RobustTrust – A Pro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things

In the promising time of the Internet, connected things have the ability to communicate and share information. The Internet of Things (IoT) cannot be implemented unless the security-related concerns have been resolved. Sharing information among different devices can compromise the private information of users. Thus, a suitable mechanism is needed to exclude the risk of malicious and compromised nodes. As follows, trust has been proposed in the literature as a useful technology to maintain users’ security. Prior studies have proposed diverse trust management mechanisms to achieve adequate trust. The approach of cross-domain trust management is neglected that requires enormous considerations to address the difficulties related to cross-domain communication. In this paper, a cross-domain robust distributed trust management (RobustTrust) system is proposed, which makes a device fit for assessing trust towards different devices locally. In this system, the trust is divided into three components of security that help IoT nodes to become robust against compromised and malicious devices/nodes. The novelty of the proposed mechanism can be summarized in these aspects: A highly scalable trust mechanism, multiple components of evaluation to enhance robustness against attacks, and use of recommendations along with the feedback to build knowledge. Furthermore, the proposed mechanism is event-driven that helps nodes to evaluate trust more effectively as well as enhance the system efficiency. The proposed work is compared with the available trust evaluation schemes by concentrating on various attributes, such as trustworthiness, usability, and accuracy among others. The RobustTrust is validated by the extensive simulations considering absolute trust value’s performance, the accuracy of trust estimation, and several potential attacks.

[1]  Tang Yongchuan,et al.  Improved evidential fuzzy c-means method , 2018 .

[2]  Byung-Seo Kim,et al.  The Internet of Things: A Review of Enabled Technologies and Future Challenges , 2019, IEEE Access.

[3]  Nouredine Hadjsaid,et al.  Smart (Electricity) Grids for Smart Cities: Assessing Roles and Societal Impacts , 2018, Proceedings of the IEEE.

[4]  Gu Li-ze,et al.  Trust management mechanism for Internet of Things , 2014, China Communications.

[5]  Shancang Li,et al.  5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..

[6]  Koushik Majumder,et al.  SGSQoT: A Community-Based Trust Management Scheme in Internet of Things , 2018, Advances in Intelligent Systems and Computing.

[7]  J. Cynthia,et al.  Security Protocols for IoT , 2018, Studies in Big Data.

[8]  Peng Li,et al.  An Adaptive Dropout Deep Computation Model for Industrial IoT Big Data Learning With Crowdsourcing to Cloud Computing , 2019, IEEE Transactions on Industrial Informatics.

[9]  Jun Xu,et al.  Adaptive scaled unscented transformation for highly efficient structural reliability analysis by maximum entropy method , 2019, Structural Safety.

[10]  Snehanshu Saha,et al.  Machine Learning in Astronomy: A Case Study in Quasar-Star Classification , 2018, ArXiv.

[11]  Ziyan Jia,et al.  An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things , 2017, Wirel. Pers. Commun..

[12]  Paul J. Werbos,et al.  The New AI , 2019, Artificial Intelligence in the Age of Neural Networks and Brain Computing.

[13]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[14]  Shun Zhang,et al.  A Subjective and Objective Integration Approach of Determining Weights for Trustworthy Measurement , 2018, IEEE Access.

[15]  Izabella Lokshina,et al.  A Qualitative Evaluation of IoT-driven eHealth: Knowledge Management, Business Models and Opportunities, Deployment and Evolution , 2018, HICSS.

[16]  B. B. Gupta,et al.  Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.

[17]  Jiabin Yuan,et al.  Optimization Algorithms for Multiaccess Green Communications in Internet of Things , 2018, IEEE Internet of Things Journal.

[18]  Yacine Challal,et al.  A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.

[19]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[20]  Oumaima Ben Abderrahim,et al.  DTMS-IoT: A Dirichlet-based trust management system mitigating on-off attacks and dishonest recommendations for the Internet of Things , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[21]  Xiao Wang,et al.  A lightweight trust management based on Bayesian and Entropy for wireless sensor networks , 2015, Secur. Commun. Networks.

[22]  Subconvexity for modular form L-functions in the t aspect , 2017, Advances in Mathematics.

[23]  Oumaima Ben Abderrahim,et al.  CTMS-SIOT: A context-based trust management system for the social Internet of Things , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[24]  Yasir Faheem,et al.  An e-Health care services framework for the detection and classification of breast cancer in breast cytology images as an IoMT application , 2019, Future Gener. Comput. Syst..

[25]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[26]  Fernando De la Prieta,et al.  Conflict Resolution With Agents in Smart Cities , 2019, Smart Cities and Smart Spaces.

[27]  D. Cox,et al.  Applied Statistics: Principles and Examples , 1982 .

[28]  Shalini Batra,et al.  Trust management in social Internet of Things: A taxonomy, open issues, and challenges , 2020, Comput. Commun..

