[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Cooperative-centrality enabled investigations on edge-based trustworthy framework for cloud focused internet of things

Published: 17 July 2024 Publication History

Abstract

Trustworthiness possesses numerous design challenges for the researchers and scientists in the global era of internet of things. The solution to deal with these challenges lies in trust management mechanisms (TMM). The integration of TMM on the Internet of things (IoT) adds a higher level of security and reliability for the resource utilization and management. On the other hand, the efficient and optimal implementation of TMM in IoT network requires significant efforts and innovations. In this paper, an innovative edge based trustworthy framework (EBTF) using novel cooperative centrality-based system (NCCBS) has been proposed and implemented for IoT networks. Trustworthiness has been computed using factors like direct trust, recommendation, global trust, and centralities. The NCCBS has been compared with existing mechanism namely: Distributive Reputation Management (DRM), Personalized Similarity Measure (PSM), and Reliable Trust Computation Mechanism (RTCM). The NCCBS outperformed the existing approaches with the adoption of dynamic weight computation scheme. The performance of IoT networks has been evaluated on parameters like recommendation weight, trust index, interaction success rate and malicious behaviour analysis. Simulations have been carried out to evaluate and validate the proposed NCCBS and it depicts optimal performance with reference to the existing schemes.

References

[1]
D. Airehrour, J.A. Gutierrez, S.K. Ray, SecTrust-RPL: a secure trust-aware RPL routing protocol for Internet of Things, Future Generat. Comput. Syst. 93 (2019) 860–876,.
[2]
F. Alqahtani, Z. Al-makhadmeh, A. Tolba, O. Said, TBM : a trust-based monitoring security scheme to improve the service authentication in the Internet of Things communications, Comput. Commun. 150 (November 2019) (2020) 216–225,.
[3]
A.P. Bhatt, A. Sharma, Quantum cryptography for internet of things security, J. Electron. Sci. Technol. 17 (3) (2019) 213–220,.
[4]
E. Blasch, Trust metrics in information fusion, Mach. Intell. Bio-inspired Comput. Theory Appl. VIII 9119 (May 2014) (2014) 91190L,.
[5]
H. Cai, S. Member, B. Xu, L. Jiang, IoT-Based Big Data Storage Systems in Cloud Computing : Perspectives and Challenges 4 (1) (2017) 75–87.
[6]
Z. Chen, L. Tian, C. Lin, Trust model of wireless sensor networks and its application in data fusion, Sensors 17 (4) (2017),.
[7]
I. Chen, J. Guo, V. Tech, D. Wang, H. Al-hamadi, Trust-based service management for mobile cloud IoT systems, IEEE Trans. Netw. Serv. Manag. (c) (2018) 1,.
[8]
J. Clemente, M. Valero, J. Mohammadpour, X. Li, W. Song, Fog computing middleware for distributed cooperative data analytics, in: 2017 IEEE Fog World Congress (FWC), 2017, pp. 1–6,.
[9]
P. De Meo, K. Musial, D. Rosaci, Using centrality measures to predict helpfulness-based reputation in trust networks using centrality measures to predict helpfulness-based reputation in trust networks, February (2017),.
[10]
C. Fernandez-gago, F. Moyano, J. Lopez, Modelling trust dynamics in the Internet of Things 396 (2017) (2020) 72–82,.
[11]
T. Gaber, S. Abdelwahab, M. Elhoseny, A. Ella, Trust-based secure clustering in WSN-based intelligent transportation systems, Comput. Network. 146 (2018) 151–158,.
