Dynamic distributed trust management scheme for the Internet of Things

Dynamic distributed trust management scheme for the Internet of Things

The Internet of Things (IoT) comprises of a diverse network of homogeneous and heterogeneous nodes that can be accessed through network ubiquitously. In unattended environments, the IoT devices are prone to various attacks including ballot-stuffing, bad-mouthing, self-promotion, on-off, opportunistic behavior attacks, etc. The on-off attack is difficult to detect as nodes switch their behavior from normal to malicious alternatively. A trust management model is a tool to defend the IoT system against malicious activities and provide reliable data exchange. The majority of existing IoT trust management techniques are based on static reward and punishment values in pursuit of trust computation thereby allowing the misbehaving nodes to deliberately perform on-off attacks. Due to the static nature of awarding scores, these schemes fail to identify malicious nodes in certain cases. In this paper, a dynamic and distributed trust management scheme (DDTMS) is proposed where nodes can autonomously evaluate peer nodes’ behavior and dynamically grant reward and penalty score. The proposed scheme successfully detects the on-off attack and isolates the misbehaving nodes thereby classifying them into three distinct categories based on their severity levels i.e. low, mild, and severe. Simulation-based performance evaluation shows improved performance of the proposed DDTMS against other state-of-the-art schemes thereby requiring less time and fewer interactions for successfully identifying malevolent behavior of compromised nodes

___

  • 1] Curado M, Madeira H, Da Cunha PR, Cabral B, Abreu DP et al. Internet of Things. In: Kott A (editor). Cyber Resilience of Systems and Networks. 1st ed. New York, NY, USA: Springer International Publishing, 2019, pp. 381-401. doi: 10.1007/978-3-319-77492-3_16
  • [2] Dabbagh M, Rayes A. Internet of Things security and privacy. In: Internet of Things from Hype to Reality. 2nd ed. New York, NY, USA: Springer International Publishing, 2019, pp. 211-238. doi: 10.1007/978-3-319-99516-8
  • [3] Awan KA, Din IU, Almogren A, Guizani M, Khan S. StabTrust—a stable and centralized trust-based clustering mechanism for IoT enabled vehicular ad-hoc networks. IEEE Access 2020; 8: 21159-21177.
  • [4] Neeraj AS. Internet of Things and trust management in IoT–review. International Research Journal of Engineering and Technology 2016; 3 (6): 761-767.
  • [5] Issarny V, Bouloukakis G, Georgantas N, Billet B. Revisiting service-oriented architecture for the IoT: a middleware perspective. In: International Conference on Service-Oriented Computing (ICSOC); Banff, AB, Canada; 2016. p. 3-17.
  • [6] Xu H, Yu W, Griffith D, Golmie N. A survey on industrial Internet of Things: a cyber-physical systems perspective. IEEE Access 2018; 6: 78238-78259.
  • [7] Conti M, Dehghantanha A, Franke K, Watson S. Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems 2018; 78 (2): 544-546. doi: 10.1016/j.future.2017.07.060
  • [8] Jabeen F, Hamid Z, Akhunzada A, Abdul W, Ghouzali S. Trust and reputation management in healthcare systems: taxonomy, requirements and open issues. IEEE Access 2018; 6: 17246-17263.
  • [9] Firoozi F, Zadorozhny VI, Li FY. Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks. IEEE Sensors Journal 2018; 18 (15): 6446-60.
  • [10] Ahmed A, Bakar KA, Channa MI, Haseeb K, Khan AW. TERP: a trust and energy aware routing protocol for wireless sensor network. IEEE Sensors Journal 2015; 15 (12): 6962-6972.
  • [11] Bao F, Chen R. Trust management for the Internet of Things and its application to service composition. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM); San Francisco, CA, USA; 2012. pp. 1-6.
  • [12] Xie Y. A study on trust management algorithms for the social internet of things. Masters thesis, Nanyang Techno- logical University, Singapore, 2016.
  • [13] Saied YB, Olivereau A, Zeghlache D, Laurent M. Trust management system design for the Internet of Things: a context-aware and multi-service approach. Computers & Security 2013; 39: 351-65.
  • [14] Mendoza CV, Kleinschmidt JH. Mitigating On-Off attacks in the Internet of Things using a distributed trust management scheme. International Journal of Distributed Sensor Networks 2015; 11 (11): 859731.
  • [15] Michiardi P, Molva R. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Blažič BJ, Klobučar T (editors). Advanced Communications and Multimedia Security. Boston, MA, USA: Springer, 2002, pp. 107-121
  • [16] Ganeriwal S, Balzano LK, Srivastava MB. Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN) 2008; 4 (3): 1-37.
  • [17] Chen H, Wu H, Zhou X, Gao C. Agent-based trust model in wireless sensor networks. In: Eighth ACIS Interna- tional Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD); Qingdao, China; 2007. pp. 119-124.
  • [18] Reddy YB, Selmic R. Secure packet transfer in wireless sensor networks–a trust-based approach. In: IARIA, The Tenth International Conference on Networks (ICN); St. Maarten, Netherlands; 2011. pp. 1-6.
  • [19] Kim TK, Seo HS. A trust model using fuzzy logic in wireless sensor network. World Academy of Science, Engineering and Technology 2008; 42 (6): 63-6.
  • [20] Chae Y, DiPippo LC, Sun YL. Trust management for defending On-Off attacks. IEEE Transactions on Parallel and Distributed Systems 2014; 26 (4): 1178-1191.
  • [21] Mendoza CV, Kleinschmidt JH. A distributed trust management mechanism for the Internet of Things using a multi-service approach. Wireless Personal Communications 2018; 103 (3): 2501-2513.
  • [22] Chakravartula RN, Lakshmi VN. Trust management-framework for IoT-based P2P objects. International Journal of Peer to Peer Networks (IJP2P) 2017; 8(2/3): 1-20.
  • [23] Sharma A, Pilli ES, Mazumdar AP, Govil MC. A framework to manage trust in Internet of Things. In: International Conference on Emerging Trends in Communication Technologies (ETCT); Dehradun, India; 2016. pp. 1-5.
  • [24] Bernabe JB, Ramos JL, Gomez AF. TACIoT: multidimensional trust-aware access control system for the Internet of Things. Soft Computing 2016; 20 (5): 1763-1779.
  • [25] Chen R, Guo J, Bao F. Trust management for SOA-based IoT and its application to service composition. IEEE Transactions on Services Computing 2014; 9 (3): 482-95.
  • [26] Ruan Y, Durresi A, Alfantoukh L. Trust management framework for Internet of Things. In: IEEE 30th International Conference on Advanced Information Networking and Applications (AINA); Crans-Montana, Switzerland; 2016. pp. 1013-1019.
  • [27] Amol R. Detection of On-Off attack based on predictability trust in wireless sensor network. International Journal of Advanced Computational Engineering and Networking 2016; 4 (12): 2320-2106.
  • [28] Abderrahim OB, Elhedhili MH, Saidane L. DTMS-IoT: A Dirichlet-based trust management system mitigating On- Off attacks and dishonest recommendations for the Internet of Things. In: IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA); Agadir, Morocco; 2016. pp. 1-8.
  • [29] Awan KA, Din IU, Almogren A, Guizani M, Altameem A et al Robusttrust–a pro-privacy robust distributed trust management mechanism for Internet of Things. IEEE Access 2019; 7: 62095-62106.
  • [30] Sahoo RR, Sarkar S, Ray S. Defense against On-Off attack in trust establishment scheme for wireless sensor network. In: 2nd International Conference on Signal Processing and Communication (ICSPC); Coimbatore, India; 2019. pp. 153-160.
  • [31] Abderrahim OB, Elhdhili MH, Saidane L. TMCoI-SIOT: a trust management system based on communities of interest for the social Internet of Things. In: 13th International Wireless Communications and Mobile Computing Conference (IWCMC); Valencia, Spain; 2017. pp. 747-752.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: Yılda 6 Sayı
  • Yayıncı: TÜBİTAK
Sayıdaki Diğer Makaleler

