Edge-Computing-Based Trustworthy Data Collection Model in the Internet of Things

被引:98
作者
Wang, Tian [1 ]
Qiu, Lei [1 ]
Sangaiah, Arun Kumar [2 ]
Liu, Anfeng [3 ]
Bhuiyan, Md Zakirul Alam [4 ]
Ma, Ying [5 ]
机构
[1] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[3] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[4] Fordham Univ, Dept Comp & Informat Sci, New York, NY 10458 USA
[5] Xiamen Univ Technol, Coll Comp & Informat Engn, Xiamen 361024, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2020年 / 7卷 / 05期
基金
中国国家自然科学基金;
关键词
Internet of Things; Data collection; Force; Security; Routing; Edge computing; Energy consumption; edge computing; Internet of Things (IoT) applications; trust value; and virtual force; IOT; EFFICIENT;
D O I
10.1109/JIOT.2020.2966870
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is generally accepted that the edge computing paradigm is regarded as capable of satisfying the resource requirements for the emerging mobile applications such as the Internet of Things (IoT) ones. Undoubtedly, the data collected by underlying sensor networks are the foundation of both the IoT systems and IoT applications. However, due to the weakness and vulnerability to attacks of underlying sensor networks, the data collected are usually untrustworthy, which may cause disastrous consequences. In this article, a new model is proposed to collect trustworthy data on the basis of edge computing in the IoT. In this model, the sensor nodes are evaluated from multiple dimensions to obtain accurately quantified trust values. Besides, by mapping the trust value of a node onto a force for the mobile data collector, the best mobility path is generated with high trust. Moreover, a mobile edge data collector is used to visit both the sensors with quantified trust values and collect trustworthy data. The extensive experiment validates that the IoT systems based on trustworthy data collection model gain a significant improvement in their performance, in terms of both system security and energy conservation.
引用
收藏
页码:4218 / 4227
页数:10
相关论文
共 42 条
  • [1] CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things
    Adewuyi, Anuoluwapo A.
    Cheng, Hui
    Shi, Qi
    Cao, Jiannong
    MacDermott, Aine
    Wang, Xingwei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 5432 - 5445
  • [2] BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks
    Anwar, Raja Waseem
    Zainal, Anazida
    Outay, Fatma
    Yasar, Ansar
    Iqbal, Saleem
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 605 - 616
  • [3] Dependable Structural Health Monitoring Using Wireless Sensor Networks
    Bhuiyan, Md Zakirul Alam
    Wang, Guojun
    Wu, Jie
    Cao, Jiannong
    Liu, Xuefeng
    Wang, Tian
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (04) : 363 - 376
  • [4] 3-D Deployment Optimization for Heterogeneous Wireless Directional Sensor Networks on Smart City
    Cao, Bin
    Zhao, Jianwei
    Yang, Po
    Yang, Peng
    Liu, Xin
    Zhang, Yuan
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (03) : 1798 - 1808
  • [5] A robust distance-based relay selection for message dissemination in vehicular network
    Cao, Dun
    Zheng, Bin
    Ji, Baofeng
    Lei, Zhengbao
    Feng, Chunhai
    [J]. WIRELESS NETWORKS, 2020, 26 (03) : 1755 - 1771
  • [6] The fire recognition algorithm using dynamic feature fusion and IV-SVM classifier
    Chen, Yuantao
    Xu, Weihong
    Zuo, Jingwen
    Yang, Kai
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S7665 - S7675
  • [7] Reputation and trust management in heterogeneous peer-to-peer networks
    Chu, Xiaowen
    Chen, Xiaowei
    Zhao, Kaiyong
    Liu, Jiangchuan
    [J]. TELECOMMUNICATION SYSTEMS, 2010, 44 (3-4) : 191 - 203
  • [8] there exists R-Completeness for Decision Versions of Multi-Player (Symmetric) Nash Equilibria
    Garg, Jugal
    Mehta, Ruta
    Vazirani, Vijay V.
    Yazdanbod, Sadra
    [J]. ACM TRANSACTIONS ON ECONOMICS AND COMPUTATION, 2018, 6 (01)
  • [9] Efficient and secure attribute-based signature for monotone predicates
    Gu, Ke
    Jia, Weijia
    Wang, Guojun
    Wen, Sheng
    [J]. ACTA INFORMATICA, 2017, 54 (05) : 521 - 541
  • [10] SCOTRES: Secure Routing for IoT and CPS
    Hatzivasilis, George
    Papaefstathiou, Ioannis
    Manifavas, Charalampos
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 2129 - 2141