Ensuring trustworthiness for P2P-based M2M applications

P2P-based M2M application frameworks have several advantages, such as increased flexibility, efficiency and a lack of single point of failure as compared to centralised approaches. However, there are several security drawbacks which need to be addressed in order to provide the user a secure environment for the provision and usage of M2M applications. This publication presents different security issues inside P2P-based M2M application frameworks and evaluates P2P protocols based on security. In order to avoid different security attacks, the concept of trust and its importance are emphasized. Furthermore, a trust management system with special trust metric parameters is presented which considers the architecture of P2P-based M2M applications. Finally, blockchain principles are integrated for optimising the overall security in the system by improving data storage between peers, avoiding volatility of peers and ensuring correct working M2M applications.

[1]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[2]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[3]  Nick Szabo,et al.  Formalizing and Securing Relationships on Public Networks , 1997, First Monday.

[4]  Roy H. Campbell,et al.  World of Empowered IoT Users , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).

[5]  Armin Lehmann,et al.  Framework for automated functional testing of P2P-based M2M applications , 2017, 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).

[6]  Apostolos Malatras,et al.  State-of-the-art survey on P2P overlay networks in pervasive computing environments , 2015, J. Netw. Comput. Appl..

[7]  John R. Vacca Computer and Information Security Handbook , 2009 .

[8]  Mudhakar Srivatsa,et al.  Vulnerabilities and security threats in structured overlay networks: a quantitative analysis , 2004, 20th Annual Computer Security Applications Conference.

[9]  Sheila Anand,et al.  A survey on Security Issues of Reputation Management Systems for Peer-to-Peer Networks , 2012, Comput. Sci. Rev..

[10]  Giuseppe Ciaccio,et al.  Recipient Anonymity in a Structured Overlay , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).

[11]  Abdelmadjid Bouabdallah,et al.  M2M Security: Challenges and Solutions , 2016, IEEE Communications Surveys & Tutorials.

[12]  Xiao Nie,et al.  M2M security threat and security mechanism research , 2013, Proceedings of 2013 3rd International Conference on Computer Science and Network Technology.

[13]  Robert Tappan Morris,et al.  Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.

[14]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[15]  Ralph Deters,et al.  Using Blockchain to push Software-Defined IoT Components onto Edge Hosts , 2016, BDAW '16.

[16]  Bogdan Ghita,et al.  Decentralised system architecture for autonomous and cooperative M2M application service provision , 2017, 2017 IEEE International Conference on Smart Grid and Smart Cities (ICSGSC).

[17]  Klemens Böhm,et al.  Malicious behaviour in content-addressable peer-to-peer networks , 2005, 3rd Annual Communication Networks and Services Research Conference (CNSR'05).

[18]  Jia Guo,et al.  Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.

[19]  Rakesh Kumar,et al.  The FastTrack overlay: A measurement study , 2006, Comput. Networks.

[20]  Zeinab Movahedi,et al.  A Trust-Based Offloading for Mobile M2M Communications , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).

[21]  Vallipuram Muthukkumarasamy,et al.  Securing Smart Cities Using Blockchain Technology , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[22]  Joan Arnedo-Moreno,et al.  A survey on security in JXTA applications , 2009, J. Syst. Softw..

[23]  Bogdan V. Ghita,et al.  P2p-based community concept for M2M applications , 2013, Second International Conference on Future Generation Communication Technologies (FGCT 2013).

[24]  João H. Kleinschmidt,et al.  Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme , 2015, Int. J. Distributed Sens. Networks.

[25]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[26]  Maher Khemakhem,et al.  Taxonomy of Structured P2P Overlay Networks Security Attacks , 2012 .

[27]  Guy Pujolle,et al.  Trust-Distortion Resistant Trust Management Frameworks on Mobile Ad Hoc Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[28]  Shawn Wilkinson,et al.  Storj A Peer-to-Peer Cloud Storage Network , 2014 .

[29]  Martin Kappes,et al.  Netzwerk- und Datensicherheit , 2013 .

[30]  Jane Yung-jen Hsu,et al.  Building Smart M2M Applications Using the WuKong Profile Framework , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[31]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[32]  Djamal Zeghlache,et al.  Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..