[12]
J. Guo, I.R. Chen, A classification of trust computation models for service-oriented internet of things systems, in: Proc. - 2015 IEEE Int. Conf. Serv. Comput. SCC 2015, 2015, pp. 324–331,.
[13]
F. Hu, Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, 2016.
[14]
X. Huang, R. Yu, J. Kang, Y. Zhang, Distributed reputation management for secure and efficient vehicular edge computing and networks, IEEE Access 5 (2017) 25408–25420,.
[15]
R. Khan, “Applications and key challenges future internet : the internet of things architecture, Possible Applications and Key Challenges (2012) 257–260.
[16]
V.V. Kumar, K. Ntalianis, C. Yang, Chao-Tung, M. Moreno, Next-generation Internet of things and cloud security solutions, 15 (3) (2019) 2019,.
[17]
J. Liang, M. Zhang, V.C.M. Leung, A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud, IEEE Internet Things J. 7 (6) (2020) 5481–5490,.
[18]
J. Liang, M. Zhang, V.C.M. Leung, A reliable trust computing mechanism based on multi-source feedback and fog computing in social sensor cloud, IEEE Internet Things J. (2020) 1,.
[19]
K. Mabodi, M. Yusefi, S. Zandiyan, L. Irankhah, Multi - level trust - based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication, J. Supercomput. 76 (9) (2020) 7081–7106,.
[20]
H. Mahmoud, M.A. Azad, J. Arshad, A. Aneiba, A framework for decentralized, real-time reputation aggregation in IoV, IEEE Internet Things Mag 6 (2) (2023) 44–48,.
[21]
S.K. Malchi, S. Kallam, F. Al-Turjman, R. Patan, A trust-based fuzzy neural network for smart data fusion in internet of things, Comput. Electr. Eng. 89 (October 2019) (2021),.
[22]
F. Medjek, D. Tandjaoui, I. Romdhani, N. Djedjig, A trust-based intrusion detection system for mobile RPL based networks, in: Proc. - 2017 IEEE Int. Conf. Internet Things, IEEE Green Comput. Commun. IEEE Cyber, Phys. Soc. Comput. IEEE Smart Data, iThings-GreenCom-CPSCom-SmartData 2017, 2018, pp. 735–742,. vol. 2018-Janua.
[23]
A. Meena Kowshalya, M.L. Valarmathi, Dynamic trust management for secure communications in social internet of things (SIoT), Sadhana - Acad. Proc. Eng. Sci. 43 (9) (2018) 1–8,.
[24]
R. Meulen, Edge computing promises near real-time insights and facilitates localized actions, Gartner, 2018, [Online]. Available: https://www.gartner.com/smarterwithgartner/what-edge-computing-means-for-infrastructure-and-operations-leaders/.
[25]
V. Mohammadi, A.M. Rahmani, A.M. Darwesh, A. Sahafi, Trust - based recommendation systems in Internet of Things : a systematic literature review, Human-centric Comput. Inf. Sci. (2019),.
[26]
P. Panagiotou, N. Sklavos, E. Darra, I.D. Zaharakis, Cryptographic system for data applications, in the context of internet of things, Microprocess. Microsyst. 72 (2020),.
[27]
B. Pourghebleh, K. Wakil, N.J. Navimipour, A comprehensive study on the trust management techniques in the internet of things, IEEE Internet Things J. 6 (6) (2019) 9326–9337,.
[28]
T. Qiu, S. Member, N. Chen, K. Li, S. Member, How Can Heterogeneous Internet of Things Build Our Future : A Survey, 2018, pp. 1–18,. no. c.
[29]
G. Rathee, R. Sandhu, H. Saini, M.S. Vigneswaran, A trust computed framework for IoT devices and fog computing environment, Wirel. Networks 26 (4) (2020) 2339–2351,.
[30]
Y. Ruan, A. Durresi, A trust management framework for clouds, Comput. Commun. 144 (October 2018) (2019) 124–131,.
[31]
J. Rui, S. Danpeng, Architecture Design of the Internet of Things Based on Cloud Computing, 2015,.
