Self-organized cluster based energy efficient meta trust model for internet of things

This paper explores the trust management in the internet of thing. Internet of thing merged up from the concept of wireless technology and the internet. Internet of thing is the direct communication between different heterogeneous things. Here, the things are active participants that interact and communicate with each other as well as the environment i.e. they are self-organized. Since it does not have any centralized architecture, fixed topology and keep on changing their position dynamically, the nodes are vulnerable to internal security attacks. The traditional reputation system for trust management may be effective but they rely on the historical information which may fail to detect the dynamic behavior of the nodes that may repeatedly change its behavior in order to maximize its profit and there is no provision provided for the newcomers in the network to form trust. Thus in this paper, a self-organized cluster based energy efficient trust management is proposed in which the energy consumption of each node will be decreased by forming clusters, which in turn would provide scalability and also help to eliminate the selfish nodes. A pattern matching trust model is used to provide a full confident trust on the nodes and at the same time identity of the node is considered to punish the malicious node so that it does not intrude in the network in the future.

[1]  Jia Guo,et al.  Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).

[2]  M. Young The technical writer's handbook : writing with style and clarity , 1989 .

[3]  Lizhong Jin,et al.  A Novel Secure Architecture for the Internet of Things , 2011, 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS).

[4]  Antonio Iera,et al.  SIoT: Giving a Social Structure to the Internet of Things , 2011, IEEE Communications Letters.

[5]  Kazi Chandrima Rahman,et al.  A Survey on Sensor Network , 2010 .

[6]  Ricardo Neisse,et al.  Building Trust in the Human?Internet of Things Relationship , 2014, IEEE Technology and Society Magazine.

[7]  Sun-Yuan Hsieh,et al.  Conditional (t, k)-Diagnosis in Graphs by Using the Comparison Diagnosis Model , 2015, IEEE Trans. Computers.

[8]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[9]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[10]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[11]  Jia Guo,et al.  Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.

[12]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[13]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[14]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[15]  Antonio Iera,et al.  A subjective model for trustworthiness evaluation in the social Internet of Things , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[16]  Luigi Atzori,et al.  Friendship Selection in the Social Internet of Things: Challenges and Possible Strategies , 2015, IEEE Internet of Things Journal.

[17]  M. Upendra Kumar,et al.  Web Services Security Architectures using Role-Based Access Control , 2010 .

[18]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[19]  T. Yorozu,et al.  Electron Spectroscopy Studies on Magneto-Optical Media and Plastic Substrate Interface , 1987, IEEE Translation Journal on Magnetics in Japan.

[20]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[21]  Athanasios V. Vasilakos,et al.  Future Internet of Things: open issues and challenges , 2014, Wireless Networks.