Robust Decentralised Trust Management for the Internet of Things by Using Game Theory

被引:46
作者
Esposito, Christian [1 ]
Tamburis, Oscar [2 ]
Su, Xin [3 ]
Choi, Chang [4 ]
机构
[1] Univ Salerno, Dept Comp Sci, Via Giovanni Paolo II 132, I-84084 Fiscicmo, Italy
[2] Univ Naples Federico II, Dept Vet Med & Anim Prod DMVPA, Via Marco Rocco di Torrepadula 35, I-180145 Naples, Italy
[3] Hohai Univ, Coll IoT Engn, Changzhou Campus,5 Chang Cheng Rd, Changzhou 213022, Peoples R China
[4] Gachon Univ, Dept Comp Engn, 1342 Seongnam Daero, Gyeonggi 13120, South Korea
基金
新加坡国家研究基金会;
关键词
Trust Management; Blockchain; Decentralized Trust Assessment; Fog Computing; Game Theory; Dempster-Shafer theory; BLOCKCHAIN; SYSTEMS; AUTHENTICATION; INFORMATION; SECURITY; IOT;
D O I
10.1016/j.ipm.2020.102308
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the large scale of the typical deployments and the involvement of moving objects to the Internet of Things, participating nodes opportunistically establish data exchanging connections, spanning across multiple organizations and security domains. This opportunistic behavior causes the impossibility of defining valid security policies to rule node authorization, and the ineffectiveness of traditional static access control models based on roles or attributes. Trust management is a promising solution to complement these conventional rules and models by realizing a more dynamic security approach and regulating connection request acceptance or rejection based on monitored behaviors. As a centralized authority cannot be established within multi-tenant and large scale infrastructures, decentralized approaches have recently emerged, supported by the blockchain technology, and applied to the case of useful Internet of Things implementations. However, they are vulnerable to possible attacks aiming at discrediting honest nodes (by lowering their trust degree) and/or redeem malicious nodes (by increasing their trust degree). The widely-accepted protection consists of securing the communications by using SSL/TLS, and restricting the nodes allowed to update the trust degree. However, they are known to be ineffective against compromised nodes that, despite holding legitimate security claims and cryptographic material, they deviate from the correct behavior by sending false and mendacious scores. This work proposes to exploit on game theory to realize robust decentralized trust management able to tolerate malicious nodes sending mendacious scores. Explicitly, a signaling node has been formalized to model the interactions between the IoT and the edge nodes by refusing potentially untrue scores. Moreover, the evolutionary Dempster-Shafer theory is used to combine the collected scores to update nodes' trust degrees, by excluding diverging scores far from the majority. Such solutions have been implemented within the context of a blockchain-supported trust management solution for IoT, and an empirical assessment is provided to show the quality of the proposed approach.
引用
收藏
页数:16
相关论文
共 59 条
[51]   Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies [J].
Tschorsch, Florian ;
Scheuermann, Bjoern .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :2084-2123
[52]   Unmanned aerial vehicle-aided communications system for disaster recovery [J].
Tuna, Gurkan ;
Nefzi, Bilel ;
Conte, Gianpaolo .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 :27-36
[53]   Blockchain characteristics and consensus in modern business processes [J].
Viriyasitavat, Wattana ;
Hoonsopon, Danupol .
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2019, 13 :32-39
[54]   Trust and Attribute-based Dynamic Access Control Model For Internet of Things [J].
Wang, Junshe ;
Wang, Han ;
Zhang, Hongbin ;
Cao, Ning .
2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, :342-345
[55]   Blockchain-Based Decentralized Trust Management in Vehicular Networks [J].
Yang, Zhe ;
Yang, Kan ;
Lei, Lei ;
Zheng, Kan ;
Leung, Victor C. M. .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :1495-1505
[56]   Wireless sensor network survey [J].
Yick, Jennifer ;
Mukherjee, Biswanath ;
Ghosal, Dipak .
COMPUTER NETWORKS, 2008, 52 (12) :2292-2330
[57]   A Survey of Trust and Reputation Management Systems in Wireless Communications [J].
Yu, Han ;
Shen, Zhiqi ;
Miao, Chunyan ;
Leung, Cyril ;
Niyato, Dusit .
PROCEEDINGS OF THE IEEE, 2010, 98 (10) :1755-1772
[58]   A survey on technologies for automatic forest fire monitoring, detection, and fighting using unmanned aerial vehicles and remote sensing techniques [J].
Yuan, Chi ;
Zhang, Youmin ;
Liu, Zhixiang .
CANADIAN JOURNAL OF FOREST RESEARCH, 2015, 45 (07) :783-792
[59]   Mobility-aware medium access control protocols for wireless sensor networks: A survey [J].
Zareei, Mahdi ;
Islam, A. K. M. Muzahidul ;
Vargas-Rosales, Cesar ;
Mansoor, Nafees ;
Goudarzi, Shidrokh ;
Rehmani, Mubashir Husain .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 104 :21-37