Obviating capricious behavior in internet of things

Advancement in digitization gave rise to a new paradigm of communication, called Internet of Things (IoT), where various heterogeneous physical objects (IoT devices) with embedded intelligence can provide or receive services from each other seamlessly. One concerned issue is to maintain reliability in the system with these heterogeneous devices for effective utilization of services. Trust and Reputation management schemes solve this problem by analyzing the behavior of entities experienced in the previous instances. However, existing strategies are not well suitable to meet IoT requirement where network consist of heterogeneous devices having multi-service characteristics. In this paper, we propose a trust management scheme for IoT environment where erratic behavior may be observed for some of the IoT devices. To evaluate trust on a device, our scheme considers following three factors: Success Rate which measures the availability of a device for the previous service requests, Satisfaction Level that gives the degree of satisfaction on the received responses from the device, and Credibility that assesses device susceptibility towards being reliable in the system. Simulation results validate the effectiveness of our proposed scheme by obviating devices' capricious behavior with the different values of trust.

[1]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[2]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[3]  Simon G. M. Koo,et al.  A Survey of Technologies in Internet of Things , 2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems.

[4]  Lars Rasmusson,et al.  Simulated social control for secure Internet commerce , 1996, NSPW '96.

[5]  Jia Guo,et al.  A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..

[6]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[7]  Gennaro Boggia,et al.  Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.

[8]  James A. Hendler,et al.  Web 3.0 Emerging , 2009, Computer.

[9]  Djamal Zeghlache,et al.  Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..

[10]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[11]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[12]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[13]  Jia Guo,et al.  Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).

[14]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[15]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[16]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[17]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[18]  Qiang Liu,et al.  A Credible Bayesian-Based Trust Management Scheme for Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[19]  Akbar Ghaffarpour Rahbar,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.