A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications

被引:96
作者
Mahmud, Mufti [1 ]
Kaiser, M. Shamim
Rahman, M. Mostafizur [2 ]
Rahman, M. Arifur [3 ]
Shabut, Antesar [4 ]
Al-Mamun, Shamim [5 ]
Hussain, Amir [6 ]
机构
[1] Univ Padua, NeuroChip Lab, Dept Biomed Sci, Via F Marzolo 3, I-35131 Padua, Italy
[2] Amer Int Univ Bangladesh, Sch Math, Dhaka 1213, Bangladesh
[3] Univ Sheffield, Dept Comp Sci, Sheffield S1 4DP, S Yorkshire, England
[4] Anglia Ruskin Univ, Chelmsford CM1 1SQ, Essex, England
[5] Saitama Univ, Saitama 3388570, Japan
[6] Univ Stirling, Stirling FK9 4LA, Scotland
基金
英国工程与自然科学研究理事会;
关键词
ANFIS; Neuro-fuzzy system; Cybersecurity; Behavioral trust; Data trust; Quality of service; Neuroscience big data; Brain research; AD-HOC; REPUTATION; IDENTIFICATION; INTERNET; SYSTEMS; TOOL;
D O I
10.1007/s12559-018-9543-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Rapid advancement of Internet of Things (IoT) and cloud computing enables neuroscientists to collect multilevel and multichannel brain data to better understand brain functions, diagnose diseases, and devise treatments. To ensure secure and reliable data communication between end-to-end (E2E) devices supported by current IoT and cloud infrastructures, trust management is needed at the IoT and user ends. This paper introduces an adaptive neuro-fuzzy inference system (ANFIS) brain-inspired trust management model (TMM) to secure IoT devices and relay nodes, and to ensure data reliability. The proposed TMM utilizes both node behavioral trust and data trust, which are estimated using ANFIS, and weighted additive methods respectively, to assess the nodes trustworthiness. In contrast to existing fuzzy based TMMs, simulation results confirm the robustness and accuracy of our proposed TMM in identifying malicious nodes in the communication network. With growing usage of cloud based IoT frameworks in Neuroscience research, integrating the proposed TMM into existing infrastructure will assure secure and reliable data communication among E2E devices.
引用
收藏
页码:864 / 873
页数:10
相关论文
共 51 条
  • [1] Afsana F., 2015, Proceedings of the 2015 International Conference on Electrical Engineering and Information Communication Technology ICEEICT, P1
  • [2] Modeling and Simulation of an Adaptive Neuro-Fuzzy Inference System (ANFIS) for Mobile Learning
    Al-Hmouz, Ahmed
    Shen, Jun
    Al-Hmouz, Rami
    Yan, Jun
    [J]. IEEE TRANSACTIONS ON LEARNING TECHNOLOGIES, 2012, 5 (03): : 226 - 237
  • [3] Resources available for autism research in the big data era: a systematic review
    Al-jawahiri, Reen
    Milne, Elizabeth
    [J]. PEERJ, 2017, 5
  • [4] Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols
    Andel, Todd R.
    Yasinsac, Alec
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 197 (02) : 3 - 14
  • [5] [Anonymous], 2013, P 2013 9 INT C INF C, DOI DOI 10.1109/ICICS.2013.6782950
  • [6] Trust management system designs for the Internet of Things: A context-aware and multi-service approach
    Ben Saied, Yosra
    Olivereau, Alexis
    Zeghlache, Djamal
    Laurent, Maryline
    [J]. COMPUTERS & SECURITY, 2013, 39 : 351 - 365
  • [7] From Cosmos to Connectomes: The Evolution of Data-Intensive Science
    Burns, Randal
    Vogelstein, Joshua T.
    Szalay, Alexander S.
    [J]. NEURON, 2014, 83 (06) : 1249 - 1252
  • [8] TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things
    Chen, Dong
    Chang, Guiran
    Sun, Dawei
    Li, Jiajia
    Jia, Jie
    Wang, Xingwei
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04) : 1207 - 1228
  • [9] Cherry Bennett, 2015, International Journal of Business and Globalisation, V14, P97, DOI 10.1504/IJBG.2015.066098
  • [10] Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs
    Daly, Elizabeth M.
    Haahr, Mads
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (05) : 606 - 621