Trust Management in the Internet of Things

The internet of things (IoT) is a new paradigm where users, objects, and any things are interconnected using wired and wireless technology such as RFID, ZigBee, WSN, NFC, Bluetooth, GPRS, and LTE. In this last decade, the IoT concept has attracted significant attention from both industrial and research communities. Many application domains may have significant benefits with IoT systems. These domains range from home automation, environmental monitoring, healthcare, to logistic and smart grid. Nevertheless, the IoT is facing many security issues such as authentication, key management, identification, availability, privacy, and trust management. Indeed, establishing trust relationships between nodes in IoT represents a primary security milestone to have reliable systems that exclude malicious nodes. However, trust management in an IoT constrained and ubiquitous environment represents a real challenge. This chapter presents an overview of trust management in IoT. This overview explains and demonstrates the usefulness of trust management and how it should be exploited in IoT. Trust Management in the Internet of Things

[1]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[2]  Tharam S. Dillon,et al.  Keynote 2: Trust and Reputation Relationships in Service-Oriented Environments , 2005, ICITA.

[3]  Jia Guo,et al.  Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).

[4]  Yang Yu,et al.  Distributed Trust Management Mechanism for the Internet of Things , 2013 .

[5]  Wei Wang,et al.  A Trust Establishment Scheme for Cluster-Based Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[6]  Annett Laube,et al.  Trustworthiness Assessment of Wireless Sensor Data for Business Applications , 2009, 2009 International Conference on Advanced Information Networking and Applications.

[7]  Kai-Di Chang,et al.  Mobility-Aware Interference Avoidance Scheme for Vehicular WLANs , 2012, KSII Trans. Internet Inf. Syst..

[8]  Mohammad Sayad Haghighi,et al.  A conceptual trust model for the Internet of Things interactions , 2016, 2016 8th International Symposium on Telecommunications (IST).

[9]  Yoonmee Doh,et al.  PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[10]  Gabi Dreo Rodosek,et al.  Towards a trust computing architecture for RPL in Cyber Physical Systems , 2013, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).

[11]  Zheng Yan,et al.  Trust Modeling and Management: From Social Trust to Digital Trust , 2008 .

[12]  Djamal Zeghlache,et al.  Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..

[13]  Jin-Hee Cho,et al.  Hierarchical trust management for wireless sensor networks and its application to trust-based routing , 2011, SAC '11.

[14]  Theodore B. Zahariadis,et al.  Design of primary and composite routing metrics for RPL-compliant Wireless Sensor Networks , 2012, 2012 International Conference on Telecommunications and Multimedia (TEMU).

[15]  Susan Wiedenbeck,et al.  On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..

[16]  Félix Gómez Mármol,et al.  Dynamic and flexible selection of a reputation mechanism for heterogeneous environments , 2015, Future Gener. Comput. Syst..

[17]  Tae Kyung Kim,et al.  A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .

[18]  Zheng Yan,et al.  Autonomic Trust Management for a Component-Based Software System , 2011, IEEE Transactions on Dependable and Secure Computing.

[19]  Javier López,et al.  Modelling trust dynamics in the Internet of Things , 2017, Inf. Sci..

[20]  Djamel Tandjaoui,et al.  Trust-based RPL for the Internet of Things , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[21]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[22]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[23]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[24]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[25]  Imed Romdhani,et al.  A Trust-Based Intrusion Detection System for Mobile RPL Based Networks , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[26]  Levente Buttyán,et al.  Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .

[27]  Yan Lindsay Sun,et al.  Trust Management for Defending On-Off Attacks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[28]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[29]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[30]  Wang-Chien Lee,et al.  Using sensorranks for in-network detection of faulty readings in wireless sensor networks , 2007, MobiDE '07.

[31]  Oumaima Ben Abderrahim,et al.  DTMS-IoT: A Dirichlet-based trust management system mitigating on-off attacks and dishonest recommendations for the Internet of Things , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[32]  Bin Sun,et al.  Trust management mechanism for Internet of Things , 2014 .

[33]  Hyunsoo Yoon,et al.  Trust evaluation model for wireless sensor networks , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..

[34]  Zou Deqing,et al.  A hierarchical virus immunization method for community networks , 2014, China Communications.

[35]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[36]  Mark Perry,et al.  Online Trust: Definition and Principles , 2010, 2010 Fifth International Multi-conference on Computing in the Global Information Technology.

[37]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[38]  Huafeng Wu,et al.  Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking , 2007 .

[39]  Jeremy M. Kaplan,et al.  Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds , 2017, IEEE Transactions on Cloud Computing.

[40]  Yeping He,et al.  A secure and rapid response architecture for virtual machine migration from an untrusted hypervisor to a trusted one , 2017, Frontiers of Computer Science.

[41]  Kathryn M. Kimery,et al.  THIRD-PARTY ASSURANCES: MAPPING THE ROAD TO TRUST IN E-RETAILING , 2002 .

[42]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[43]  H. T. Mouftah,et al.  Mobility-aware trustworthy crowdsourcing in cloud-centric Internet of Things , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).

[44]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[45]  Imed Romdhani,et al.  New trust metric for the RPL routing protocol , 2017, 2017 8th International Conference on Information and Communication Systems (ICICS).

[46]  Javier López,et al.  A framework for enabling trust requirements in social cloud applications , 2013, Requirements Engineering.

[47]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[48]  José Manuel Moya,et al.  Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps , 2011, CISIS.

[49]  Henry Nunoo-Mensah,et al.  The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: A survey , 2018, Int. J. Commun. Syst..

[50]  Jia Guo,et al.  Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[51]  Theodore B. Zahariadis,et al.  Evaluation of RPL with a transmission count-efficient and trust-aware routing metric , 2014, 2014 IEEE International Conference on Communications (ICC).

[52]  Hyun-Woo Lee,et al.  Toward a Trust Evaluation Mechanism in the Social Internet of Things , 2017, Sensors.

[53]  João H. Kleinschmidt,et al.  Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme , 2015, Int. J. Distributed Sens. Networks.

[54]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[55]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[56]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[57]  Jörg Daubert,et al.  A view on privacy & trust in IoT , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[58]  Javier López,et al.  A Conceptual Framework for Trust Models , 2012, TrustBus.

[59]  Guangjie Han,et al.  Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..

[60]  Peter Herrmann,et al.  A Trust-based Resilient Routing Mechanism for the Internet of Things , 2017, ARES.

[61]  Jia Guo,et al.  A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..