M2M-REP: Reputation system for machines in the internet of things

被引:18
|
作者
Azad, Muhammad Ajmal [1 ]
Bag, Samiran [1 ]
Hao, Feng [1 ]
Salah, Khaled [2 ]
机构
[1] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne, Tyne & Wear, England
[2] Khalifa Univ, Dept Elect & Comp Engn, Sharjah, U Arab Emirates
基金
欧洲研究理事会;
关键词
Machine to machine communications; Edge computing; Internet of things; Reputation system; Privacy-; Preservation; Secure computation; Trust; PRIVACY; TRUST; MANAGEMENT; ANONYMIZATION; AGGREGATION; PROVIDERS; ROBUST;
D O I
10.1016/j.cose.2018.07.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the age of IoT (Internet of Things), Machine-to-Machine (M2M) communication has gained significant popularity over the last few years. M2M communication systems may have a large number of autonomous connected devices that provide services without human involvement. Interacting with compromised, infected and malicious machines can bring damaging consequences in the form of network outage, machine failure, data integrity, and financial loss. Hence, users first need to evaluate the trustworthiness of machines prior to interacting with them. This can be realized by using a reputation system, which evaluates the trustworthiness of machines by utilizing the feedback collected from the users of the machines. The design of a reliable reputat.on system for the distributed M2M communication network should preserve user privacy and have low computation and communication overheads. To address these challenges, we propose an M2M-REP System (Machine to Machine REPutation), a privacy-preserving reputation system for evaluating the trustworthiness of autonomous machines in the M2M network. The system computes global reputation scores of machines while maintaining privacy of the individual participant score by using secure multi-party computation techniques. The M2M-REP system ensures correctness, security and privacy properties under the malicious adversarial model, and allows public verifiability without relying on a centralized trusted system. We implement a prototype of our system and evaluate the system performance in terms of the computation and bandwidth overhead. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [41] Industrial Device Monitoring and Control System based on oneM2M for Edge Computing
    Um, Changyong
    Lee, Jaehyeong
    Jeong, Jongpil
    2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 1528 - 1533
  • [42] Enabling Federated Emergencies and Public Safety Answering Points with wearable and mobile Internet of Things support: An approach based on EENA and OMA LWM2M emerging standards
    Jara, Antonio J.
    Bocchi, Yann
    Genoud, Dominique
    Thomas, Ian
    Lambrinos, Lambros
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 679 - 684
  • [43] Designing the Car2X-Communication infrastructure based on the Internet of Things for the Curitiba public transport system
    Leite Bastos, Henrique Zelak
    Pessoa Albini, Luiz Carlos
    IFAC PAPERSONLINE, 2016, 49 (30): : 239 - 244
  • [44] Design of reverse logistics system for B2C e-commerce based on management logic of internet of things
    Wei, Li
    Ma, Zhiqiang
    Liu, Ningning
    INTERNATIONAL JOURNAL OF SHIPPING AND TRANSPORT LOGISTICS, 2021, 13 (05) : 484 - 497
  • [45] Virtua ized oneM2M System Architecture in Smart Factory Environments
    Um, Changyong
    Lee, Jaehyeong
    Jeong, Jongpil
    2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 332 - 337
  • [46] IoT-Based Techniques for Online M2M-Interactive Itemized Data Registration and Offline Information Traceability in a Digital Manufacturing System
    Wu, Zhipeng
    Meng, Zhaozong
    Gray, John
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (05) : 2397 - 2405
  • [47] Evaluation of a 3M (mistakes, mentoring, and mastery) training program for transfer of control situations in a level 2 automated driving system
    Roberts, Shannon C.
    Hanson, William
    Ebadi, Yalda
    Talreja, Nandni
    Knodler Jr, Michael A.
    Fisher, Donald L.
    APPLIED ERGONOMICS, 2024, 116
  • [48] A OneM2M Intrusion Detection and Prevention System based on Edge Machine Learning
    Chaabouni, Nadia
    Mosbah, Mohamed
    Zemmari, Akka
    Sauvignac, Cyrille
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [49] Enabling Drone as a Service: oneM2M-based UAV/Drone Management System
    Choi, Sung-Chan
    Sung, Nak-Myung
    Park, Jong-Hong
    Ahn, Il-Yeop
    Kim, Jaeho
    2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 18 - 20
  • [50] An Intrusion Detection System for the OneM2M Service Layer Based on Edge Machine Learning
    Chaabouni, Nadia
    Mosbah, Mohamed
    Zemmari, Akka
    Sauvignac, Cyrille
    AD-HOC, MOBILE, AND WIRELESS NETWORKS (ADHOC-NOW 2019), 2019, 11803 : 508 - 523