An active and verifiable trust evaluation approach for edge computing

Billions of Internet of Thing (IoT) devices are deployed in edge network. They are used to monitor specific event, process and to collect huge data to control center with smart decision based on the collected data. However, some malicious IoT devices may interrupt and interfere with normal nodes in data collection, causing damage to edge network. Due to the open character of the edge network, how to identify the credibility of these nodes, thereby identifying malicious IoT devices, and ensure reliable data collection in the edge network is a great challenge. In this paper, an Active and Verifiable Trust Evaluation (AVTE) approach is proposed to identify the credibility of IoT devices, so to ensure reliable data collection for Edge Computing with low cost. The main innovations of the AVTE approach compared with the existing work are as follows: (1) In AVTE approach, the trust of the device is obtained by an actively initiated trusted detection routing method. It is fast, accurate and targeted. (2) The acquisition of trust in the AVTE approach is based on a verifiable method and it ensures that the trust degree has higher reliability. (3) The trust acquisition method proposed in this paper is low-cost. An encoding returned verification method is applied to obtain verification messages at a very low cost. This paper proposes an encoding returned verification method, which can obtain verification messages at a very low cost. In addition, the strategy of this paper adopts initiation and verification of adaptive active trust detection according to the different energy consumption of IoT devices, so as to reliably obtain the trust of device under the premise of ensuring network lifetime. Theoretical analysis shows that AVTE approach can improve the data collection rate by 0.5 ~ 23.16% while ensuring long network lifetime compared with the existing scheme.

[1]  Jiguo Yu,et al.  An Invocation Cost Optimization Method for Web Services in Cloud Environment , 2017, Sci. Program..

[2]  Anfeng Liu,et al.  Energy Efficient Mode Selection, Base Station Selection and Resource Allocation Algorithm in D2D Heterogeneous Networks , 2020, Peer-to-Peer Netw. Appl..

[3]  Song Guo,et al.  Resource Management at the Network Edge: A Deep Reinforcement Learning Approach , 2019, IEEE Network.

[4]  Anfeng Liu,et al.  Bidirectional Prediction-Based Underwater Data Collection Protocol for End-Edge-Cloud Orchestrated System , 2020, IEEE Transactions on Industrial Informatics.

[5]  Ming Zhao,et al.  A high‐accurate content popularity prediction computational modeling for mobile edge computing using matrix completion technology , 2020, Trans. Emerg. Telecommun. Technol..

[6]  Shigeng Zhang,et al.  A Cloud–MEC Collaborative Task Offloading Scheme With Service Orchestration , 2020, IEEE Internet of Things Journal.

[7]  Guojun Wang,et al.  Enabling Verifiable and Dynamic Ranked Search over Outsourced Data , 2019, IEEE Transactions on Services Computing.

[8]  Yi Pan,et al.  Reconstruction of Hidden Representation for Robust Feature Extraction , 2017, ACM Trans. Intell. Syst. Technol..

[9]  Zhongming Zheng,et al.  Energy and Memory Efficient Clone Detection in Wireless Sensor Networks , 2016, IEEE Transactions on Mobile Computing.

[10]  Sudip Misra,et al.  Assessment of the Suitability of Fog Computing in the Context of Internet of Things , 2018, IEEE Transactions on Cloud Computing.

[11]  Athanasios V. Vasilakos,et al.  An effective service-oriented networking management architecture for 5G-enabled internet of things , 2020, Comput. Networks.

[12]  Kaoru Ota,et al.  Vehicles joint UAVs to acquire and analyze data for topology discovery in large-scale IoT systems , 2020, Peer-to-Peer Netw. Appl..

[13]  Zhiguo Shi,et al.  Noise-Aware DVFS for Efficient Transitions on Battery-Powered IoT Devices , 2020, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[14]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[15]  Paolo Montuschi,et al.  Building Trust in Autonomous Vehicles: Role of Virtual Reality Driving Simulators in HMI Design , 2019, IEEE Transactions on Vehicular Technology.

[16]  Sherali Zeadally,et al.  Fog Computing for 5G Tactile Industrial Internet of Things: QoE-Aware Resource Allocation Model , 2019, IEEE Transactions on Industrial Informatics.

[17]  Jon W. Mark,et al.  Performance Analysis and Enhancement of the DSRC for VANET's Safety Applications , 2013, IEEE Trans. Veh. Technol..

[18]  Ye Wang,et al.  Towards minimum code dissemination delay through UAV joint vehicles for smart city , 2020, IET Commun..

[19]  Arun Kumar Sangaiah,et al.  Edge-Computing-Based Trustworthy Data Collection Model in the Internet of Things , 2020, IEEE Internet of Things Journal.

[20]  Tao Wang,et al.  QoE-ensured price competition model for emerging mobile networks , 2015, IEEE Wireless Communications.

[21]  Zhongming Zheng,et al.  Secure and Energy-Efficient Disjoint Multipath Routing for WSNs , 2012, IEEE Transactions on Vehicular Technology.

[22]  Tie Qiu,et al.  Swarm-Intelligence-Based Rendezvous Selection via Edge Computing for Mobile Sensor Networks , 2020, IEEE Internet of Things Journal.

[23]  Wei Liu,et al.  Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things , 2020, Trans. Emerg. Telecommun. Technol..

