Trust Management Techniques for the Internet of Things: A Survey

A vision of the future Internet is introduced in such a fashion that various computing devices are connected together to form a network called Internet of Things (IoT). This network will generate massive data that may be leveraged for entertainment, security, and most importantly user trust. Yet, trust is an imperative obstruction that may hinder the IoT growth and even delay the substantial squeeze of a number of applications. In this survey, an extensive analysis of trust management techniques along with their pros and cons is presented in a different context. In comparison with other surveys, the goal is to provide a systematic description of the most relevant trust management techniques to help researchers understand that how various systems fit together to bring preferred functionalities without examining different standards. Besides, the lessons learned are presented, and the views are argued regarding the primary goal trust which is likely to play in the future Internet.

[1]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[2]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[3]  Oumaima Ben Abderrahim,et al.  CTMS-SIOT: A context-based trust management system for the social Internet of Things , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[4]  Antonio Iera,et al.  A subjective model for trustworthiness evaluation in the social Internet of Things , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[5]  Alberto Maria Segre,et al.  Programs for Machine Learning , 1994 .

[6]  Quan Z. Sheng,et al.  Trust as a Service: A Framework for Trust Management in Cloud Environments , 2011, WISE.

[7]  F. Fukuyama Trust: The Social Virtues and the Creation of Prosperity Penguin London , 1995 .

[8]  Barry Smyth,et al.  Trust in recommender systems , 2005, IUI.

[9]  Yanxin Zhang,et al.  A decentralized solution for IoT data trusted exchange based-on blockchain , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).

[10]  Xenofon Fafoutis,et al.  Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[11]  Rahul Talreja,et al.  Trust and behavior based system to prevent collision in IoT enabled VANET , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).

[12]  Eric Rescorla,et al.  The Design and Implementation of Datagram TLS , 2004, NDSS.

[13]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[14]  Xiao Chen,et al.  A Cloud-Based Trust Evaluation Scheme Using a Vehicular Social Network Environment , 2017, 2017 24th Asia-Pacific Software Engineering Conference (APSEC).

[15]  F. Richard Yu,et al.  A Novel Interference Alignment Scheme Based on Sequential Antenna Switching in Wireless Networks , 2013, IEEE Transactions on Wireless Communications.

[16]  Piero A. Bonatti,et al.  Protune: A Framework for Semantic Web Policies , 2008, International Semantic Web Conference.

[17]  Zhu Han,et al.  Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[18]  Neeraj Suri,et al.  Trust & security RTD in the internet of things: opportunities for international cooperation , 2012, SecurIT '12.

[19]  Bernhard Kauer OSLO: Improving the Security of Trusted Computing , 2007, USENIX Security Symposium.

[20]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[21]  Luigi Atzori,et al.  The Virtual Object as a Major Element of the Internet of Things: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[22]  Hongbin Zhang,et al.  Trust and Attribute-Based Dynamic Access Control Model for Internet of Things , 2017, 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).

[23]  Bojan Cukic,et al.  Trust-Based Development Framework for Distributed Systems and IoT , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[24]  Abdelmadjid Bouabdallah,et al.  TAS-IoT: Trust-Based Adaptive Security in the IoT , 2016, 2016 IEEE 41st Conference on Local Computer Networks (LCN).

[25]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[26]  Mohsen Guizani,et al.  Smart Cities: A Survey on Data Management, Security, and Enabling Technologies , 2017, IEEE Communications Surveys & Tutorials.

[27]  Oumaima Ben Abderrahim,et al.  TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[28]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[29]  David M. Eyers,et al.  TrustCEP: Adopting a Trust-Based Approach for Distributed Complex Event Processing , 2017, 2017 18th IEEE International Conference on Mobile Data Management (MDM).

[30]  Alessandro Margara,et al.  Deployment strategies for distributed complex event processing , 2012, Computing.

[31]  Wu Guoqing,et al.  Trust of Hardware , 2008, 2008 International Conference on Embedded Software and Systems Symposia.

