Robust Decentralised Trust Management for the Internet of Things by Using Game Theory

被引:46
作者
Esposito, Christian [1 ]
Tamburis, Oscar [2 ]
Su, Xin [3 ]
Choi, Chang [4 ]
机构
[1] Univ Salerno, Dept Comp Sci, Via Giovanni Paolo II 132, I-84084 Fiscicmo, Italy
[2] Univ Naples Federico II, Dept Vet Med & Anim Prod DMVPA, Via Marco Rocco di Torrepadula 35, I-180145 Naples, Italy
[3] Hohai Univ, Coll IoT Engn, Changzhou Campus,5 Chang Cheng Rd, Changzhou 213022, Peoples R China
[4] Gachon Univ, Dept Comp Engn, 1342 Seongnam Daero, Gyeonggi 13120, South Korea
基金
新加坡国家研究基金会;
关键词
Trust Management; Blockchain; Decentralized Trust Assessment; Fog Computing; Game Theory; Dempster-Shafer theory; BLOCKCHAIN; SYSTEMS; AUTHENTICATION; INFORMATION; SECURITY; IOT;
D O I
10.1016/j.ipm.2020.102308
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the large scale of the typical deployments and the involvement of moving objects to the Internet of Things, participating nodes opportunistically establish data exchanging connections, spanning across multiple organizations and security domains. This opportunistic behavior causes the impossibility of defining valid security policies to rule node authorization, and the ineffectiveness of traditional static access control models based on roles or attributes. Trust management is a promising solution to complement these conventional rules and models by realizing a more dynamic security approach and regulating connection request acceptance or rejection based on monitored behaviors. As a centralized authority cannot be established within multi-tenant and large scale infrastructures, decentralized approaches have recently emerged, supported by the blockchain technology, and applied to the case of useful Internet of Things implementations. However, they are vulnerable to possible attacks aiming at discrediting honest nodes (by lowering their trust degree) and/or redeem malicious nodes (by increasing their trust degree). The widely-accepted protection consists of securing the communications by using SSL/TLS, and restricting the nodes allowed to update the trust degree. However, they are known to be ineffective against compromised nodes that, despite holding legitimate security claims and cryptographic material, they deviate from the correct behavior by sending false and mendacious scores. This work proposes to exploit on game theory to realize robust decentralized trust management able to tolerate malicious nodes sending mendacious scores. Explicitly, a signaling node has been formalized to model the interactions between the IoT and the edge nodes by refusing potentially untrue scores. Moreover, the evolutionary Dempster-Shafer theory is used to combine the collected scores to update nodes' trust degrees, by excluding diverging scores far from the majority. Such solutions have been implemented within the context of a blockchain-supported trust management solution for IoT, and an empirical assessment is provided to show the quality of the proposed approach.
引用
收藏
页数:16
相关论文
共 59 条
[41]  
Papp D, 2019, INFOCOMMUNICATIONS J, V11, P2
[42]   A Comprehensive Study on the Trust Management Techniques in the Internet of Things [J].
Pourghebleh, Behrouz ;
Wakil, Karzan ;
Navimipour, Nima Jafari .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) :9326-9337
[43]   On blockchain and its integration with loT. Challenges and opportunities [J].
Reyna, Ana ;
Martin, Cristian ;
Chen, Jaime ;
Soler, Enrique ;
Diaz, Manuel .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 :173-190
[44]   Evolutionary game theory: Temporal and spatial effects beyond replicator dynamics [J].
Roca, Carlos P. ;
Cuesta, Jose A. ;
Sanchez, Angel .
PHYSICS OF LIFE REVIEWS, 2009, 6 (04) :208-249
[45]   Enabling a Smart City Application Ecosystem Requirements and Architectural Aspects [J].
Schleicher, Johannes M. ;
Voegler, Michael ;
Dustdar, Schahram ;
Inzinger, Christian .
IEEE INTERNET COMPUTING, 2016, 20 (02) :58-65
[46]   Block-VN: A distributed blockchain based vehicular network architecture in smart city [J].
Sharma P.K. ;
Moon S.Y. ;
Park J.H. .
Journal of Information Processing Systems, 2017, 13 (01) :184-195
[47]  
Sobel J., 2009, ENCY COMPLEXITY SYST, P8125
[48]  
Sukiatmodjo A., 2019, Sci. J. Inform., V6, P45, DOI [10.15294/sji.v6i1.17838, DOI 10.15294/SJI.V6I1.17838]
[49]   IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things [J].
Tang, Bo ;
Kang, Hongjuan ;
Fan, Jingwen ;
Li, Qi ;
Sandhu, Ravi .
PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19), 2019, :83-92
[50]   A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols [J].
Tomic, Ivana ;
McCann, Julie A. .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06) :1910-1923