ارائه روشی نوین برای محاسبه اعتماد در کاربردهای اینترنت اشیاء

نوع مقاله : علمی-پژوهشی

نویسندگان

1 دانشکده مهندسی کامپیوتر - دانشگاه علم و صنعت ایران

2 گروه مهندسی کامپیوتر - دانشگاه یزد

چکیده

در سیستم‌های اینترنت اشیا کیفیت سرویس و اعتبار داده‌های مورد استفاده برای تصمیم‌گیری در کاربردهای مختلف اهمیت بالایی دارند. اشیاء مخرب می‌توانند با ارائه داده‌های نامعتبر موجب کاهش کیفیت و تجربه سرویس برای سایر گره‌ها در یک سیستم اینترنت اشیا شوند. یکی از راه‌کارهای ممکن برای حل این مشکل، مدیریت اعتماد است. اغلب پژوهش‌های موجود برای محاسبه اعتماد متمرکز بر محاسبه اعتماد موجودیت‌های یک سیستم است. در این مقاله روشی برای محاسبه اعتماد ارائه شده است که علاوه بر محاسبه اعتماد موجودیت‌ها در یک کاربرد اینترنت اشیا، به محاسبه اعتمادپذیری داده نیز بپردازد. به این منظور، روش نوینی برای محاسبه اعتماد با در نظر گرفتن ارتباط بین اعتمادپذیری داده و اعتماد موجودیت ارائه شده است که مبتنی بر یادگیری بیزی بوده و برای محاسبه اعتمادپذیری داده از قانون ترکیب نظریه دمپستر-شیفر استفاده می‌کند. برای آزمایش روش پیشنهادی، به شبیه‌سازی این روش در سناریوی پارکینگ هوشمند پرداخته شده و مقدار همگرایی و زمان همگرایی اعتماد در حضور رفتارهای مخرب و میزان تطبیق‌پذیری آن ارزیابی شده است. نتایج حاصل از ارزیابی روش پیشنهادی در قیاس با روش موجود نشان می‌دهد که روش ما حتی در حضور 70% گره مخرب در سیستم، تخمین صحیحی از اعتماد را به دست می‌دهد. 

کلیدواژه‌ها


عنوان مقاله [English]

A Novel Trust Computation Scheme for Internet of Things Applications

نویسندگان [English]

  • B. Shayesteh 1
  • V. Hakami 1
  • S.A. Mostafavi 2
  • A. Akbari Azirani 1
1 School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran
2 Department of Computer Engineering, Yazd University, Yazd, Iran
چکیده [English]

Quality of service and trustworthiness of data is of high importance for decision making in Internet-of-Things (IoT) applications. Malicious nodes and devices may compromise the quality of service and experience for other nodes through providing invalid data and evaluations. Hence, a trust management system to assess the trust level of users and gathered data is deemed to be essential to every IoT system. The current approach in the literature for computing the trust level is entity-centric trust in which the trust level of end users are estimated. However, the trustworthiness of data is equally important in many applications. In this paper, we propose, Trusty, a hybrid trust computation approach, aiming at trust assessment for both entities as well as data. In our proposed approach, a Bayesian learning method is used for computing the entity trust, while Dempster-Shafer theory is exploited to data fusion and data trustworthiness assessment. We implement Trusty in a smart parking system scenario to investigate the performance of our model in the different settings for misbehavior nodes and faulty sensors. As shown by the extensive simulation experiments, Trusty outperforms the competing approaches in terms of convergence for both data trustworthiness and entity trust. 

کلیدواژه‌ها [English]

