A Survey on Trust Computation in the Internet of Things

Internet of Things defines a large number of diverse entities and services which interconnect with each other and individually or cooperatively operate depending on context, conditions and environments, produce a huge personal and sensitive data. In this scenario, the satisfaction of privacy, security and trust objectives plays a critical role in the success of the Internet of Things. Trust here can be considered as a key property to establish trustworthy and seamless connectivity among entities and to guarantee secure services and applications. The aim of this study is to provide a survey on various trust computation strategies and identify future trends in the field. We discuss trust computation methods under several aspects and provide comparison of the approaches based on trust features, performance, advantages, weaknesses and limitations of each strategy. Finally the research discuss on the gap of the trust literature and raise some research directions in trust computation in the Internet of Things.

[1]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[2]  S Hailes,et al.  Using Recommendations for Managing Trust in Distributed Systems , 1997 .

[3]  Marianne Winslett,et al.  Interoperable strategies in automated trust negotiation , 2001, CCS '01.

[4]  S. Buchegger,et al.  A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .

[5]  Tai-Myoung Chung,et al.  Cluster-Based Trust Model against Attacks in Ad-Hoc Networks , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[6]  James A. Hendler,et al.  Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-Based Social Networks , 2004, EKAW.

[7]  Zheng Yan,et al.  Autonomic Trust Management for a Component-Based Software System , 2011, IEEE Transactions on Dependable and Secure Computing.

[8]  Wolfgang Nejdl,et al.  Personalized Reputation Management in P2P Networks , 2004, ISWC Workshop on Trust, Security, and Reputation on the Semantic Web.

[9]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[10]  Timothy W. Finin,et al.  A Policy Based Approach to Security for the Semantic Web , 2003, SEMWEB.

[11]  Jia Guo,et al.  Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).

[12]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[13]  Marianne Winslett,et al.  PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web , 2004, Secure Data Management.

[14]  Christian Damsgaard Jensen,et al.  Trust enhanced ubiquitous payment without too much privacy loss , 2004, SAC '04.

[15]  Jaime Lloret,et al.  Internet of things: where to be is to trust , 2012, EURASIP J. Wirel. Commun. Netw..

[16]  Mehmet A. Orgun,et al.  The prediction of trust rating based on the quality of services using fuzzy linear regression , 2011, 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011).

[17]  N. Truong,et al.  A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things , 2016 .

[18]  Lik Mui,et al.  Computational models of trust and reputation: agents, evolutionary games, and social networks , 2002 .

[19]  Guido Barbian,et al.  Trust Centrality in Online Social Networks , 2011, 2011 European Intelligence and Security Informatics Conference.

[20]  Sergey Brin,et al.  The Anatomy of a Search Engine , 2009 .

[21]  Karl Aberer,et al.  QoS-Based Service Selection and Ranking with Trust and Reputation Management , 2005, OTM Conferences.

[22]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[23]  Mohan Kumar,et al.  DTT: A Distributed Trust Toolkit for pervasive systems , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[24]  Sean W. Smith,et al.  Protecting client privacy with trusted computing at the server , 2005, IEEE Security & Privacy Magazine.

[25]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[26]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[27]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[28]  Munindar P. Singh,et al.  A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.

[29]  Mogens Nielsen,et al.  Towards a formal notion of trust , 2003, PPDP '03.

[30]  Pierangela Samarati,et al.  Regulating service access and information release on the Web , 2000, CCS.

[31]  Naima Iltaf,et al.  An Effective Model for Indirect Trust Computation in Pervasive Computing Environment , 2014, Wirel. Pers. Commun..

[32]  Eric Dubois,et al.  Towards a Decision Model Based on Trust and Security Risk Management , 2009, AISC.

[33]  Marianne Winslett,et al.  Negotiating Trust on the Web , 2002, IEEE Internet Comput..

[34]  Ling Liu,et al.  A reputation-based trust model for peer-to-peer e-commerce communities , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[35]  Ninghui Li,et al.  DATALOG with Constraints: A Foundation for Trust Management Languages , 2003, PADL.

[36]  Peter Sewell,et al.  Cassandra: distributed access control policies with tunable expressiveness , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..

[37]  Azzedine Boukerche,et al.  Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[38]  Chris McDonald,et al.  Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..

[39]  Azzedine Boukerche,et al.  A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks , 2008, PE-WASUN '08.

[40]  Paolo Avesani,et al.  Controversial Users Demand Local Trust Metrics: An Experimental Study on Epinions.com Community , 2005, AAAI.

[41]  Fabien L. Gandon,et al.  Semantic web technologies to reconcile privacy and context awareness , 2003, Journal of Web Semantics.

[42]  Jia Guo,et al.  Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[43]  Sneha Kumar Kasera,et al.  Statistical trust establishment in wireless sensor networks , 2007, 2007 International Conference on Parallel and Distributed Systems.

[44]  Lei Li,et al.  Price Trust Evaluation in E-service Oriented Applications , 2008, 2008 10th IEEE Conference on E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E-Services.

[45]  G. Zacharia Collaborative reputation mechanisms for online communities , 1999 .

[46]  F. Hussain Trust and Reputation for Service-oriented Environments , 2006 .

[47]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[48]  Munindar P. Singh,et al.  Detecting deception in reputation management , 2003, AAMAS '03.

[49]  Jennifer Golbeck,et al.  Inferring Reputation on the Semantic Web , 2004, WWW 2004.

[50]  Jordi Sabater-Mir,et al.  Reputation and social network analysis in multi-agent systems , 2002, AAMAS '02.

[51]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System , 1998 .

[52]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[53]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[54]  K.E. Seamons,et al.  Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[55]  Marianne Winslett,et al.  How to Exploit Ontologies for Trust Negotiation , 2004, Trust@ISWC.

[56]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[57]  Neeli R. Prasad,et al.  A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.

[58]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[59]  Jeffrey M. Bradshaw,et al.  KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[60]  A. Rajaram,et al.  A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks , 2009, ArXiv.

[61]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[62]  Tharam S. Dillon,et al.  Fuzzy nature of trust and dynamic trust modeling in service oriented environments , 2005, SWS '05.

[63]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[64]  Germano Caronni,et al.  Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).

[65]  Rukshan Athauda,et al.  A holistic review on trust and reputation management systems for digital environments , 2012 .

[66]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[67]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[68]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[69]  Ninghui Li,et al.  RT: a Role-based Trust-management framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[70]  Vladimiro Sassone,et al.  A formal model for trust in dynamic networks , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..

[71]  G. Black,et al.  Probabilities , 1875, The American journal of dental science.

[72]  Marianne Winslett,et al.  Policy migration for sensitive credentials in trust negotiation , 2003, WPES '03.

[73]  Piero A. Bonatti,et al.  Driving and monitoring provisional trust negotiation with metapolicies , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).

[74]  Sungyoung Lee,et al.  Trust Management Problem in Distributed Wireless Sensor Networks , 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06).

[75]  Ninghui Li,et al.  Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..