Information management for trust computation on resource-constrained IoT devices

被引:2
|
作者
Bradbury, Matthew [1 ]
Jhumka, Arshad [2 ]
Watson, Tim [3 ]
机构
[1] Univ Lancaster, Sch Comp & Commun, Lancaster LA1 4YW, England
[2] Univ Warwick, Dept Comp Sci, Coventry CV4 7AL, W Midlands, England
[3] Univ Warwick, WMG, Coventry CV4 7AL, W Midlands, England
基金
英国工程与自然科学研究理事会;
关键词
Trust; Information management; IoT; Resource-constraints; Edge nodes; Offloading; REPUTATION;
D O I
10.1016/j.future.2022.05.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Resource-constrained Internet of Things (IoT) devices are executing increasingly sophisticated applications that may require computational or memory intensive tasks to be executed. Due to their resource constraints, IoT devices may be unable to compute these tasks and will offload them to more powerful resource-rich edge nodes. However, as edge nodes may not necessarily behave as expected, an IoT device needs to be able to select which edge node should execute its tasks. This selection problem can be addressed by using a measure of behavioural trust of the edge nodes delivering a correct response, based on historical information about past interactions with edge nodes that are stored in memory. However, due to their constrained memory capacity, IoT devices will only be able to store a limited amount of trust information, thereby requiring an eviction strategy when its memory is full of which there has been limited investigation in the literature. To address this, we develop the concept of the memory profile of an agent and that profile's utility. We formalise the profile eviction problem in a unified profile memory model and show it is NP-complete. To circumvent the inherent complexity, we study the performance of eviction algorithms in a partitioned profile memory model using our utility metric. Our results show that localised eviction strategies which only consider one specific type of information do not perform well. Thus we propose a novel eviction strategy that globally considers all types of trust information stored and we show that it outperforms local eviction strategies for the majority of memory sizes and agent behaviours. In this paper, we develop a concept of information utility to a trust model and formalise the problem of information eviction, which we prove to be NP-complete. We then investigate the usefulness of different eviction strategies to maximise the utility of information stored to enable trust-based task offloading. (C) 2022 The Author(s). Published by Elsevier B.V.
引用
收藏
页码:348 / 363
页数:16
相关论文
共 50 条
  • [1] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    SENSORS, 2020, 20 (13) : 1 - 18
  • [2] An Efficient Container Management Scheme for Resource-Constrained Intelligent IoT Devices
    Chhikara, Prateek
    Tekchandani, Rajkumar
    Kumar, Neeraj
    Obaidat, Mohammad S.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16) : 12597 - 12609
  • [3] A Survey on Federated Learning for Resource-Constrained IoT Devices
    Imteaj, Ahmed
    Thakker, Urmish
    Wang, Shiqiang
    Li, Jian
    Amini, M. Hadi
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) : 1 - 24
  • [4] Attacks on Resource-Constrained IoT Devices and Security Solutions
    Sharma, Ravi
    Sharma, Nonita
    INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
  • [5] A Distributed Security Mechanism for Resource-Constrained IoT Devices
    King, James
    Awad, Ali Ismail
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2016, 40 (01): : 133 - 143
  • [6] Lightweight Trust Management Scheme Based on Blockchain in Resource-Constrained Intelligent IoT Systems
    Deng, Min
    Lyu, Yuanlin
    Yang, Chunmeng
    Xu, Fang
    Ahmed, Manzoor
    Yang, Na
    Xu, Ze
    Ke, Can
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (15): : 25706 - 25719
  • [7] Enhancing IoT security using lightweight key management with PRESENT for resource-constrained devices
    Ohal, Hemlata Sandip
    Fatangare, Mrunal Pravinkumar
    Aware, Mrunal Swapnil
    Nehete, Pallavi Utkarsh
    Dongre, Nita Ganesh
    Kothoke, Priyanka M.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 879 - 888
  • [8] Efficient Online Classification and Tracking on Resource-constrained IoT Devices
    Aftab, Muhammad
    Chau, Sid Chi-Kin
    Shenoy, Prashant
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2020, 1 (03):
  • [9] Low Latency Implementations of CNN for Resource-Constrained IoT Devices
    Mujtaba, Ahmed
    Lee, Wai-Kong
    Hwang, Seong Oun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (12) : 5124 - 5128
  • [10] A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
    Kumar, Sunil
    Kumar, Dilip
    Dangi, Ramraj
    Choudhary, Gaurav
    Dragoni, Nicola
    You, Ilsun
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 31 - 63