Trust based D2D communications for accessing services in Internet of Things

Internet of Things (IoT) is a vision of connecting everything for providing better services efficiently. IoT consists of enormous number of heterogeneous computing devices with different capabilities to provide a diverse range of services situated around the globe. Increasing number of IoT devices and availability of different services in the edge of the networks makes it inevitable to interact among devices. As a result, this open, non-homogeneous and distributed environment also breaches the integrity of secure and reliable device to device (D2D) communication. Traditional access control mechanisms are not prolific to the itinerant, decentralized and dynamic scenarios in the IoT. Trust management is a proven technology for applications like P2P, Grid, and ad hoc network. Hence, this technology can also be used to increase the user reliability in IoT. In this paper, we propose a trust based D2D communication mechanism for accessing different services to meet the growing transactions and successful operations of IoT. We also analyze the effect of adaptive trust parameters for IoT device to device communication in order to access the services.

[1]  Gary Carpenter 동적 사용자를 위한 Scalable 인증 그룹 키 교환 프로토콜 , 2005 .

[2]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[3]  Jia Guo,et al.  Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).

[4]  Lv Tingjie,et al.  Real-time business network selection based on auction mechanism , 2014, China Communications.

[5]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[6]  M. Ufuk Çaglayan,et al.  Extracting trust information from security system of a service , 2012, J. Netw. Comput. Appl..

[8]  Kun Wang,et al.  Trust control in heterogeneous networks for Internet of Things , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[9]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[10]  Kevin Barraclough,et al.  I and i , 2001, BMJ : British Medical Journal.

[11]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[12]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[13]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[14]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[15]  Bin Sun,et al.  Trust management mechanism for Internet of Things , 2014 .

[16]  Gu Li-ze,et al.  Trust management mechanism for Internet of Things , 2014, China Communications.

[17]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[18]  Paolo Massa,et al.  A Survey of Trust Use and Modeling in Real Online Systems , 2007 .

[19]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[20]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[21]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[22]  Zhao Wang,et al.  Access Control Mechanism Based on Trust Quantification , 2010, 2010 IEEE Second International Conference on Social Computing.