[32]
M. Satyanarayanan, The emergence of edge computing, Computer 50 (1) (2017) 30–39,.
[33]
P. Sethi, S.R. Sarangi, Internet of Things : Architectures, Protocols, and Applications, vol. 2017, 2017.
[34]
S. Sharma, V.K. Verma, AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things, J. Supercomput. 77 (12) (2021) 13757–13787,.
[35]
S. Sharma, V.K. Verma, Security explorations for routing attacks in low power networks on internet of things, J. Supercomput. 77 (5) (2021) 4778–4812,.
[36]
A. Sharma, E.S. Pilli, A.P. Mazumdar, BD-Trust: behavioural and data trust management scheme for internet of things, J. Ambient Intell. Hum. Comput. (2022),.
[37]
S. Singh, V.K. Verma, N.P. Pathak, Sensors augmentation influence over trust and reputation models realization for dense wireless sensor networks, IEEE Sensor. J. 15 (11) (2015) 6248–6254,.
[38]
I. Souissi, N. Ben Azzouna, L. Ben Said, A multi-level study of information trust models in WSN-assisted IoT, Comput. Network. 151 (2019) 12–30,.
[39]
V. Suryani, S. Sulistyo, W. Widyawan, Internet of things (IoT) framework for granting trust among objects, J. Inf. Process. Syst. 13 (6) (2017) 1613–1627,.
[40]
F. Tao, Y. Cheng, L. Da Xu, L. Zhang, B.H. Li, CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system, IEEE Trans. Ind. Inf. 10 (2) (2014) 1435–1442,.
[41]
V.K. Verma, K. Ntalianis, S. Singh, N.P. Pathak, Data proliferation based estimations over distribution factor in heterogeneous wireless sensor networks, Comput. Commun. 124 (2018) 111–118,.
[42]
V.K. Verma, K. Ntalianis, C.M. Moreno, C.-T. Yang, Next-generation Internet of things and cloud security solutions, Int. J. Distributed Sens. Netw. 15 (3) (2019),.
[43]
F.E. Walter, S. Battiston, F. Schweitzer, Personalised and dynamic trust in social networks, RecSys’09 - Proc. 3rd ACM Conf. Recomm. Syst. (2009) 197–204,.
[44]
T. Wang, G. Zhang, A. Liu, Z.A. Bhuiyan, Q. Jin, A secure IoT service architecture with an E ffi cient balance dynamics based on cloud and edge, IEEE Internet Things J. (c) (2018) 1,.
[45]
T. Wang, G. Zhang, M.Z.A. Bhuiyan, A. Liu, W. Jia, M. Xie, A novel trust mechanism based on fog computing in sensor–cloud system, Future Generat. Comput. Syst. 109 (2020) 573–582,.
[46]
M. Wu, T.J. Lu, F.Y. Ling, J. Sun, H.Y. Du, Research on the architecture of internet of things, ICACTE 2010 - 2010 3rd Int. Conf. Adv. Comput. Theory Eng. Proc. 5 (2010) 484–487,.
[47]
Y. Xu, S. Helal, Scalable Cloud - Sensor Architecture for the Internet of Things 4662 (c) (2015) 1–14,.
[48]
J. Yuan, X. Li, A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion, IEEE Access 6 (2018) 23626–23638,.
[49]
C. Zhu, J.J.P.C. Rodrigues, V.C.M. Leung, L. Shu, L.T. Yang, Trust-Based Communication for the Industrial Internet of Things, 2018, pp. 16–22. no. February.
[50]
A.M. Zungeru, K.P. Seng, L.M. Ang, W. Chong Chia, Energy efficiency performance improvements for ant-based routing algorithm in wireless sensor networks, J. Sensors 2013 (2013),.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Network and Computer Applications
Journal of Network and Computer Applications  Volume 226, Issue C
Jun 2024
228 pages

Publisher

Academic Press Ltd.

United Kingdom

Publication History

Published: 17 July 2024

Author Tags

  1. EBTF
  2. Internet of things
  3. NCCBS
  4. Security
  5. TMM

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media