M2M-REP: Reputation system for machines in the internet of things

被引:18
作者
Azad, Muhammad Ajmal [1 ]
Bag, Samiran [1 ]
Hao, Feng [1 ]
Salah, Khaled [2 ]
机构
[1] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne, Tyne & Wear, England
[2] Khalifa Univ, Dept Elect & Comp Engn, Sharjah, U Arab Emirates
基金
欧洲研究理事会;
关键词
Machine to machine communications; Edge computing; Internet of things; Reputation system; Privacy-; Preservation; Secure computation; Trust; PRIVACY; TRUST; MANAGEMENT; ANONYMIZATION; AGGREGATION; PROVIDERS; ROBUST;
D O I
10.1016/j.cose.2018.07.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the age of IoT (Internet of Things), Machine-to-Machine (M2M) communication has gained significant popularity over the last few years. M2M communication systems may have a large number of autonomous connected devices that provide services without human involvement. Interacting with compromised, infected and malicious machines can bring damaging consequences in the form of network outage, machine failure, data integrity, and financial loss. Hence, users first need to evaluate the trustworthiness of machines prior to interacting with them. This can be realized by using a reputation system, which evaluates the trustworthiness of machines by utilizing the feedback collected from the users of the machines. The design of a reliable reputat.on system for the distributed M2M communication network should preserve user privacy and have low computation and communication overheads. To address these challenges, we propose an M2M-REP System (Machine to Machine REPutation), a privacy-preserving reputation system for evaluating the trustworthiness of autonomous machines in the M2M network. The system computes global reputation scores of machines while maintaining privacy of the individual participant score by using secure multi-party computation techniques. The M2M-REP system ensures correctness, security and privacy properties under the malicious adversarial model, and allows public verifiability without relying on a centralized trusted system. We implement a prototype of our system and evaluate the system performance in terms of the computation and bandwidth overhead. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 67 条
[1]  
Androulaki E, 2008, LECT NOTES COMPUT SC, V5134, P202, DOI 10.1007/978-3-540-70630-4_13
[2]  
[Anonymous], CS1301 U SURR
[3]  
[Anonymous], GARTNER SAYS INTERNE
[4]  
[Anonymous], COMPUT SECUR
[5]  
[Anonymous], P 21 FIN CRYPT DAT S
[6]  
[Anonymous], CELL M2M FOR UNL GRO
[7]  
[Anonymous], 2005, P WORKSH HOT TOP NET
[8]  
[Anonymous], P FUT ID INF SOC
[9]  
[Anonymous], THESIS
[10]  
[Anonymous], FUTURE GEN COMPUT SY