T_CAFE: A Trust based Security approach for Opportunistic IoT

Internet of things (IoT) is a revolution of the internet where a group of computing devices, sensors, machines or people, having unique identifiers and the ability to transfer data over the network without human intervention, are interconnected. Opportunistic networks (OppNets) are a type of disruption-tolerant networks, where network topology is not fixed and the devices are connected intermittently. Opportunistic IOT (OppIoT) is a blend of OppNets and IoT networks, where the data are shared among IoT devices and human communities exploiting the opportunistic contact nature of humans. The data is usually transmitted in a broadcast manner, exposing it to all the members of the network. Thus, securing the data transmitted is of utmost importance in OppIoT. This article proposes a trust-based schemE (called T_CAFE ) for securing the network against several attacks like sybil, bad mouthing, good mouthing, black hole and packet fabrication attacks. Using the opportunistic network environment simulator for performing simulations, it is found that the proposed T_CAFE protocol enhances the network security and outperforms routing protocols such as SHBPR, RSASec and ATDTN in terms of legitimate packet delivery, higher probability of message delivery, lower count of dropped messages and lower value of latency in packet delivery.

[1]  Ehab Al-Shaer,et al.  Taxonomy of conflicts in network security policies , 2006, IEEE Communications Magazine.

[2]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[3]  Refik Molva,et al.  Privacy and confidentiality in context-based and epidemic forwarding , 2010, Comput. Commun..

[4]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[5]  MengChu Zhou,et al.  A Privacy-Preserving Message Forwarding Framework for Opportunistic Cloud of Things , 2018, IEEE Internet of Things Journal.

[6]  Zhenfu Cao,et al.  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .

[7]  Ciprian Dobre,et al.  Trust and reputation management for opportunistic dissemination , 2017, Pervasive Mob. Comput..

[8]  Mohammad S. Obaidat,et al.  An altruism-based trust-dependent message forwarding protocol for opportunistic networks , 2017, Int. J. Commun. Syst..

[9]  Roy Want,et al.  An introduction to RFID technology , 2006, IEEE Pervasive Computing.

[10]  Santosh Biswas,et al.  MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing , 2018, J. Netw. Comput. Appl..

[11]  Jia Guo,et al.  Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.

[12]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[13]  Marco Conti,et al.  Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.

[14]  Zhu Wang,et al.  Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things , 2013, J. Netw. Comput. Appl..