Trust2Vec: Large-Scale IoT Trust Management System Based on Signed Network Embeddings

被引:45
作者
Dhelim, Sahraoui [1 ]
Aung, Nyothiri [1 ]
Kechadi, Mohand Tahar [1 ]
Ning, Huansheng [2 ,3 ]
Chen, Liming [4 ]
Lakas, Abderrahmane [5 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci, Dublin D04V1W8, Ireland
[2] Jinzhong Univ, Sch Informat Technol & Engn, Jinzhong 030619, Shanxi, Peoples R China
[3] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[4] Ulster Univ, Sch Comp, Belfast BT37 0QB, North Ireland
[5] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
基金
中国国家自然科学基金; 爱尔兰科学基金会;
关键词
Bad-mouthing; device trust; Internet of Things (IoT); network embedding; self-promoting; trust management; INTERNET;
D O I
10.1109/JIOT.2022.3201772
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A trust management system (TMS) is an integral component of any Internet of Things (IoT) network. A reliable TMS must guarantee the network security, data integrity, and act as a referee that promotes legitimate devices, and punishes any malicious activities. Trust scores assigned by TMSs reflect devices' reputations, which can help predict the future behaviors of network entities and subsequently judge the reliability of different entities in the IoT networks. Many TMSs have been proposed in the literature, these systems are designed for small-scale trust attacks and can deal with attacks where a malicious device tries to undermine TMS by spreading fake trust reports. However, these systems are prone to large-scale trust attacks. To address this problem, in this article, we propose a TMS for large-scale IoT systems called Trust2Vec, which can manage trust relationships in large-scale IoT systems and can mitigate large-scale trust attacks that are performed by hundreds of malicious devices. Trust2Vec leverages a random-walk network exploration algorithm that navigates the trust relationship among devices and computes trust network embeddings, which enables it to analyze the latent network structure of trust relationships, even if there is no direct trust rating between two malicious devices. To detect large-scale attacks, such as self-promoting and bad-mouthing, we propose a network embeddings community detection algorithm that detects and blocks communities of malicious nodes. The effectiveness of Trust2Vec is validated through large-scale IoT network simulation. The results show that Trust2Vec can achieve up to 94% mitigation rate in various network settings.
引用
收藏
页码:553 / 562
页数:10
相关论文
共 33 条
  • [1] Abdelwahab O. M. M., 2016, 2016 AM SOC AGR BIOL, DOI [10.13031/aim.20162461032, DOI 10.13031/AIM.20162461032]
  • [2] Aung N., IEEE T INTELL TRANSP
  • [3] Dynamic traffic congestion pricing and electric vehicle charging management system for the internet of vehicles in smart cities
    Aung, Nyothiri
    Zhang, Weidong
    Sultan, Kashif
    Dhelim, Sahraoui
    Ai, Yibo
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (04) : 492 - 504
  • [4] T-Coin: Dynamic Traffic Congestion Pricing System for the Internet of Vehicles in Smart Cities
    Aung, Nyothiri
    Zhang, Weidong
    Dhelim, Sahraoui
    Ai, Yibo
    [J]. INFORMATION, 2020, 11 (03)
  • [5] Accident Prediction System Based on Hidden Markov Model for Vehicular Ad-Hoc Network in Urban Environments
    Aung, Nyothiri
    Zhang, Weidong
    Dhelim, Sahraoui
    Ai, Yibo
    [J]. INFORMATION, 2018, 9 (12):
  • [6] Multi-Perspective Trust Management Framework for Crowdsourced IoT Services
    Bahutair, Mohammed
    Bouguettaya, Athman
    Neiat, Azadeh Ghari
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 2396 - 2409
  • [7] Robot and its living space: A roadmap for robot development based on the view of living space
    Cai, Xiaofeng
    Ning, Huansheng
    Dhelim, Sahraoui
    Zhou, Rongjuan
    Zhang, Tao
    Xu, Yang
    Wan, Yueliang
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (04) : 505 - 517
  • [8] Trust-Based Service Management for Mobile Cloud IoT Systems
    Chen, Ing-Ray
    Guo, Jia
    Wang, Ding-Chau
    Tsai, Jeffrey J. P.
    Al-Hamadi, Hamid
    You, Ilsun
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (01): : 246 - 263
  • [9] A Survey on Network Embedding
    Cui, Peng
    Wang, Xiao
    Pei, Jian
    Zhu, Wenwu
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 31 (05) : 833 - 852
  • [10] IoT-Enabled Social Relationships Meet Artificial Social Intelligence
    Dhelim, Sahraoui
    Ning, Huansheng
    Farha, Fadi
    Chen, Liming
    Atzori, Luigi
    Daneshmand, Mahmoud
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (24) : 17817 - 17828