A multiple sensor fusion based drift compensation algorithm for mecanum wheeled mobile robots

Abdulrahman ALHALABI, Mert EZIM, Kansu Oguz CANBEK, Eray A. BARAN

A nonlinear disturbance observer scheme for discrete time control systems

Mehmet Önder EFE, Coşku KASNAKOĞLU

Heuristic based binary grasshopper optimization algorithm to solve unit commitment problem

Muhammad SHAHID, Tahir Nadeem MALIK, Ahsan SAID

Development of majority vote ensemble feature selection algorithm augmented with rank allocation to enhance Turkish text categorization

Akın ÖZÇİFT, Emin BORANDAĞ, Yeşim KAYGUSUZ

Neuro-adaptive backstepping integral sliding mode control design for nonlinear wind energy conversion system

Laiq KHAN, Qudrat KHAN, Saghir AHMAD, Imran ULLAH KHAN, Shafaat ULLAH, Uzair KHAN

Ensemble learning of multiview CNN models for survival time prediction of brain tumor patients using multimodal MRI scans

Ulus ÇEVİK, Abdela Ahmed MOSSA

On performance analysis of multioperator RAN sharing for mobile network operators

Engin ZEYDAN, Yekta TÜRK

Design of the fractional order internal model controller using the swarm intelligence techniques for the coupled tank system

Sateesh Kumar VAVILALA, Vinopraba THIRUMAVALAVAN, Radhakrishnan THOTA, Sivakumaran NATARAJAN

Learning multiview deep features from skeletal sign language videos for recognition

Ashraf Ali SHAIK, Venkata Durga Prasad MAREEDU, Venkata Vijaya Kishore POLURIE

SWFT: Subbands wavelet for local features transform descriptor for corneal diseases diagnosis

Samer K. AL-SALIHI, Sezgin AYDIN, Nebras H. GHAEB