[24]  Wei Liu,et al.  An adaptive retransmit mechanism for delay differentiated services in industrial WSNs , 2019, EURASIP J. Wirel. Commun. Netw..

[25]  Jinjun Chen,et al.  A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment , 2018, Future Gener. Comput. Syst..

[26]  Hossam S. Hassanein,et al.  Reputation-Aware, Trajectory-Based Recruitment of Smart Vehicles for Public Sensing , 2018, IEEE Transactions on Intelligent Transportation Systems.

[27]  Xuyun Zhang,et al.  A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems , 2019, World Wide Web.

[28]  Zhiwen Zeng,et al.  Relay Selection Joint Consecutive Packet Routing Scheme to Improve Performance for Wake-Up Radio-Enabled WSNs , 2020, Wirel. Commun. Mob. Comput..

[29]  Jiannong Cao,et al.  On-Line Anomaly Detection With High Accuracy , 2018, IEEE/ACM Transactions on Networking.

[30]  Zhiliang Zhu,et al.  Detecting Confident Information Coverage Holes in Industrial Internet of Things: An Energy-Efficient Perspective , 2018, IEEE Communications Magazine.

[31]  Xiaoyu Zhu,et al.  Data Collection Through Mobile Vehicles in Edge Network of Smart City , 2019, IEEE Access.

[32]  Fang Liu,et al.  A Trust Computing-based Security Routing Scheme for Cyber Physical Systems , 2019, ACM Trans. Intell. Syst. Technol..

[33]  Laurence T. Yang,et al.  Data fusion based coverage optimization in heterogeneous sensor networks: A survey , 2019, Inf. Fusion.

[34]  Xiaolong Li,et al.  Privacy-Enhanced Data Collection Based on Deep Learning for Internet of Vehicles , 2020, IEEE Transactions on Industrial Informatics.

[35]  Xuyun Zhang,et al.  A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data , 2017, IEEE Journal on Selected Areas in Communications.

[36]  Anfeng Liu,et al.  An Intelligent Edge-Computing-Based Method to Counter Coupling Problems in Cyber-Physical Systems , 2020, IEEE Network.

[37]  Xiaohui Liang,et al.  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[38]  Arun Kumar Sangaiah,et al.  Mobility Based Trust Evaluation for Heterogeneous Electric Vehicles Network in Smart Cities , 2021, IEEE Transactions on Intelligent Transportation Systems.

[39]  Mohsen Guizani,et al.  An Efficient Distributed Trust Model for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[40]  Tao Peng,et al.  Intelligent route planning on large road networks with efficiency and privacy , 2019, J. Parallel Distributed Comput..

[41]  Gabriel Maciá-Fernández,et al.  A model of data forwarding in MANETs for lightweight detection of malicious packet dropping , 2015, Comput. Networks.

[42]  Bo Jiang,et al.  Trust based energy efficient data collection with unmanned aerial vehicle in edge network , 2020, Trans. Emerg. Telecommun. Technol..

[43]  Jiangtao Wang,et al.  HyTasker: Hybrid Task Allocation in Mobile Crowd Sensing , 2018, IEEE Transactions on Mobile Computing.

[44]  Xuemin Shen,et al.  Synergy of Big Data and 5G Wireless Networks: Opportunities, Approaches, and Challenges , 2018, IEEE Wireless Communications.

[45]  Wenbing Zhao,et al.  Performance optimization for state machine replication based on application semantics: A review , 2016, J. Syst. Softw..

[46]  Hong-Ning Dai,et al.  Blockchain-based data privacy management with Nudge theory in open banking , 2020, Future Gener. Comput. Syst..

[47]  Anfeng Liu,et al.  A Unified Trustworthy Environment Establishment Based on Edge Computing in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.

[48]  Jiannong Cao,et al.  Recover Corrupted Data in Sensor Networks: A Matrix Completion Solution , 2017, IEEE Transactions on Mobile Computing.

[49]  Takahiro Hara,et al.  A proposed security scheme against Denial of Service attacks in cluster-based wireless sensor networks , 2014, Secur. Commun. Networks.

[50]  Ting Li,et al.  Machine learning based code dissemination by selection of reliability mobile vehicles in 5G networks , 2020, Comput. Commun..

[51]  Hilde van der Togt,et al.  Publisher's Note , 2003, J. Netw. Comput. Appl..

[52]  G. Bianchi,et al.  Opportunistic communication in smart city: Experimental insight with small-scale taxi fleets as data carriers , 2016, Ad Hoc Networks.

[53]  Zhiwen Zeng,et al.  An AUV-Assisted Data Gathering Scheme Based on Clustering and Matrix Completion for Smart Ocean , 2020, IEEE Internet of Things Journal.

[54]  Mianxiong Dong,et al.  Intelligent resource allocation management for vehicles network: An A3C learning approach , 2020, Comput. Commun..

[55]  Zhiwen Zeng,et al.  A trust-based minimum cost and quality aware data collection scheme in P2P network , 2020, Peer-to-Peer Netw. Appl..

[56]  Anfeng Liu,et al.  Objective-Variable Tour Planning for Mobile Data Collection in Partitioned Sensor Networks , 2022, IEEE Transactions on Mobile Computing.

[57]  Mianxiong Dong,et al.  ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.