Multidimensional Trust-Based Anomaly Detection System in Internet of Things

Trust Management (TM) has been playing an important role in dealing with security and privacy issues in the Internet of Things (IoT). Following this trend, we propose a trust-based anomaly detection system which provides a closed loop of trustworthiness computing, decision-making and trust reevaluation. The proposed trust model considers multidimensional trust elements including reputation, Quality of Service (QoS) and social relationship, the result of which is employed to instruct the device to take appropriate security policies against its peers. Moreover, the detected anomaly event will trigger the reevaluation of the peers trustworthiness. To evaluate our system, we consider a shopping mall scenario with a great many of IoT devices, and the simulation results show our system achieves very low false alarm rate under proper trust level threshold.

[1]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[2]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[3]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[4]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[5]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[6]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[7]  Carlos Martín-Vide,et al.  Special Issue on Second International Conference on the Theory and Practice of Natural Computing, TPNC 2013 , 2016, Soft Comput..

[8]  Ebrahim Mamdani,et al.  Applications of fuzzy algorithms for control of a simple dynamic plant , 1974 .

[9]  Zheng Yan,et al.  Autonomic Trust Management for a Component-Based Software System , 2011, IEEE Transactions on Dependable and Secure Computing.

[10]  Lotfi A. Zadeh,et al.  Fuzzy logic = computing with words , 1996, IEEE Trans. Fuzzy Syst..

[11]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[12]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[13]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[14]  G. Cauley,et al.  Practices and new concepts in power system control , 1996 .

[15]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[16]  Zdzislaw Pawlak,et al.  Rough sets, decision algorithms and Bayes' theorem , 2002, Eur. J. Oper. Res..

[17]  N. Truong,et al.  A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things , 2016 .

[18]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[19]  Jin-Hee Cho,et al.  Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[20]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[21]  Antonio F. Gómez-Skarmeta,et al.  TACIoT: multidimensional trust-aware access control system for the Internet of Things , 2016, Soft Comput..