TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things

被引:225
作者
Chen, Dong [1 ]
Chang, Guiran [2 ]
Sun, Dawei [1 ]
Li, Jiajia [1 ]
Jia, Jie [1 ]
Wang, Xingwei [1 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110004, Peoples R China
[2] Northeastern Univ, Ctr Comp, Shenyang 110004, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; Cyber Physical System; Wireless Sensor Network; Trust; Reputation; Fuzzy Sets; AD-HOC;
D O I
10.2298/CSIS110303056C
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since a large scale Wireless Sensor Network (WSN) is to be completely integrated into Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is necessary to consider various security challenges that come with IoT/CPS, such as the detection of malicious attacks. Sensors or sensor embedded things may establish direct communication between each other using 6LoWPAN protocol. A trust and reputation model is recognized as an important approach to defend a large distributed sensor networks in IoT/CPS against malicious node attacks, since trust establishment mechanisms can stimulate collaboration among distributed computing and communication entities, facilitate the detection of untrustworthy entities, and assist decision-making process of various protocols. In this paper, based on in-depth understanding of trust establishment process and quantitative comparison among trust establishment methods, we present a trust and reputation model TRM-IoT to enforce the cooperation between things in a network of IoT/CPS based on their behaviors. The accuracy, robustness and lightness of the proposed model is validated through a wide set of simulations.
引用
收藏
页码:1207 / 1228
页数:22
相关论文
共 29 条
  • [1] [Anonymous], ACM T INFORM SYSTEM, DOI DOI 10.1145/1053283
  • [2] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [3] Azzedin F, 2007, PROC WRLD ACAD SCI E, V21, P123
  • [4] Trust-based security for wireless ad hoc and sensor networks
    Boukerch, A.
    Xu, L.
    El-Khatib, K.
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2413 - 2427
  • [5] Buchegger Buchegger S. S., 2002, Proceedings of ACM International Symposium on Mobile Ad Hoc Net-working and Computing (MobiHoc), P226
  • [6] Stimulating cooperation in self-organizing mobile ad hoc networks
    Buttyán, L
    Hubaux, JP
    [J]. MOBILE NETWORKS & APPLICATIONS, 2003, 8 (05) : 579 - 592
  • [7] Agent-based trust model in Wireless Sensor Networks
    Chen, Haiguang
    Wu, Huafeng
    Zhou, Xi
    Gao, Chuanshan
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 119 - +
  • [8] ESHENAUER L, 2002, P 9 ACM C COMP COMM, P41
  • [9] Gambetta D., 1990, Can We Trust Trust? Trust: Making and breaking cooperative Relations, P213
  • [10] Providing trust in wireless sensor networks using a bio-inspired technique
    Gomez Marmol, Felix
    Martinez Perez, Gregorio
    [J]. TELECOMMUNICATION SYSTEMS, 2011, 46 (02) : 163 - 180