RobustTrust - A Pro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things

被引:64
作者
Awan, Kamran Ahmad [1 ]
Din, Ikram Ud [1 ]
Almogren, Ahmad [2 ]
Guizani, Mohsen [3 ]
Altameem, Ayman [4 ]
Jadoon, Sultan Ullah [1 ]
机构
[1] Univ Haripur, Dept Informat Technol, Haripur 22620, Pakistan
[2] King Saud Univ, Coll Comp & Informat Sci, Riyadh 11543, Saudi Arabia
[3] Qatar Univ, Comp Sci & Engn Dept, Doha 2713, Qatar
[4] King Saud Univ, Coll Appl Studies & Community Serv, Dept Nat & Engn Sci, Riyadh 11543, Saudi Arabia
关键词
Direct observation; IoT; robust trust; trust management; trust evaluation; SOCIAL INTERNET; SECURITY; CLASSIFICATION; CHALLENGES; FRAMEWORK;
D O I
10.1109/ACCESS.2019.2916340
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the promising time of the Internet, connected things have the ability to communicate and share information. The Internet of Things (IoT) cannot be implemented unless the security-related concerns have been resolved. Sharing information among different devices can compromise the private information of users. Thus, a suitable mechanism is needed to exclude the risk of malicious and compromised nodes. As follows, trust has been proposed in the literature as a useful technology to maintain users' security. Prior studies have proposed diverse trust management mechanisms to achieve adequate trust. The approach of cross-domain trust management is neglected that requires enormous considerations to address the difficulties related to cross-domain communication. In this paper, a cross-domain robust distributed trust management (RobustTrust) system is proposed, which makes a device fit for assessing trust towards different devices locally. In this system, the trust is divided into three components of security that help IoT nodes to become robust against compromised and malicious devices/nodes. The novelty of the proposed mechanism can be summarized in these aspects: A highly scalable trust mechanism, multiple components of evaluation to enhance robustness against attacks, and use of recommendations along with the feedback to build knowledge. Furthermore, the proposed mechanism is event-driven that helps nodes to evaluate trust more effectively as well as enhance the system efficiency. The proposed work is compared with the available trust evaluation schemes by concentrating on various attributes, such as trustworthiness, usability, and accuracy among others. The RobustTrust is validated by the extensive simulations considering absolute trust value's performance, the accuracy of trust estimation, and several potential attacks.
引用
收藏
页码:62095 / 62106
页数:12
相关论文
共 68 条
[1]  
Abdel-Rahim O, 2016, 2016 19 INT C EL MAC, P1, DOI [10.13031/aim.20162461032, DOI 10.13031/AIM.20162461032]
[2]   Security in Internet of Things: issues, challenges, taxonomy, and architecture [J].
Adat, Vipindev ;
Gupta, B. B. .
TELECOMMUNICATION SYSTEMS, 2018, 67 (03) :423-441
[3]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[4]   Three-strategy and four-strategy model of vaccination game introducing an intermediate protecting measure [J].
Alam, Muntasir ;
Kuga, Kazuki ;
Tanimoto, Jun .
APPLIED MATHEMATICS AND COMPUTATION, 2019, 346 :408-422
[5]  
[Anonymous], FUTURE GENER COMPUT
[6]  
[Anonymous], 2018, Security and Privacy in Smart Sensor Networks: IGI Global122-146
[7]   Integrating Knowledge Management into Information Security: From Audit to Practice [J].
Au, Cheuk Hang ;
Fung, Walter S. L. .
INTERNATIONAL JOURNAL OF KNOWLEDGE MANAGEMENT, 2019, 15 (01) :37-52
[8]   HoliTrust-A Holistic Cross-Domain Trust Management Mechanism for Service-Centric Internet of Things [J].
Awan, Kamran Ahmad ;
Din, Ikram Ud ;
Zareei, Mardi ;
Talha, Muhammad ;
Guizani, Mohsen ;
Jadoon, Sultan Ullah .
IEEE ACCESS, 2019, 7 :52191-52201
[9]  
Bao F., 2013, 2013 IEEE eleventh international symposium on autonomous decentralized systems (ISADS), P1, DOI [10.1109/ISADS.2013.6513398, DOI 10.1109/ISADS.2013.6513398]
[10]  
Bao F., 2012, IEEE WOWMOM 2012 WOR, P1