Tesia: A trusted efficient service evaluation model in Internet of things based on improved aggregation signature

Service evaluation model is an essential ingredient in service‐oriented Internet of things (IoT) architecture. Generally, traditional models allow each user to submit their comments with respect to IoT services individually. However, these kind of models are fragile to resist various attacks, like comment denial attacks, and Sybil attacks, which may decrease the comments submission rate. In this article, we propose a new aggregation digital signature scheme to resolve the problem of comments aggregation, which may aggregate different comments into one with high efficiency and security level. Based on the new aggregation digital signature scheme, we further put forward a new service evaluation model named Tesia allowing specific users to submit the comments as a group in IoT networks. More specifically, they aggregate comments and assign one user as a submitter to submit these comments. In addition, we introduce the synchronization token mechanism into the new service evaluation model, to assure that all users in the group may sign their comments one by one, and the last one who receives the token is assigned as the final submitter. Tesia has more acceptable robustness and can greatly improve the comments submission rate with rather lower submission delay time.

[1]  Xinchun Cui,et al.  Secure computation protocols under asymmetric scenarios in enterprise information system , 2019, Enterp. Inf. Syst..

[2]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[3]  Jian Shen,et al.  An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.

[4]  Yu Zhang,et al.  Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications , 2011, IEEE Transactions on Mobile Computing.

[5]  Fengyuan Xu,et al.  SybilDefender: Defend against sybil attacks in large social networks , 2012, 2012 Proceedings IEEE INFOCOM.

[6]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[7]  Debiao He,et al.  New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment , 2018, Secur. Commun. Networks.

[8]  Chin-Chen Chang,et al.  Public audit for operation behavior logs with error locating in cloud storage , 2019, Soft Comput..

[9]  Xiaohui Liang,et al.  SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[10]  Anupam Das,et al.  SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems , 2012, IEEE Transactions on Dependable and Secure Computing.

[11]  Hong Liu,et al.  A scalable coevolutionary multi-objective particle swarm optimizer , 2010, Int. J. Comput. Intell. Syst..

[12]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[13]  Hao Wang,et al.  Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps , 2018, Soft Comput..

[14]  Hridesh Rajan,et al.  Tisa: Toward Trustworthy Services in a Service-Oriented Architecture , 2008, IEEE Transactions on Services Computing.

[15]  Witold Pedrycz,et al.  Publicly verifiable privacy-preserving aggregation and its application in IoT , 2019, J. Netw. Comput. Appl..

[16]  R. R. Rejimol Robinson,et al.  Evaluation of mitigation methods for distributed denial of service attacks , 2012, 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA).

[17]  Fengyin Li,et al.  A game-theoretic method based on Q-learning to invalidate criminal smart contracts , 2019, Inf. Sci..

[18]  Nima Jafari Navimipour,et al.  Trust evaluation between users of social networks using the quality of service requirements and call log histories , 2016, Kybernetes.

[19]  S. RaijaSulthana,et al.  SYBILDEFENDER: DEFEND AGAINST SYBIL ATTACKS IN LARGE SOCIAL NETWORKS , 2015 .

[20]  Hao Wang,et al.  Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing , 2016, Soft Computing.

[21]  Hao Wang,et al.  New directly revocable attribute-based encryption scheme and its application in cloud storage environment , 2016, Cluster Computing.

[22]  Xiaohui Liang,et al.  Enabling Trustworthy Service Evaluation in Service-oriented Mobile Social Networks , 2022 .

[23]  Lei Li,et al.  Two-dimensional trust rating aggregations in service-oriented applications , 2011, IEEE Transactions on Services Computing.

[24]  Tao Li,et al.  Randomness invalidates criminal smart contracts , 2019, Inf. Sci..

[25]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[26]  Erman Ayday,et al.  Iterative Trust and Reputation Management Using Belief Propagation , 2012, IEEE Transactions on Dependable and Secure Computing.

[27]  Hongyang Yan,et al.  Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records , 2019, IEEE Access.

[28]  Jiming Chen,et al.  VTube: Towards the media rich city life with autonomous vehicular content distribution , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[29]  Liehuang Zhu,et al.  An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks , 2018, Sensors.

[30]  Xiangwei Zheng,et al.  A Multidomain Survivable Virtual Network Mapping Algorithm , 2017, Secur. Commun. Networks.

[31]  Xiaohui Liang,et al.  Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks , 2012, IEEE Transactions on Vehicular Technology.