Trust-Based Service Management for Social Internet of Things Systems

被引:263
作者
Chen, Ing-Ray [1 ]
Bao, Fenye [1 ]
Guo, Jia [1 ]
机构
[1] Virginia Tech, Dept Comp Sci, Falls Church, VA 22043 USA
关键词
Trust management; Internet of things; social networking; performance analysis; adaptive control; security; REPUTATION; MODEL;
D O I
10.1109/TDSC.2015.2420552
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A social internet of things (IoT) system can be viewed as a mix of traditional peer-to-peer networks and social networks, where "things" autonomously establish social relationships according to the owners' social networks, and seek trusted "things" that can provide services needed when they come into contact with each other opportunistically. We propose and analyze the design notion of adaptive trust management for social IoT systems in which social relationships evolve dynamically among the owners of IoT devices. We reveal the design tradeoff between trust convergence versus trust fluctuation in our adaptive trust management protocol design. With our adaptive trust management protocol, a social IoT application can adaptively choose the best trust parameter settings in response to changing IoT social conditions such that not only trust assessment is accurate but also the application performance is maximized. We propose a table-lookup method to apply the analysis results dynamically and demonstrate the feasibility of our proposed adaptive trust management scheme with two real-world social IoT service composition applications.
引用
收藏
页码:684 / 696
页数:13
相关论文
共 45 条
[31]  
[李倩倩 Li Qianqian], 2010, [高分子通报, Polymer Bulletin], P1
[32]   Smart Community: An Internet of Things Application [J].
Li, Xu ;
Lu, Rongxing ;
Liang, Xiaohui ;
Shen, Xuemin ;
Chen, Jiming ;
Lin, Xiaodong .
IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (11) :68-75
[33]  
Liu L, 2012, COMM COM INF SC, V312, P559
[34]   Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems [J].
Mitchell, Robert ;
Chen, Ing-Ray .
IEEE TRANSACTIONS ON RELIABILITY, 2013, 62 (01) :199-210
[35]  
Nitti M., 2014, IEEE T KNOWL DATA MA, V26, P1
[36]   Trust Management In Privacy - Preserving Information System [J].
Peng, Kun ;
Bao, Feng .
PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, :1-4
[37]  
Pintus A., 2012, P 21 INT C COMP WORL, P401, DOI DOI 10.1145/2187980.2188059
[38]   QoS-aware and compromise-resilient key management scheme for heterogeneous wireless Internet of Things [J].
Ren, Wei .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2011, 21 (04) :284-299
[39]   Securing the Internet of Things [J].
Roman, Rodrigo ;
Najera, Pablo ;
Lopez, Javier .
COMPUTER, 2011, 44 (09) :51-58
[40]   A Survey of Trust in Social Networks [J].
Sherchan, Wanita ;
Nepal, Surya ;
Paris, Cecile .
ACM COMPUTING SURVEYS, 2013, 45 (04)