Trust management and evaluation for edge intelligence in the Internet of Things

Abstract Information and Communication Technologies (ICTs) have revolutionised the traditional communication processes, converting the cities into Smart Cities. Internet of Things (IoT) is one of the leading frameworks in Smart Cities realm; it is based on heterogeneous infrastructure, digital systems, smart technologies, and intelligent services. Due to the complex networks supporting the IoT world, smart devices and services are quickly degrading due to various factors. Security is one of the considered factors, and it also represents a difficult challenge. Malicious nodes disrupt the data traffic and integrity of IoT-based networks. This paper presents a novel Cumulative Trust Evaluation based Efficient Technique (CTBET) by singling out numerous viewpoints on governing and implementing the security in edge-based IoT networks. The proposed CTBET is based on the cumulative trust concept, which calculates the direct and indirect trust among nodes considering the packet drop rate and the packet data rate among different transmission nodes. Furthermore, it enforces suitable approaches to implement the trust mechanism based technique to enhance security and privacy. The proposed scheme handles the On-Off, Denial of Service (DoS) and Bad-Mouth attacks and is also able to isolate the malicious nodes in edge-based IoT networks. The provided simulation results show encouraging performance in terms of network life span, level of trustworthiness of nodes, lesser end-to-end delay and high data delivery ratio, during data transmission in the presence of the malicious and selfish nodes in the network.

[1]  Behnam Farrokhi,et al.  A Survey on Fuzzy Trust Management in Cloud Computing , 2018, 2018 1st International Conference on Advanced Research in Engineering Sciences (ARES).

[2]  Murad Khan,et al.  SDIoT: Software Defined Internet of Thing to Analyze Big Data in Smart Cities , 2017, LCN 2017.

[3]  Kai Rannenberg,et al.  Attribute-based Credentials for Trust: Identity in the Information Society , 2014 .

[4]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[5]  Giancarlo Fortino,et al.  Cloud-based Activity-aaService cyber-physical framework for human activity monitoring in mobility , 2017, Future Gener. Comput. Syst..

[6]  Nigar Fida,et al.  Security issues and attacks in Wireless Sensor Networks , 2016 .

[7]  Yousaf Bin Zikria,et al.  Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues , 2017, J. Sensors.

[8]  Peter Sommerlad,et al.  Security Patterns: Integrating Security and Systems Engineering , 2006 .

[9]  Kashif Naseer Qureshi,et al.  Systematic Review Analysis on SQLIA Detection and Prevention Approaches , 2020, Wirel. Pers. Commun..

[10]  Dewang Ren,et al.  Quantitative trust assessment method based on Bayesian network , 2016, 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC).

[11]  Arun Kumar Sangaiah,et al.  Multi-Semi-Couple Super-Resolution Method for Edge Computing , 2018, IEEE Access.

[12]  Mugen Peng,et al.  Edge computing technologies for Internet of Things: a primer , 2017, Digit. Commun. Networks.

[13]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[14]  Nirwan Ansari,et al.  EdgeIoT: Mobile Edge Computing for the Internet of Things , 2016, IEEE Communications Magazine.

[15]  Jaime Lloret,et al.  Self-Assessment Based Clustering Data Dissemination for Sparse and Dense Traffic Conditions for Internet of Vehicles , 2020, IEEE Access.

[16]  Weiming Shen,et al.  Agent-Oriented Cooperative Smart Objects: From IoT System Design to Implementation , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[17]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[18]  Abdul Hanan Abdullah,et al.  Sensor Based Vehicle Environment Perception Information System , 2014, 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops.

[19]  K. J. Ray Liu,et al.  Cognitive Radio Networking and Security: Frontmatter , 2010 .

[20]  MengChu Zhou,et al.  Security and trust issues in Fog computing: A survey , 2018, Future Gener. Comput. Syst..

[21]  Dong Yang,et al.  TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[22]  J. Seigneur Trust, Security and Privacy in Global Computing , 2005 .

[23]  Amr Tolba,et al.  Trust-based neighbor selection using activation function for secure routing in wireless sensor networks , 2018, Journal of Ambient Intelligence and Humanized Computing.

[24]  Abdul Hanan Abdullah,et al.  Provision of Security in Vehicular Ad Hoc Networks through an Intelligent Secure Routing Scheme , 2017, 2017 International Conference on Frontiers of Information Technology (FIT).

[25]  Abdul Hanan Abdullah,et al.  An energy and link aware next node selection protocol for body area networks , 2018, 2018 International Conference on Information Networking (ICOIN).

[26]  Bo Li,et al.  Computation Offloading Algorithm for Arbitrarily Divisible Applications in Mobile Edge Computing Environments: An OCR Case , 2018 .

[27]  Nicolas Sklavos,et al.  Blockchain-Based Security and Privacy in Smart Cities , 2019, Smart Cities Cybersecurity and Privacy.

[28]  Seungmin Rho,et al.  Service Orchestration of Optimizing Continuous Features in Industrial Surveillance Using Big Data Based Fog-Enabled Internet of Things , 2018, IEEE Access.

[29]  Lei Xu,et al.  FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[30]  Giancarlo Fortino,et al.  Environment-fusion multipath routing protocol for wireless sensor networks , 2020, Inf. Fusion.

[31]  Giancarlo Fortino,et al.  Using Blockchain in a Reputation-Based Model for Grouping Agents in the Internet of Things , 2020, IEEE Transactions on Engineering Management.