[29]  Ammar Rayes,et al.  Internet of Things Security and Privacy , 2017 .

[30]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[31]  Xing Li,et al.  Security Challenges and Concerns of Internet of Things (IoT) , 2019 .

[32]  David J. Wagg,et al.  An Efficient Likelihood-Free Bayesian Computation for Model Selection and Parameter Estimation Applied to Structural Dynamics , 2018, Structural Health Monitoring, Photogrammetry & DIC, Volume 6.

[33]  Peng Zhang,et al.  A Review on Trust Evaluation for Internet of Things , 2016, MobiMedia.

[34]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[35]  Mohsen Guizani,et al.  Machine learning in the Internet of Things: Designed techniques for smart cities , 2019, Future Gener. Comput. Syst..

[36]  Blase Ur,et al.  Rethinking Access Control and Authentication for the Home Internet of Things (IoT) , 2018, USENIX Security Symposium.

[37]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[38]  Peter Tolmie,et al.  From the Internet of Things to an Internet of Practices , 2017, ECSCW Exploratory Papers.

[39]  Jian Shen,et al.  Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things , 2018, IEEE Internet of Things Journal.

[40]  Mohsen Guizani,et al.  HoliTrust-A Holistic Cross-Domain Trust Management Mechanism for Service-Centric Internet of Things , 2019, IEEE Access.

[41]  Lin Chen,et al.  From Static to Dynamic Tag Population Estimation: An Extended Kalman Filter Perspective , 2016 .

[42]  Cheuk Hang Au,et al.  Integrating Knowledge Management into Information Security: From Audit to Practice , 2019, Int. J. Knowl. Manag..

[43]  Ruchi Agarwal,et al.  Improving Accuracy of Classification Based on C4.5 Decision Tree Algorithm Using Big Data Analytics , 2019 .

[44]  Puneet Sharma,et al.  End-to-End Message Authentication Using CoAP Over IoT , 2018, International Conference on Innovative Computing and Communications.

[45]  Akanksha Jain,et al.  A Survey on Miscellaneous Attacks and Countermeasures for RPL Routing Protocol in IoT , 2019 .

[46]  Karthikeyan Periasamy,et al.  A Comprehensive Study on Internet of Things Security , 2019, Advances in Computer and Electrical Engineering.

[47]  Xinyu Yang,et al.  A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.

[48]  Dongman Lee,et al.  An adaptive IoT trust estimation scheme combining interaction history and stereotypical reputation , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[49]  Jia Guo,et al.  Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).

[50]  Mohsen Guizani,et al.  Internet of Things: Part 3 , 2017, IEEE Commun. Mag..

[51]  João H. Kleinschmidt,et al.  Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme , 2015, Int. J. Distributed Sens. Networks.

[52]  Ashok Kumar Das,et al.  Government regulations in cyber security: Framework, standards and recommendations , 2019, Future Gener. Comput. Syst..

[53]  Emmanuel S. Pilli,et al.  A framework to manage Trust in Internet of Things , 2016, 2016 International Conference on Emerging Trends in Communication Technologies (ETCT).

[54]  Partha Pratim Ray A survey on Internet of Things architectures , 2018, J. King Saud Univ. Comput. Inf. Sci..

[55]  Donald Degraen Exploring Interaction Design for the Social Internet of Things , 2019, Social Internet of Things.

[56]  Mingchu Li,et al.  GroupTrust: Dependable Trust Management , 2017, IEEE Transactions on Parallel and Distributed Systems.

[57]  V. B. Narasimha,et al.  A Review on Application Security Management Using Web Application Security Standards , 2019 .

[58]  Ali Dehghantanha,et al.  Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[59]  Thierry De Pauw On ∞-harmonic functions , 2010 .

[60]  Chris Chatfield,et al.  Statistics for Technology-A Course in Applied Statistics. , 1984 .

[61]  Byung-Seo Kim,et al.  Trust Management Techniques for the Internet of Things: A Survey , 2019, IEEE Access.

[62]  Jun Tanimoto,et al.  Three-strategy and four-strategy model of vaccination game introducing an intermediate protecting measure , 2019, Appl. Math. Comput..

[63]  Oumaima Ben Abderrahim,et al.  TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[64]  M. L. Valarmathi,et al.  Trust management for reliable decision making among social objects in the Social Internet of Things , 2017, IET Networks.

[65]  Heisnam Rohen Singh,et al.  Recent Neuro-Fuzzy Approaches for Feature Selection and Classification , 2019 .

[66]  Mohsen Ghasemi,et al.  Threats of Social Engineering Attacks Against Security of Internet of Things (IoT) , 2018, Lecture Notes in Electrical Engineering.

[67]  Suresha,et al.  Survey of Security Mechanisms in Internet of Things , 2019 .