, pp 12–16 Xu G, Xu C, Tian X (2012) PSO-TPS : an optimal trust path selection algorithm based on particle swarm optimization in small world network, pp 12–16
53.
Zurück zum Zitat Huang W, Deng Z, Li R, Tang X (2013) Trust-based particle swarm optimization for grid task scheduling. Appl Mech Mater 240:1331–1335 Huang W, Deng Z, Li R, Tang X (2013) Trust-based particle swarm optimization for grid task scheduling. Appl Mech Mater 240:1331–1335
54.
Zurück zum Zitat Eray U, Sen S, Burak A (2015) GenTrust : a genetic trust management model for peer-to-peer systems. Appl Soft Comput 34:693–704CrossRef Eray U, Sen S, Burak A (2015) GenTrust : a genetic trust management model for peer-to-peer systems. Appl Soft Comput 34:693–704CrossRef
56.
Zurück zum Zitat Sanadhya S, Singh S (2015) Trust calculation with ant colony optimization in online social Networks. Proc Comput Sci 54:186–195CrossRef Sanadhya S, Singh S (2015) Trust calculation with ant colony optimization in online social Networks. Proc Comput Sci 54:186–195CrossRef
57.
Zurück zum Zitat Sun M, Shi Z, Chen S, Zhou Z, Duan Y (2017) Energy-efficient composition of configurable internet of things services. IEEE Access 99:25609–25622CrossRef Sun M, Shi Z, Chen S, Zhou Z, Duan Y (2017) Energy-efficient composition of configurable internet of things services. IEEE Access 99:25609–25622CrossRef
58.
Zurück zum Zitat Gómez Mármol F, Martínez Pérez G, Gómez Skarmeta AF (2009) TACS, a trust model for P2P networks. Wirel Pers Commun 51(1):153–164CrossRef Gómez Mármol F, Martínez Pérez G, Gómez Skarmeta AF (2009) TACS, a trust model for P2P networks. Wirel Pers Commun 51(1):153–164CrossRef
59.
Zurück zum Zitat Bao F, Chen I, Tech V (2012) Trust management for the internet of things and its application to service composition. In: World of wireless, mobile and multimedia networks (WoWMoM), 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) Bao F, Chen I, Tech V (2012) Trust management for the internet of things and its application to service composition. In: World of wireless, mobile and multimedia networks (WoWMoM), 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
60.
Zurück zum Zitat Wu G, Liu Z, Yao L, Xu Z, Wang W (2013) A fuzzy-based trust management in WSNs. J Internet Serv Inf … 2:124–135 Wu G, Liu Z, Yao L, Xu Z, Wang W (2013) A fuzzy-based trust management in WSNs. J Internet Serv Inf … 2:124–135
61.
Zurück zum Zitat Wang Y (2011) A probabilistic approach for maintaining trust based on evidence. J Artif Intell Res 40:221–267MATHCrossRef Wang Y (2011) A probabilistic approach for maintaining trust based on evidence. J Artif Intell Res 40:221–267MATHCrossRef
62.
Zurück zum Zitat Jøsang A (2002) The Beta reputation system. In: Proceedings of the 15th bled electronic commerce conference, pp 1–14 Jøsang A (2002) The Beta reputation system. In: Proceedings of the 15th bled electronic commerce conference, pp 1–14
63.
Zurück zum Zitat Ganeriwal S, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. Reputation-based Framew high Integr Sens networks 4:15 Ganeriwal S, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. Reputation-based Framew high Integr Sens networks 4:15
64.
Zurück zum Zitat Sun Z, Zhang Z, Xiao C, Qu G (2017) D-S evidence theory based trust ant colony routing in WSN. China Commun 6:27–41 Sun Z, Zhang Z, Xiao C, Qu G (2017) D-S evidence theory based trust ant colony routing in WSN. China Commun 6:27–41
65.
