A survey of trust computation models for service management in internet of things systems

Abstract In this paper we survey trust computation models for Internet of things (IoT) systems for the purpose of service management, i.e., whether or not to select an IoT device as a service provider. Future IoT systems will connect the physical world into cyberspace everywhere and everything via billions of smart objects, and are expected to have a high economic impact. To date there is little work on trust computation in IoT environments for service management, especially for dealing with misbehaving owners of IoT devices that provide services to other IoT devices in the system. Our approach is to classify existing trust computation models for service management in IoT systems based on five essential design dimensions for a trust computation model: trust composition, trust propagation, trust aggregation, trust update, and trust formation. We summarize pros and cons of each dimension's options, and highlight the effectiveness of defense mechanisms against malicious attacks. We also summarize the most, least, and little visited trust computation techniques in the literature and provide insight on the effectiveness of trust computation techniques as applying to IoT systems. Finally, we identify gaps in IoT trust computation research and suggest future research directions.

[1]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[2]  Jia Guo,et al.  Hierarchical trust management of community of interest groups in mobile ad hoc networks , 2015, Ad Hoc Networks.

[3]  Ing-Ray Chen,et al.  Simulation study of a class of autonomous host-centric mobility prediction algorithms for wireless cellular and ad hoc networks , 2003, 36th Annual Simulation Symposium, 2003..

[4]  Neeli R. Prasad,et al.  A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.

[5]  Ing-Ray Chen,et al.  Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems , 2016, IEEE Transactions on Reliability.

[6]  Zhikui Chen,et al.  A scheme of access service recommendation for the Social Internet of Things , 2016, Int. J. Commun. Syst..

[7]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[8]  Timothy W. Finin,et al.  Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[9]  Sibel Adali,et al.  Measuring behavioral trust in social networks , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.

[10]  Hua Wang,et al.  Trust-Based Access Control for Privacy Protection in Collaborative Environment , 2009, 2009 IEEE International Conference on e-Business Engineering.

[11]  Munindar P. Singh,et al.  Trustworthy Service Selection and Composition , 2011, TAAS.

[12]  João H. Kleinschmidt,et al.  Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme , 2015, Int. J. Distributed Sens. Networks.

[13]  Ananthram Swami,et al.  Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks , 2017, IEEE Transactions on Services Computing.

[14]  Jin-Hee Cho,et al.  Trust Management for Encounter-Based Routing in Delay Tolerant Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[15]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[16]  Jie Wu,et al.  Uncertainty Modeling and Reduction in MANETs , 2010, IEEE Transactions on Mobile Computing.

[17]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[18]  Chunyan Miao,et al.  A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.

[19]  Gu Li-ze,et al.  Trust management mechanism for Internet of Things , 2014, China Communications.

[20]  Jin-Hee Cho,et al.  Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks , 2010, IEEE Transactions on Reliability.

[21]  Arthur P. Dempster,et al.  A Generalization of Bayesian Inference , 1968, Classic Works of the Dempster-Shafer Theory of Belief Functions.

[22]  Ing-Ray Chen,et al.  Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.

[23]  Otto Carlos Muniz Bandeira Duarte,et al.  Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.

[24]  Jia Guo,et al.  Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).

[25]  Yang Yu,et al.  Distributed Trust Management Mechanism for the Internet of Things , 2013 .

[26]  Tao Liu,et al.  A WSN-Oriented Key Agreement Protocol in Internet of Things , 2013 .

[27]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[28]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[29]  Jaime Lloret,et al.  Internet of things: where to be is to trust , 2012, EURASIP J. Wirel. Commun. Netw..

[30]  Jin-Hee Cho,et al.  Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[31]  Athman Bouguettaya,et al.  RATEWeb: Reputation Assessment for Trust Establishment among Web services , 2009, The VLDB Journal.

[32]  Daniel W. Manchala,et al.  Trust metrics, models and protocols for electronic commerce transactions , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[33]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[34]  C. Sierra,et al.  REGRET: A reputation model for gregarious societies , 2001 .

[35]  Ananthram Swami,et al.  LogitTrust : A Logit Regression-based Trust Model for Mobile Ad Hoc Networks , 2014 .

[36]  Cécile Paris,et al.  A survey of trust in social networks , 2013, CSUR.

[37]  Jia Guo,et al.  Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[38]  Félix Gómez Mármol,et al.  Dynamic and flexible selection of a reputation mechanism for heterogeneous environments , 2015, Future Gener. Comput. Syst..

[39]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[40]  Sebastian Ries,et al.  Certain trust: a trust model for users and agents , 2007, SAC '07.

[41]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[42]  Ing-Ray Chen,et al.  Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks , 2011, IEEE Transactions on Mobile Computing.

[43]  Ing-Ray Chen,et al.  Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems , 2005, Mob. Networks Appl..

[44]  Djamal Zeghlache,et al.  Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..

[45]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[46]  Kaiyu Wan,et al.  Integrating Context-Awareness and Trustworthiness in IoT Descriptions , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[47]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[48]  Feng Xia,et al.  A Trust Model Based on Service Classification in Mobile Services , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[49]  Frank Eliassen,et al.  Adaptable service composition for very-large-scale internet of things systems , 2011, MDS '11.

[50]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[51]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[52]  Xinyu Li,et al.  Cloud-Based Service Composition Architecture for Internet of Things , 2012 .

[53]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[54]  Aravind Srinivasan,et al.  Predicting Trust and Distrust in Social Networks , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[55]  Ing-Ray Chen,et al.  Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks , 1998, Comput. J..

[56]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[57]  Jin-Hee Cho,et al.  Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[58]  Feng Xia,et al.  An integrated scheme based on service classification in pervasive mobile services , 2012, Int. J. Commun. Syst..

[59]  Athanasios V. Vasilakos,et al.  MAPCloud: Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture , 2012, 2012 IEEE Fifth International Conference on Utility and Cloud Computing.

[60]  Max Mühlhäuser,et al.  CertainLogic: A Logic for Modeling Trust and Uncertainty - (Short Paper) , 2011, TRUST.

[61]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[62]  Gyu Myoung Lee,et al.  Autonomic trust management in cloud-based and highly dynamic IoT applications , 2015, 2015 ITU Kaleidoscope: Trust in the Information Society (K-2015).

[63]  Ananthram Swami,et al.  Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[64]  Eleonora Borgia,et al.  The Internet of Things vision: Key features, applications and open issues , 2014, Comput. Commun..

[65]  Jia Guo,et al.  Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.

[66]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[67]  Antonio F. Gómez-Skarmeta,et al.  Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the Future Internet , 2013, Comput. Networks.