Robust Decentralised Trust Management for the Internet of Things by Using Game Theory

被引:46
作者
Esposito, Christian [1 ]
Tamburis, Oscar [2 ]
Su, Xin [3 ]
Choi, Chang [4 ]
机构
[1] Univ Salerno, Dept Comp Sci, Via Giovanni Paolo II 132, I-84084 Fiscicmo, Italy
[2] Univ Naples Federico II, Dept Vet Med & Anim Prod DMVPA, Via Marco Rocco di Torrepadula 35, I-180145 Naples, Italy
[3] Hohai Univ, Coll IoT Engn, Changzhou Campus,5 Chang Cheng Rd, Changzhou 213022, Peoples R China
[4] Gachon Univ, Dept Comp Engn, 1342 Seongnam Daero, Gyeonggi 13120, South Korea
基金
新加坡国家研究基金会;
关键词
Trust Management; Blockchain; Decentralized Trust Assessment; Fog Computing; Game Theory; Dempster-Shafer theory; BLOCKCHAIN; SYSTEMS; AUTHENTICATION; INFORMATION; SECURITY; IOT;
D O I
10.1016/j.ipm.2020.102308
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the large scale of the typical deployments and the involvement of moving objects to the Internet of Things, participating nodes opportunistically establish data exchanging connections, spanning across multiple organizations and security domains. This opportunistic behavior causes the impossibility of defining valid security policies to rule node authorization, and the ineffectiveness of traditional static access control models based on roles or attributes. Trust management is a promising solution to complement these conventional rules and models by realizing a more dynamic security approach and regulating connection request acceptance or rejection based on monitored behaviors. As a centralized authority cannot be established within multi-tenant and large scale infrastructures, decentralized approaches have recently emerged, supported by the blockchain technology, and applied to the case of useful Internet of Things implementations. However, they are vulnerable to possible attacks aiming at discrediting honest nodes (by lowering their trust degree) and/or redeem malicious nodes (by increasing their trust degree). The widely-accepted protection consists of securing the communications by using SSL/TLS, and restricting the nodes allowed to update the trust degree. However, they are known to be ineffective against compromised nodes that, despite holding legitimate security claims and cryptographic material, they deviate from the correct behavior by sending false and mendacious scores. This work proposes to exploit on game theory to realize robust decentralized trust management able to tolerate malicious nodes sending mendacious scores. Explicitly, a signaling node has been formalized to model the interactions between the IoT and the edge nodes by refusing potentially untrue scores. Moreover, the evolutionary Dempster-Shafer theory is used to combine the collected scores to update nodes' trust degrees, by excluding diverging scores far from the majority. Such solutions have been implemented within the context of a blockchain-supported trust management solution for IoT, and an empirical assessment is provided to show the quality of the proposed approach.
引用
收藏
页数:16
相关论文
共 59 条
[1]   Beyond the Hype: On Using Blockchains in Trust Management for Authentication [J].
Alexopoulos, Nikolaos ;
Daubert, Joerg ;
Muehlhaeuser, Max ;
Habib, Sheikh Mahbub .
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, :546-553
[2]   Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks [J].
Alrajeh, Nabil Ali ;
Lloret, J. .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[3]   Cognitive security: A comprehensive study of cognitive science in cybersecurity [J].
Andrade, Roberto O. ;
Yoo, Sang Guun .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 48
[4]   The Need of Multidisciplinary Approaches and Engineering Tools for the Development and Implementation of the Smart City Paradigm [J].
Andrisano, Oreste ;
Bartolini, Ilaria ;
Bellavista, Paolo ;
Boeri, Andrea ;
Bononi, Luciano ;
Borghetti, Alberto ;
Brath, Armando ;
Corazza, Giovanni Emanuele ;
Corradi, Antonio ;
de Miranda, Stefano ;
Fava, Fabio ;
Foschini, Luca ;
Leoni, Giovanni ;
Longo, Danila ;
Milano, Michela ;
Napolitano, Fabio ;
Nucci, Carlo Alberto ;
Pasolini, Gianni ;
Patella, Marco ;
Cinotti, Tullio Salmon ;
Tarchi, Daniele ;
Ubertini, Francesco ;
Vigo, Daniele .
PROCEEDINGS OF THE IEEE, 2018, 106 (04) :738-760
[5]  
[Anonymous], 1984, AI Mag.
[6]  
Anwer M Shahid, 2014, J Emerg Trends Comput Inf Sci, V5, P661
[7]   Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO [J].
Celesti, Antonio ;
Fazio, Maria ;
Villari, Massimo .
SENSORS, 2017, 17 (02)
[8]   Sensor Network Security: A Survey [J].
Chen, Xiangqian ;
Makki, Kia ;
Yen, Kang ;
Pissinou, Niki .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02) :52-73
[9]   Trust Management in Fog/Edge Computing by means of Blockchain Technologies [J].
Cinque, Marcello ;
Esposito, Christian ;
Russo, Stefano .
IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, :1433-1439
[10]   The Dempster-Shafer calculus for statisticians [J].
Dempster, A. P. .
INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2008, 48 (02) :365-377