Edge-Computing-Based Trustworthy Data Collection Model in the Internet of Things

被引:107
作者
Wang, Tian [1 ]
Qiu, Lei [1 ]
Sangaiah, Arun Kumar [2 ]
Liu, Anfeng [3 ]
Bhuiyan, Md Zakirul Alam [4 ]
Ma, Ying [5 ]
机构
[1] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[3] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[4] Fordham Univ, Dept Comp & Informat Sci, New York, NY 10458 USA
[5] Xiamen Univ Technol, Coll Comp & Informat Engn, Xiamen 361024, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; Data collection; Force; Security; Routing; Edge computing; Energy consumption; edge computing; Internet of Things (IoT) applications; trust value; and virtual force; IOT; EFFICIENT;
D O I
10.1109/JIOT.2020.2966870
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is generally accepted that the edge computing paradigm is regarded as capable of satisfying the resource requirements for the emerging mobile applications such as the Internet of Things (IoT) ones. Undoubtedly, the data collected by underlying sensor networks are the foundation of both the IoT systems and IoT applications. However, due to the weakness and vulnerability to attacks of underlying sensor networks, the data collected are usually untrustworthy, which may cause disastrous consequences. In this article, a new model is proposed to collect trustworthy data on the basis of edge computing in the IoT. In this model, the sensor nodes are evaluated from multiple dimensions to obtain accurately quantified trust values. Besides, by mapping the trust value of a node onto a force for the mobile data collector, the best mobility path is generated with high trust. Moreover, a mobile edge data collector is used to visit both the sensors with quantified trust values and collect trustworthy data. The extensive experiment validates that the IoT systems based on trustworthy data collection model gain a significant improvement in their performance, in terms of both system security and energy conservation.
引用
收藏
页码:4218 / 4227
页数:10
相关论文
共 42 条
[1]   CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things [J].
Adewuyi, Anuoluwapo A. ;
Cheng, Hui ;
Shi, Qi ;
Cao, Jiannong ;
MacDermott, Aine ;
Wang, Xingwei .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :5432-5445
[2]   BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks [J].
Anwar, Raja Waseem ;
Zainal, Anazida ;
Outay, Fatma ;
Yasar, Ansar ;
Iqbal, Saleem .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :605-616
[3]   Dependable Structural Health Monitoring Using Wireless Sensor Networks [J].
Bhuiyan, Md Zakirul Alam ;
Wang, Guojun ;
Wu, Jie ;
Cao, Jiannong ;
Liu, Xuefeng ;
Wang, Tian .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (04) :363-376
[4]   3-D Deployment Optimization for Heterogeneous Wireless Directional Sensor Networks on Smart City [J].
Cao, Bin ;
Zhao, Jianwei ;
Yang, Po ;
Yang, Peng ;
Liu, Xin ;
Zhang, Yuan .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (03) :1798-1808
[5]   A robust distance-based relay selection for message dissemination in vehicular network [J].
Cao, Dun ;
Zheng, Bin ;
Ji, Baofeng ;
Lei, Zhengbao ;
Feng, Chunhai .
WIRELESS NETWORKS, 2020, 26 (03) :1755-1771
[6]   The fire recognition algorithm using dynamic feature fusion and IV-SVM classifier [J].
Chen, Yuantao ;
Xu, Weihong ;
Zuo, Jingwen ;
Yang, Kai .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3) :S7665-S7675
[7]   Reputation and trust management in heterogeneous peer-to-peer networks [J].
Chu, Xiaowen ;
Chen, Xiaowei ;
Zhao, Kaiyong ;
Liu, Jiangchuan .
TELECOMMUNICATION SYSTEMS, 2010, 44 (3-4) :191-203
[8]   there exists R-Completeness for Decision Versions of Multi-Player (Symmetric) Nash Equilibria [J].
Garg, Jugal ;
Mehta, Ruta ;
Vazirani, Vijay V. ;
Yazdanbod, Sadra .
ACM TRANSACTIONS ON ECONOMICS AND COMPUTATION, 2018, 6 (01)
[9]   Efficient and secure attribute-based signature for monotone predicates [J].
Gu, Ke ;
Jia, Weijia ;
Wang, Guojun ;
Wen, Sheng .
ACTA INFORMATICA, 2017, 54 (05) :521-541
[10]   SCOTRES: Secure Routing for IoT and CPS [J].
Hatzivasilis, George ;
Papaefstathiou, Ioannis ;
Manifavas, Charalampos .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06) :2129-2141