A Utility-Based Reputation Model for the Internet of Things

The MQTT protocol has emerged over the past decade as a key protocol for a number of low power and lightweight communication scenarios including machine-to-machine and the Internet of Things. In this paper we develop a utility-based reputation model for MQTT, where we can assign a reputation score to participants in a network based on monitoring their behaviour. We mathematically define the reputation model using utility functions on participants based on the expected and perceived behaviour of MQTT clients and servers. We define an architecture for this model, and discuss how this architecture can be implemented using existing MQTT open source tools, and we demonstrate how experimental results obtained from simulating the architecture compare with the expected outcome of the theoretical reputation model.

[1]  Álvaro Enrique Arenas,et al.  Reputation management in collaborative computing systems , 2010, Secur. Commun. Networks.

[2]  Gheorghe Cosmin Silaghi,et al.  Reputation-based trust management systems and their applicability to grids , 2007 .

[3]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[4]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[5]  Brian L. Mark,et al.  A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.

[6]  Brian L. Mark,et al.  E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks , 2009, Ad Hoc Networks.

[7]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[8]  K. Suzanne Barber,et al.  Learning trust strategies in reputation exchange networks , 2006, AAMAS '06.

[9]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[10]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[11]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[12]  Kenneth P. Birman,et al.  Exploiting virtual synchrony in distributed systems , 1987, SOSP '87.

[13]  Geoff W. Hamilton,et al.  Reputation-Controlled Business Process Workflows , 2013, 2013 International Conference on Availability, Reliability and Security.

[14]  Nicholas R. Jennings,et al.  An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.

[15]  Steve Vinoski,et al.  Advanced Message Queuing Protocol , 2006, IEEE Internet Computing.

[16]  Geoff W. Hamilton,et al.  Enforcing Reputation Constraints on Business Process Workflows , 2014, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..