[32]  Dirk Timmermann,et al.  ANTs: Application-driven network trust zones on MAC layer in smart buildings , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[33]  Jia Guo,et al.  A Mobile Cloud Hierarchical Trust Management Protocol for IoT Systems , 2017, 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud).

[34]  Hyun-Woo Lee,et al.  Toward a Trust Evaluation Mechanism in the Social Internet of Things , 2017, Sensors.

[35]  João H. Kleinschmidt,et al.  Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme , 2015, Int. J. Distributed Sens. Networks.

[36]  Eric Gilbert,et al.  Predicting tie strength with social media , 2009, CHI.

[37]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[38]  Antonio F. Gómez-Skarmeta,et al.  A Global Perspective of Smart Cities: A Survey , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[39]  Mohamed Hamdi,et al.  Game-based adaptive security in the Internet of Things for eHealth , 2014, 2014 IEEE International Conference on Communications (ICC).

[40]  Mirko Perkusich,et al.  A smart middleware to perform semantic discovery and trust evaluation for the Internet of Things , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[41]  Ralf Steinmetz,et al.  Operator Migration for Distributed Complex Event Processing in Device-to-Device Based Networks , 2016, M4IoT@Middleware.

[42]  Fabrício Enembreck,et al.  Trust and Reputation Models for Multiagent Systems , 2015, ACM Comput. Surv..

[43]  Mohamad Abou El-Nasr,et al.  CBSTM-IoT: Context-based social trust model for the Internet of Things , 2016, 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT).

[44]  Marcelo Knörich Zuffo,et al.  The semantic Mediation for the Swarm: An adaptable and organic solution for the Internet of Things , 2017, 2017 IEEE International Conference on Consumer Electronics (ICCE).

[45]  Antonio Iera,et al.  SIoT: Giving a Social Structure to the Internet of Things , 2011, IEEE Communications Letters.

[46]  Athanasios V. Vasilakos,et al.  A Survey on Ambient Intelligence in Healthcare , 2013, Proceedings of the IEEE.

[47]  Walaa Hamouda,et al.  Cellular LTE-A Technologies for the Future Internet-of-Things: Physical Layer Features and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[48]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[49]  Sarah Asiri,et al.  An IoT trust and reputation model based on recommender systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[50]  Dongman Lee,et al.  A Place-Aware Stereotypical Trust Supporting Scheme , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[51]  Jia Guo,et al.  Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.

[52]  Chen Shou,et al.  A data exchange optimized approach for cloud migration , 2015, 2015 4th International Conference on Computer Science and Network Technology (ICCSNT).

[53]  Shafiz Affendi Mohd Yusof,et al.  Timely trust: The use of IoT and cultural effects on swift trust formation within global virtual teams , 2017, 2017 8th International Conference on Information Technology (ICIT).

[54]  Jia Guo,et al.  Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).

[55]  Johannes Hund,et al.  Toward the Web of Things: Applying Web Technologies to the Physical World , 2015, Computer.

[56]  Roman Beck,et al.  Blockchain - the Gateway to Trust-Free Cryptographic Transactions , 2016, ECIS.

[57]  Anind K. Dey,et al.  Understanding and Using Context , 2001, Personal and Ubiquitous Computing.

[58]  Laurence T. Yang,et al.  Data Mining for Internet of Things: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[59]  Antonio Iera,et al.  From "smart objects" to "social objects": The next evolutionary step of the internet of things , 2014, IEEE Communications Magazine.

[60]  Jia Guo,et al.  A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..

[61]  Félix Gómez Mármol,et al.  Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.

[62]  Prem Prakash Jayaraman,et al.  Internet of Things and Edge Cloud Computing Roadmap for Manufacturing , 2016, IEEE Cloud Computing.

[63]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[64]  K A Rafidha Rehiman,et al.  A trust management model for sensor enabled mobile devices in IoT , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[65]  Nei Kato,et al.  A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues , 2017, IEEE Communications Surveys & Tutorials.

