A Prospect Theoretic Approach for Trust Management in IoT Networks Under Manipulation Attacks

被引:10
作者
Salimitari, Mehrdad [1 ]
Bhattacharjee, Shameek [2 ]
Chatterjee, Mainak [1 ]
Fallah, Yaser P. [1 ]
机构
[1] Univ Cent Florida, 4000 Cent Florida Blvd, Orlando, FL 32816 USA
[2] Western Michigan Univ, 1903 Western,Michigan Ave, Kalamazoo, MI 49008 USA
关键词
Trust management; IoT networks; prospect theory; expected utility theory; data integrity; UTILITY-THEORY; INTERNET;
D O I
10.1145/3392058
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Internet of Things (loT) and Cyber-Physical systems become more ubiquitous in our daily lives, it necessitates the capability to measure the trustworthiness of the aggregate data from such systems to make fair decisions. However, the interpretation of trustworthiness is contextual and varies according to the risk tolerance attitude of the concerned application. In addition, there exist varying levels of uncertainty associated with an evidence upon which a trust model is built. Hence, the data integrity scoring mechanisms require some provisions to adapt to different risk attitudes and uncertainties. In this article, we propose a prospect theoretic framework for data integrity scoring that quantifies the trustworthiness of the collected data from IoT devices in the presence of adversaries who try to manipulate the data. In our proposed method, we consider an imperfect anomaly monitoring mechanism that tracks the transmitted data from each device and classifies the outcome (trustworthiness of data) as not compromised, compromised, or undecided. These outcomes are conceptualized as a multinomial hypothesis of a Bayesian inference model with three parameters. These parameters are then used for calculating a utility value via prospect theory to evaluate the reliability of the aggregate data at an IoT hub. In addition, to take into account different risk attitudes, we propose two types of fusion rule at IoT hub-optimistic and conservative. Furthermore, we put forward asymmetric weighted moving average scheme to measure the trustworthiness of aggregate data in presence of On-Off attacks. The proposed framework is validated using extensive simulation experiments for both uniform and On-Off attacks. We show how trust scores vary under a variety of system factors like attack magnitude and inaccurate detection. In addition, we measure the trustworthiness of the aggregate data using the well-known expected utility theory and compare the results with that obtained by prospect theory. The simulation results reveal that prospect theory quantifies trustworthiness of the aggregate data better than expected utility theory.
引用
收藏
页数:26
相关论文
共 38 条
  • [1] Trust-Based Decision Making for Health IoT Systems
    Al-Hamadi, Hamid
    Chen, Ing Ray
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1408 - 1419
  • [2] Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT)
    Alshehri, Mohammad Dahman
    Hussain, Farookh Khadeer
    Hussain, Omar Khadeer
    [J]. MOBILE NETWORKS & APPLICATIONS, 2018, 23 (03) : 419 - 431
  • [3] Andrea I, 2015, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P180, DOI 10.1109/ISCC.2015.7405513
  • [4] Thirty Years of Prospect Theory in Economics: A Review and Assessment
    Barberis, Nicholas C.
    [J]. JOURNAL OF ECONOMIC PERSPECTIVES, 2013, 27 (01) : 173 - 195
  • [5] QnQ: Quality and Quantity Based Unified Approach for Secure and Trustworthy Mobile Crowdsensing
    Bhattacharjee, Shameek
    Ghosh, Nirnay
    Shah, Vijay K.
    Das, Sajal K.
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 19 (01) : 200 - 216
  • [6] Preserving Data Integrity in IoT Networks under Opportunistic Data Manipulation
    Bhattacharjee, Shameek
    Salimitari, Mehrdad
    Chatterjee, Mainak
    Kwiat, Kevin
    Kamhoua, Charles
    [J]. 2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 446 - 453
  • [7] Bhattacharjee S, 2015, IEEE MILIT COMMUN C, P611, DOI 10.1109/MILCOM.2015.7357511
  • [8] Brunoro GVF, 2018, PROTOZOAN PARASITISM: FROM OMICS TO PREVENTION AND CONTROL, P1, DOI 10.21775/9781910190838.01
  • [9] Trust Management for Defending On-Off Attacks
    Chae, Younghun
    DiPippo, Lisa Cingiser
    Sun, Yan Lindsay
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (04) : 1178 - 1191
  • [10] TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things
    Chen, Dong
    Chang, Guiran
    Sun, Dawei
    Li, Jiajia
    Jia, Jie
    Wang, Xingwei
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04) : 1207 - 1228