Zurück zum Zitat Che S, Feng R, Liang X, Wang X (2015) A lightweight trust management based on Bayesian and Entropy for wireless sensor networks. Scurity Commun Netw 2014:168–175CrossRef Che S, Feng R, Liang X, Wang X (2015) A lightweight trust management based on Bayesian and Entropy for wireless sensor networks. Scurity Commun Netw 2014:168–175CrossRef
66.
Zurück zum Zitat Qiu X, Zhang L, Wang S, Qian G (2010) A trust transitivity model based-on Dempster-Shafer theory. JNW 5(9):1025–1032CrossRef Qiu X, Zhang L, Wang S, Qian G (2010) A trust transitivity model based-on Dempster-Shafer theory. JNW 5(9):1025–1032CrossRef
67.
Zurück zum Zitat Feng R, Xu X, Zhou X, Wan J (2011) A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory. Sensors 11(2):1345–1360CrossRef Feng R, Xu X, Zhou X, Wan J (2011) A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory. Sensors 11(2):1345–1360CrossRef
68.
Zurück zum Zitat Di Pietro R, Salleras X, Signorini M, Waisbard E (2018) A blockchain-based trust system for the internet of things In: Proc. 23nd ACM Symp. Access Control Model. Technol. – SACMAT ’18, pp 77–83 Di Pietro R, Salleras X, Signorini M, Waisbard E (2018) A blockchain-based trust system for the internet of things In: Proc. 23nd ACM Symp. Access Control Model. Technol. – SACMAT ’18, pp 77–83
69.
Zurück zum Zitat Di Pietro R, Salleras X, Signorini M, Waisbard E (2018) A blockchain-based trust system for the internet of things. Proc ACM Symp Access Control Model Technol SACMAT Part F1371:77–83CrossRef Di Pietro R, Salleras X, Signorini M, Waisbard E (2018) A blockchain-based trust system for the internet of things. Proc ACM Symp Access Control Model Technol SACMAT Part F1371:77–83CrossRef
70.
Zurück zum Zitat Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: a decentralized Blockchain-based authentication system for IoT. Comput Secur 78:126–142CrossRef Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: a decentralized Blockchain-based authentication system for IoT. Comput Secur 78:126–142CrossRef
71.
Zurück zum Zitat Zyskind G, Pentland AS (2015) Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops, pp 180–184 Zyskind G, Pentland AS (2015) Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops, pp 180–184
72.
Zurück zum Zitat Song JC, Demir MA, Prevost JJ, Rad P (2018) Blockchain design for trusted decentralized IoT networks In: 2018 13th Syst. Syst. Eng. Conf. SoSE 2018, pp 169–174 Song JC, Demir MA, Prevost JJ, Rad P (2018) Blockchain design for trusted decentralized IoT networks In: 2018 13th Syst. Syst. Eng. Conf. SoSE 2018, pp 169–174
73.
Zurück zum Zitat Huang Z, Su X, Zhang Y, Shi C, Zhang H, Xie L (2018) A decentralized solution for IoT data trusted exchange based-on blockchain. In: 2017 3rd IEEE Int. Conf. Comput. Commun. ICCC 2017, vol 2018–Janua, pp 1180–1184 Huang Z, Su X, Zhang Y, Shi C, Zhang H, Xie L (2018) A decentralized solution for IoT data trusted exchange based-on blockchain. In: 2017 3rd IEEE Int. Conf. Comput. Commun. ICCC 2017, vol 2018–Janua, pp 1180–1184
74.
Zurück zum Zitat Li J, Bai Y, Zaman N, Leung VCM (2017) A decentralized trustworthy context and QoS-aware service discovery framework for the internet of things. IEEE Access 5:19154–19166CrossRef Li J, Bai Y, Zaman N, Leung VCM (2017) A decentralized trustworthy context and QoS-aware service discovery framework for the internet of things. IEEE Access 5:19154–19166CrossRef
Metadaten
Titel
Secure Big Data Transmission with Trust Management for the Internet of Things (IoT)
verfasst von
A. K. Fabi
Sabu M. Thampi
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-35642-2_1

Premium Partner