  • Internet of Things
  • Trust Computation
  • Data Trustworthiness
  • Smart Parking
[1]      A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari and M. Ayyash, "Internet of Things: A Survey on Enabling Technologies, Protocols and Applications," IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347-2356, 2015.
[2]      J.-H. Cho, K. Chan and S. Adali, "A survey on trust modeling," ACM Computing Surveys, vol. 48, no. 2, p. 28, 2015.
[3]      J. Guo and I.-R. Chen, "A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems," in IEEE International Conference on Services Computing, 2015.
[4]      A. Jøsang, R. Ismail and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007.
[5]      I.-R. Chen, J. Guo and F. Bao, "Trust Management for SOA-Based IoT and Its Application to Service Composition," IEEE Transactions on Services Computing, vol. 9, no. 3, pp. 482 - 495, 2016.
[6]      Y. Wang, Y.-C. Lu, I.-R. Chen, J.-H. Cho, A. Swami and C.-T. Lu, "LogitTrust: A logit regression-based trust model for mobile ad hoc networks," in 6th ASE International Conference on Privacy, Security, Risk and Trust, 2014.
[7]      S. A. Soleymani, A. H. Abdullah, W. H. Hassan, M. H. Anisi, S. Goudarzi, M. A. Rezazadeh Baee and S. Mandala, "Trust management in vehicular ad hoc network: a systematic review," EURASIP Journal on Wireless Communications and Networking , vol. 146, 2015.
[8]      X. Yao, X. Zhang, H. Ning and P. Li, "Using trust model to ensure reliable data acquisition in VANETs," Ad Hoc Networks, vol. 55, pp. 107-118, 2017.
[9]      H. Al-Hamadi and I.-R. Chen, "Trust-Based Decision Making for Health IoT Systems," IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1408 - 1419, 2017.
[10]      W. Li, H. Song and F. Zeng, "Policy-based Secure and Trustworthy Sensing for Internet of Things in Smart Cities," IEEE Internet of Things Journal , vol. PP, no. 99, p. 1, 2017.
[11]      U. Jayasinghe, A. Otebolaku and T.-W. Um, "Data centric trust evaluation and prediction framework for IOT," in ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K), 2017.
[12]      R. Böck, S. Glüge and A. Wendemuth, "Dempster-Shafer Theory with Smoothness," in International Symposium on Integrated Uncertainty in Knowledge Modelling and Decision Making, 2013.
[13]      Y. Saied, A. Olivereau, D. Zeghlache and M. Laurent, "Trust management system design for the Internet of Things: A context-aware and multi-service approach," Computers & Security, vol. 39, pp. 351-365, 2013.
[14]      F. Bao and I.-R. Chen, "Dynamic Trust Management for Internet of Things Applications," in Proceedings of the international workshop on Self-aware internet of things, 2012.
[15]      Z. Chen, R. Ling, C. Huang and X. Zhu, "A scheme of access service recommendation for the Social Internet of Things," International Journal of Communication Systems., vol. 29, no. 4, pp. 694-706, 2016.
[16]      Bao, Fenye, I.-R. Chen and J. Guo, "Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems," in IEEE Autonomous Decentralized Systems, 2013.
[17]      D. Chen, G. Chang, D. Sun, J. Li, J. Jia and W. Xingwei, "TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things," omputer Science and Information Systems, vol. 8, no. 4, pp. 1207-1228, 2011.
[18]      B. Liu, Z. Xu and J. Chen, "Toward reliable data analysis for Internet of Things by Bayesian dynamic modeling and computation," in IEEE International Conference on Signal and Information Processing, 2015.
[19]      Q. Ding, X. Li, M. Jiang and X. Zhou, "Reputation-based trust model in vehicular ad hoc networks," in Wireless Communications and Signal Processing, 2010.
[20]      S. Gurung, D. Lin, A. Squicciarini and E. Bertino, "Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks," in International Conference on Network and System Security, 2013.
[21]      M. Nitti, R. Girau and L. Atzori, "Trustworthiness Management in the Social Internet of Things," IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 5, pp. 1253 - 1266, 2014.
[22]      R. Talreja, S. Sathish and K. Nenwani, "Trust and behavior based system to prevent collision in IoT enabled VANET," in Signal Processing, Communication, Power and Embedded System, 2016.
[23]      G. Shafer, A mathematical theory of evidence, Princeton University Press, 1976.
[24]      C. Jiang, Y. Ren, H.-H. Chen and M. Guizani, "Information Sharing in Cooperative Networks: a Generic Trustworthy Issue," in IEEE International Conference on Communications, 2016.
[25]      Y. Zheng, S. Rajasegarar and C. Leckie, "Parking Availability Prediction for Sensor-Enabled Car Parks in Smart Cities," in IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2015.
[26]           جمیل جنتی، داریوش نظرپور، «مدیریت انرژی پارکینگ هوشمند خودروهای برقی در یک زیرشبکه با در نظر گرفتن اثرات برنامه پاسخگویی بار»، مجله مهندسی برق تبریز، جلد 47، شماره 2، صفحه 455-467، 1396
[27]           رحیم بجانی، محمد کلانتری، امیرمسعود افتخاری مقدم، «ارائه چهارچوبی مبتنی بر نظریه بازیها برای جلب مشارکت گره‌ها در فرآیند شناسایی گره‌های مخرب در شبکه‌های حسگر بی سیم»، مجله مهندسی برق تبریز، جلد 47، شماره 4، صفحه 1329-1342، 1396
[28]      L. Gu, J. Wang, and B. Sun, “Trust management mechanism for Internet of things”, China Communications, vol. 11, no. 2, pp. 148-156, 2014
[29]      H. Pohls, V. Angelakis, S. Suppan, K. Fischer, “RERUM: building a reliable IoT upon privacy and security enabled smart objects”, IEEE Wireless Communications and Networking Conference Workshops (WCNCW), 2014, pp. 122-127
[30]      A. Rezvanian, A.M. Saghiri, S.M. Vahidipour, M.R. Meybodi, “Recent Advances in Learning Automata”, Springer, 2018.