[66]  Farookh Khadeer Hussain,et al.  A Centralized Trust Management Mechanism for the Internet of Things (CTM-IoT) , 2017, BWCCA.

[67]  Yang Liu,et al.  A Storage Solution for Massive IoT Data Based on NoSQL , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[68]  Katia P. Sycara,et al.  Bootstrapping trust evaluations through stereotypes , 2010, AAMAS.

[69]  Friedemann Mattern,et al.  From the Internet of Computers to the Internet of Things , 2010, From Active Data Management to Event-Based Systems and More.

[70]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[71]  ChangSup Keum,et al.  Trustworthy gateway system providing IoT trust domain of smart home , 2017, 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).

[72]  Bin Sun,et al.  Trust management mechanism for Internet of Things , 2014 .

[73]  Mahadev Satyanarayanan,et al.  The Role of Cloudlets in Hostile Environments , 2013, IEEE Pervasive Comput..

[74]  Mark S. Granovetter T H E S T R E N G T H O F WEAK TIES: A NETWORK THEORY REVISITED , 1983 .

[75]  David M. Nicol,et al.  A Formal-Semantics-Based Calculus of Trust , 2010, IEEE Internet Computing.

[76]  Futai Zou,et al.  MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things , 2014, ICGEC.

[77]  Paul D. Manuel,et al.  A trust model of cloud computing based on Quality of Service , 2015, Ann. Oper. Res..

[78]  Kurt Rothermel,et al.  MCEP: A Mobility-Aware Complex Event Processing System , 2014, ACM Trans. Internet Techn..

[79]  Frank Englert,et al.  Analyzing the Influence of Instant Messaging on User Relationship Estimation , 2016, 2016 IEEE International Conference on Mobile Services (MS).

[80]  Marjorie Derven Four drivers to enhance global virtual teams , 2016 .

[81]  Jia Guo,et al.  A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems , 2015, 2015 IEEE International Conference on Services Computing.

[82]  Uthpala Subodhani Premarathne MAG-SIoT: A multiplicative attributes graph model based trust computation method for social Internet of Things , 2017, 2017 IEEE International Conference on Industrial and Information Systems (ICIIS).

[83]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[84]  Gyu Myoung Lee,et al.  Autonomic trust management in cloud-based and highly dynamic IoT applications , 2015, 2015 ITU Kaleidoscope: Trust in the Information Society (K-2015).

[85]  Thiemo Voigt,et al.  Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.

[86]  Navya Sri Nizamkari,et al.  A graph-based trust-enhanced recommender system for service selection in IOT , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).

[87]  Carolina V. L. Mendoza,et al.  Defense for selective attacks in the IoT with a distributed trust management scheme , 2016, 2016 IEEE International Symposium on Consumer Electronics (ISCE).

[88]  Dongman Lee,et al.  An adaptive IoT trust estimation scheme combining interaction history and stereotypical reputation , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[89]  Luis L. Martins,et al.  Global Virtual Teams: Key Developments, Research Gaps, and Future Directions , 2011 .

[90]  Geir M. Køien,et al.  Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[91]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[92]  Gyu Myoung Lee,et al.  RpR: A Trust Computation Model for Social Internet of Things , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).

[93]  Alberto Ferrante,et al.  QoS and security in energy-harvesting wireless sensor networks , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[94]  S NandiniPrasadK,et al.  Adaptation Trust based Protocol for IoT using Smartphones in social media: Travel map guide , 2016 .

[95]  Sherali Zeadally,et al.  Intelligent Device-to-Device Communication in the Internet of Things , 2016, IEEE Systems Journal.

[96]  Adam Wierzbicki,et al.  Enriching Trust Prediction Model in Social Network with User Rating Similarity , 2009, 2009 International Conference on Computational Aspects of Social Networks.

[97]  Gyu Myoung Lee,et al.  Data centric trust evaluation and prediction framework for IOT , 2017, 2017 ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K).

[98]  Mohsen Guizani,et al.  Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.

[99]  Hannes Tschofenig,et al.  The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method , 2007, RFC.

[100]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..