TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things

被引:228
作者
Chen, Dong [1 ]
Chang, Guiran [2 ]
Sun, Dawei [1 ]
Li, Jiajia [1 ]
Jia, Jie [1 ]
Wang, Xingwei [1 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110004, Peoples R China
[2] Northeastern Univ, Ctr Comp, Shenyang 110004, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; Cyber Physical System; Wireless Sensor Network; Trust; Reputation; Fuzzy Sets; AD-HOC;
D O I
10.2298/CSIS110303056C
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since a large scale Wireless Sensor Network (WSN) is to be completely integrated into Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is necessary to consider various security challenges that come with IoT/CPS, such as the detection of malicious attacks. Sensors or sensor embedded things may establish direct communication between each other using 6LoWPAN protocol. A trust and reputation model is recognized as an important approach to defend a large distributed sensor networks in IoT/CPS against malicious node attacks, since trust establishment mechanisms can stimulate collaboration among distributed computing and communication entities, facilitate the detection of untrustworthy entities, and assist decision-making process of various protocols. In this paper, based on in-depth understanding of trust establishment process and quantitative comparison among trust establishment methods, we present a trust and reputation model TRM-IoT to enforce the cooperation between things in a network of IoT/CPS based on their behaviors. The accuracy, robustness and lightness of the proposed model is validated through a wide set of simulations.
引用
收藏
页码:1207 / 1228
页数:22
相关论文
共 29 条
[1]  
[Anonymous], ACM T INFORM SYSTEM, DOI DOI 10.1145/1053283
[2]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[3]  
Azzedin F, 2007, PROC WRLD ACAD SCI E, V21, P123
[4]   Trust-based security for wireless ad hoc and sensor networks [J].
Boukerch, A. ;
Xu, L. ;
El-Khatib, K. .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2413-2427
[5]  
Buchegger Buchegger S. S., 2002, Proceedings of ACM International Symposium on Mobile Ad Hoc Net-working and Computing (MobiHoc), P226
[6]   Stimulating cooperation in self-organizing mobile ad hoc networks [J].
Buttyán, L ;
Hubaux, JP .
MOBILE NETWORKS & APPLICATIONS, 2003, 8 (05) :579-592
[7]   Agent-based trust model in Wireless Sensor Networks [J].
Chen, Haiguang ;
Wu, Huafeng ;
Zhou, Xi ;
Gao, Chuanshan .
SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, :119-+
[8]  
ESHENAUER L, 2002, P 9 ACM C COMP COMM, P41
[9]  
Gambetta D., 1990, Can We Trust Trust? Trust: Making and breaking cooperative Relations, P213
[10]   Providing trust in wireless sensor networks using a bio-inspired technique [J].
Gomez Marmol, Felix ;
Martinez Perez, Gregorio .
TELECOMMUNICATION SYSTEMS, 2011, 46 (02) :163-180