Information management for trust computation on resource-constrained IoT devices

被引:2
|
作者
Bradbury, Matthew [1 ]
Jhumka, Arshad [2 ]
Watson, Tim [3 ]
机构
[1] Univ Lancaster, Sch Comp & Commun, Lancaster LA1 4YW, England
[2] Univ Warwick, Dept Comp Sci, Coventry CV4 7AL, W Midlands, England
[3] Univ Warwick, WMG, Coventry CV4 7AL, W Midlands, England
基金
英国工程与自然科学研究理事会;
关键词
Trust; Information management; IoT; Resource-constraints; Edge nodes; Offloading; REPUTATION;
D O I
10.1016/j.future.2022.05.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Resource-constrained Internet of Things (IoT) devices are executing increasingly sophisticated applications that may require computational or memory intensive tasks to be executed. Due to their resource constraints, IoT devices may be unable to compute these tasks and will offload them to more powerful resource-rich edge nodes. However, as edge nodes may not necessarily behave as expected, an IoT device needs to be able to select which edge node should execute its tasks. This selection problem can be addressed by using a measure of behavioural trust of the edge nodes delivering a correct response, based on historical information about past interactions with edge nodes that are stored in memory. However, due to their constrained memory capacity, IoT devices will only be able to store a limited amount of trust information, thereby requiring an eviction strategy when its memory is full of which there has been limited investigation in the literature. To address this, we develop the concept of the memory profile of an agent and that profile's utility. We formalise the profile eviction problem in a unified profile memory model and show it is NP-complete. To circumvent the inherent complexity, we study the performance of eviction algorithms in a partitioned profile memory model using our utility metric. Our results show that localised eviction strategies which only consider one specific type of information do not perform well. Thus we propose a novel eviction strategy that globally considers all types of trust information stored and we show that it outperforms local eviction strategies for the majority of memory sizes and agent behaviours. In this paper, we develop a concept of information utility to a trust model and formalise the problem of information eviction, which we prove to be NP-complete. We then investigate the usefulness of different eviction strategies to maximise the utility of information stored to enable trust-based task offloading. (C) 2022 The Author(s). Published by Elsevier B.V.
引用
收藏
页码:348 / 363
页数:16
相关论文
共 50 条
  • [41] Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices
    Fatima, Mahawish
    Rehman, Osama
    Rahman, Ibrahim M. H.
    Ajmal, Aisha
    Park, Simon Jigwan
    FUTURE INTERNET, 2024, 16 (10)
  • [42] Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices
    Sethia, Divyashikha
    Shakya, Anadi
    Aggarwal, Ritik
    Bhayana, Saksham
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 951 - 957
  • [43] Extensive Examination of XOR Arbiter PUFs as Security Primitives for Resource-Constrained IoT Devices
    Mursi, Khalid T.
    Zhuang, Yu
    Alkatheiri, Mohammed Saeed
    Aseeri, Ahmad O.
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 135 - 143
  • [44] Design of Resistor-Capacitor Physically Unclonable Function for Resource-Constrained IoT Devices
    Lee, Sangjae
    Oh, Mi-Kyung
    Kang, Yousung
    Choi, Dooho
    SENSORS, 2020, 20 (02)
  • [45] Blockchain-Based Data Security and Sharing for Resource-Constrained Devices in Manufacturing IoT
    Tan, Jinbiao
    Shi, Jianhua
    Wan, Jiafu
    Dai, Hong-Ning
    Jin, Jiong
    Zhang, Rui
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (15): : 25558 - 25567
  • [46] Area and power efficient post-quantum cryptosystem for IoT resource-constrained devices
    Shahbazi, Karim
    Ko, Seok-Bum
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 84
  • [47] Data management framework for IoT edge-cloud architecture for resource-constrained IoT application
    Sharma, Gajanand
    Hemrajani, Naveen
    Sharma, Satyajeet
    Upadhyay, Aditya
    Bhardwaj, Yogesh
    Kumar, Ashutosh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (04): : 1093 - 1103
  • [48] Secure Transmission in NOMA-Enabled Industrial IoT With Resource-Constrained Untrusted Devices
    Thapar, Sapna
    Mishra, Deepak
    Saini, Ravikant
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (01) : 411 - 420
  • [49] SRAM-PUF-Based Entities Authentication Scheme for Resource-Constrained IoT Devices
    Farha, Fadi
    Ning, Huansheng
    Ali, Karim
    Chen, Liming
    Nugent, Christopher
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07): : 5904 - 5913
  • [50] A Practical Self-Stabilizing Leader Election for Networks of Resource-Constrained IoT Devices
    Conard, Michael
    Ebnenasir, Ali
    2021 17TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2021), 2021, : 127 - 134