Trust score estimation for device to device communication in internet of thing using fuzzy approach

Rapid development in the Internet of Things every day more and more devices are touching the human world from CCTV cameras to light sensors to washing machines to smoke sensors etc. When IoT device communicates with each other there are many issues and challenges regarding security and privacy. One of the important issue is trust management and how to calculate the trust score. This issue and challenge are proposed in this paper. The proposed method makes trust score calculation in IoT very much promising. The fuzzy method is proposed in this paper that is more reliable than other fuzzy approaches used in the past. This fuzzy approach uses three linguistic values for six parameters which are calculated from data collected from IoT devices. The output of the fuzzy method is a fuzzy set which has three linguistic value. In this paper, we have also generated real-time datasets using a fuzzy approach and calculating all six parameters whose values are extracted from devices. We generate two datasets and compare them to check our approach of calculating the trust score is correct or not.

[1]  Indrajit Ray,et al.  TrustBAC: integrating trust relationships into the RBAC model for access control in open systems , 2006, SACMAT '06.

[2]  Ebrahim H. Mamdani,et al.  A linguistic self-organizing process controller , 1979, Autom..

[3]  R. Thirukkumaran,et al.  Survey: Security and Trust Management in Internet of Things , 2018, 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN).

[4]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[5]  Arjan Durresi,et al.  Trust Management Framework for Internet of Things , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[6]  Guanglin Xing,et al.  Trust calculation and delivery control in trust-based access control , 2008, Wuhan University Journal of Natural Sciences.

[7]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[8]  Neeli R. Prasad,et al.  A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.

[9]  Bin Luo,et al.  Timing Channel in IaaS: How to Identify and Investigate , 2018, IEEE Access.

[10]  Mark Weiser The computer for the 21st century , 1991 .

[11]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[12]  Bin Sun,et al.  Trust management mechanism for Internet of Things , 2014 .

[13]  M. M. Ollivier RFID-a new solution technology for security problems , 1995 .

[14]  Hongjian Sun,et al.  A Fuzzy Logic Trust Model for Secure Routing in Smart Grid Networks , 2017, IEEE Access.

[15]  T. Ross Fuzzy Logic with Engineering Applications , 1994 .

[16]  Ramjee Prasad,et al.  Identity establishment and capability based access control (IECAC) scheme for Internet of Things , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.

[17]  Byung-Seo Kim,et al.  Trust Management Techniques for the Internet of Things: A Survey , 2019, IEEE Access.

[18]  Indrajit Ray,et al.  A Vector Model of Trust for Developing Trustworthy Systems , 2004, ESORICS.

[19]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[20]  Enrico Zio,et al.  A Bayesian Optimal Design for Accelerated Degradation Testing Based on the Inverse Gaussian Process , 2017, IEEE Access.

[21]  Yusheng Ji,et al.  Decentralized Trust Evaluation in Vehicular Internet of Things , 2019, IEEE Access.