Robust Decentralised Trust Management for the Internet of Things by Using Game Theory

被引:46
作者
Esposito, Christian [1 ]
Tamburis, Oscar [2 ]
Su, Xin [3 ]
Choi, Chang [4 ]
机构
[1] Univ Salerno, Dept Comp Sci, Via Giovanni Paolo II 132, I-84084 Fiscicmo, Italy
[2] Univ Naples Federico II, Dept Vet Med & Anim Prod DMVPA, Via Marco Rocco di Torrepadula 35, I-180145 Naples, Italy
[3] Hohai Univ, Coll IoT Engn, Changzhou Campus,5 Chang Cheng Rd, Changzhou 213022, Peoples R China
[4] Gachon Univ, Dept Comp Engn, 1342 Seongnam Daero, Gyeonggi 13120, South Korea
基金
新加坡国家研究基金会;
关键词
Trust Management; Blockchain; Decentralized Trust Assessment; Fog Computing; Game Theory; Dempster-Shafer theory; BLOCKCHAIN; SYSTEMS; AUTHENTICATION; INFORMATION; SECURITY; IOT;
D O I
10.1016/j.ipm.2020.102308
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the large scale of the typical deployments and the involvement of moving objects to the Internet of Things, participating nodes opportunistically establish data exchanging connections, spanning across multiple organizations and security domains. This opportunistic behavior causes the impossibility of defining valid security policies to rule node authorization, and the ineffectiveness of traditional static access control models based on roles or attributes. Trust management is a promising solution to complement these conventional rules and models by realizing a more dynamic security approach and regulating connection request acceptance or rejection based on monitored behaviors. As a centralized authority cannot be established within multi-tenant and large scale infrastructures, decentralized approaches have recently emerged, supported by the blockchain technology, and applied to the case of useful Internet of Things implementations. However, they are vulnerable to possible attacks aiming at discrediting honest nodes (by lowering their trust degree) and/or redeem malicious nodes (by increasing their trust degree). The widely-accepted protection consists of securing the communications by using SSL/TLS, and restricting the nodes allowed to update the trust degree. However, they are known to be ineffective against compromised nodes that, despite holding legitimate security claims and cryptographic material, they deviate from the correct behavior by sending false and mendacious scores. This work proposes to exploit on game theory to realize robust decentralized trust management able to tolerate malicious nodes sending mendacious scores. Explicitly, a signaling node has been formalized to model the interactions between the IoT and the edge nodes by refusing potentially untrue scores. Moreover, the evolutionary Dempster-Shafer theory is used to combine the collected scores to update nodes' trust degrees, by excluding diverging scores far from the majority. Such solutions have been implemented within the context of a blockchain-supported trust management solution for IoT, and an empirical assessment is provided to show the quality of the proposed approach.
引用
收藏
页数:16
相关论文
共 59 条
[21]   Bubbles of Trust: A decentralized blockchain-based authentication system for IoT [J].
Hammi, Mohamed Tahar ;
Hammi, Badis ;
Bellot, Patrick ;
Serhrouchni, Ahmed .
COMPUTERS & SECURITY, 2018, 78 :126-142
[22]   Sequential weighted combination for unreliable evidence based on evidence variance [J].
Han, Deqiang ;
Deng, Yong ;
Han, Chongzhao .
DECISION SUPPORT SYSTEMS, 2013, 56 :387-393
[23]   PAWN: a payload-based mutual authentication scheme for wireless sensor networks [J].
Jan, Mian ;
Nanda, Priyadarsi ;
Usman, Muhammad ;
He, Xiangjian .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (17)
[24]   Evolution and information in a gift-giving game [J].
Johnson, P ;
Levine, DK ;
Pesendorfer, W .
JOURNAL OF ECONOMIC THEORY, 2001, 100 (01) :1-21
[25]   Comparative study of trust and reputation systems for wireless sensor networks [J].
Khalid, Osman ;
Khan, Samee U. ;
Madani, Sajjad A. ;
Hayat, Khizar ;
Khan, Majid I. ;
Min-Allah, Nasro ;
Kolodziej, Joanna ;
Wang, Lizhe ;
Zeadally, Sherali ;
Chen, Dan .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (06) :669-688
[26]   Authentication and Authorization for the Internet of Things [J].
Kim, Hokeun ;
Lee, Edward A. .
IT PROFESSIONAL, 2017, 19 (05) :27-33
[27]  
Klir G.J., 2006, Fuzzy set theory
[28]   Fuzzy arithmetic with requisite constraints [J].
Klir, GJ .
FUZZY SETS AND SYSTEMS, 1997, 91 (02) :165-175
[29]  
Kumari K., 2015, INT J ADV RES COMPUT, V5
[30]   Blockchain-based secure firmware update for embedded devices in an Internet of Things environment [J].
Lee, Boohyung ;
Lee, Jong-Hyouk .
JOURNAL OF SUPERCOMPUTING, 2017, 73 (03) :1152-1167