A Robust Trust Model against Malicious Attacks in Heterogeneous Internet of Things

Document Type : Persian Original Article

Authors

1 Department of Computer Engineering and IT, University of Qom, Qom, Iran

2 University of Qom. Qom, Iran

Abstract

In recent years, the Internet of Things (IoT) has gained many interests and applications in various fields from the automation of industrial processes to smart environments. Despite the advantages of IoT, the reliability of connected objects is a serious challenge in these environments. The heterogeneity of objects in IoT and the imbalance of power and resources do not allow the use of a reliable trust management model in these contexts. On the other hand, the use of more general and weaker models that can be implemented in all connected objects also reduces the security of these environments. In this paper, focusing on the heterogeneity of the IoT, a two-layer trust model is proposed. In the first layer, the model allows objects to select and use a trust model appropriate to their capabilities. Then in the second layer of the model, the result of the calculations of the previous layer is aggregated and the final trust values of the objects are calculated by considering the accuracy of each object. The proposed model uses the EigenTrust algorithm to aggregate the trust from the first layer. The paper also evaluates the robustness of the proposed model compared to the base models against various attacks including dishonest behavior, on-off attack, value imbalance attack and oscillation, and the results show that the proposed model is able to identify attackers with 86% accuracy and has also improved the accuracy of the base models up to 30%.

Keywords


[1]      Lee H-C, Lee S-W: Trust as Soft Security for Self-Adaptive Systems: A Literature Survey. In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC): 2017: IEEE; 2017: 523-528.
[2]      Barber KS, Kim J: Soft security: Isolating unreliable agents from society. In: Workshop on Deception, Fraud and Trust in Agent Societies: 2002: Springer; 2002: 224-233.
[3]      JIANG J, Guangjie H: Survey of Trust Management Mechanism in Wireless Sensor Network. Netinfo Security 2020, 20(4):12.
[4]      Ahmed AIA, Ab Hamid SH, Gani A, Khan MK: Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges. Journal of Network and Computer Applications 2019, 145:102409.
[5]      لادانی ت, بیدگلی ج: وارسی استحکام سامانه‌های اعتماد. دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات  2015, 3(2):15-34.
[6]      Bidgoly AJ, Ladani BT: Benchmarking reputation systems: A quantitative verification approach. Computers in Human Behavior 2016, 57:274-291.
[7]      Bidgoly AJ, Ladani BT: Trust modeling and verification using colored petri nets. In: 2011 8th International ISC Conference on Information Security and Cryptology: 2011: IEEE; 2011: 1-8.
[8]      Bidgoly AJ, Ladani BT: Modelling and quantitative verification of reputation systems against malicious attackers. The Computer Journal 2015, 58(10):2567-2582.
[9]      Bidgoly AJ, Ladani BT: Modeling and quantitative verification of trust systems against malicious attackers. The Computer Journal 2016, 59(7):1005-1027.
[10]    Bao F, Chen I-R: Dynamic trust management for internet of things applications. In: Proceedings of the 2012 international workshop on Self-aware internet of things: 2012; 2012: 1-6.
[11]    Yan Z, Zhang P, Vasilakos AV: A survey on trust management for Internet of Things. Journal of network and computer applications 2014, 42:120-134.
[12]    Chen R, Bao F, Guo J: Trust-based service management for social internet of things systems. IEEE transactions on dependable and secure computing 2015, 13(6):684-696.
[13]    Kamvar SD, Schlosser MT, Garcia-Molina H: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th international conference on World Wide Web: 2003; 2003: 640-651.
[14]    Chen D, Chang G, Sun D, Li J, Jia J, Wang X: TRM-IoT: A trust management model based on fuzzy reputation for internet of things. Computer Science and Information Systems 2011, 8(4):1207-1228.
[15]    Chang K-D, Chen J-L: A survey of trust management in WSNs, internet of things and future internet. KSII Transactions on Internet & Information Systems 2012, 6(1).
[16]    Saied YB, Olivereau A, Zeghlache D, Laurent M: Trust management system design for the Internet of Things: A context-aware and multi-service approach. Computers & Security 2013, 39:351-365.
[17]    Kang K, Pang Z, Da Xu L, Ma L, Wang C: An interactive trust model for application market of the internet of things. IEEE Transactions on Industrial Informatics 2014, 10(2):1516-1526.
[18]    Mohsenzadeh A, Motameni H: A trust model between cloud entities using fuzzy mathematics. Journal of Intelligent & Fuzzy Systems 2015, 29(5):1795-1803.
[19]    Kurdi H, Alfaries A, Al-Anazi A, Alkharji S, Addegaither M, Altoaimy L, Ahmed SH: A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments. The Journal of Supercomputing 2019, 75(7):3534-3554.
[20]    Fan W, Perros H: A novel trust management framework for multi-cloud environments based on trust service providers. Knowledge-Based Systems 2014, 70:392-406.
[21]    Sun D, Chang G, Sun L, Li F, Wang X: A dynamic multi-dimensional trust evaluation model to enhance security of cloud computing environments. International Journal of Innovative Computing and Applications 2011, 3(4):200-212.
[22]    Kanwal A, Masood R, Ghazia UE, Shibli MA, Abbasi AG: Assessment criteria for trust models in cloud computing. In: 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing: 2013: IEEE; 2013: 254-261.
[23]    Chiregi M, Navimipour NJ: A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities. Computers in Human Behavior 2016, 60:280-292.
[24]    Gao B, Zhang N: Configuration method and system of complex network and configuration and management module of server resources. In.: Google Patents; 2014.
[25]    Fernandez-Gago C, Moyano F, Lopez J: Modelling trust dynamics in the Internet of Things. Information Sciences 2017, 396:72-82.
[26]    Lin C, Varadharajan V, Wang Y, Pruthi V: Enhancing grid security with trust management. In: IEEE International Conference onServices Computing, 2004(SCC 2004) Proceedings 2004: 2004: IEEE; 2004: 303-310.
[27]    Luo J, Liu X, Fan M: A trust model based on fuzzy recommendation for mobile ad-hoc networks. Computer networks 2009, 53(14):2396-2407.
[28]    Ashtiani M, Azgomi MA: A formulation of computational trust based on quantum decision theory. Information Systems Frontiers 2016, 18(4):735-764.
[29]    Sun Y, Liu Y: Security of online reputation systems: The evolution of attacks and defenses. IEEE Signal Processing Magazine 2012, 29(2):87-97.
[30]    Koutrouli E, Tsalgatidou A: Taxonomy of attacks and defense mechanisms in P2P reputation systems—Lessons for reputation system designers. Computer Science Review 2012, 6(2-3):47-70.
[31]    Wang D, Muller T, Liu Y, Zhang J: Towards robust and effective trust management for security: A survey. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications: 2014: IEEE; 2014: 511-518.
[32]    Kerr R, Cohen R: Smart cheaters do prosper: defeating trust and reputation systems. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 2: 2009: Citeseer; 2009: 993-1000.
[33]    Jøsang A, Golbeck J: Challenges for robust trust and reputation systems. In: Proceedings of the 5th International Workshop on Security and Trust Management (SMT 2009), Saint Malo, France: 2009: Citeseer; 2009.
[34]    Milosevic Z, Josang A, Dimitrakos T, Patton MA: Discretionary enforcement of electronic contracts. In: Proceedings Sixth International Enterprise Distributed Object Computing: 2002: IEEE; 2002: 39-50.
[35]    Jøsang A: Subjective logic, draft book. In.; 2011.