Volume 18, Issue 2 (10-2021)                   JSDP 2021, 18(2): 3-28 | Back to browse issues page


XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Ebrahimi M, Tadayon M H, Sayad Haghighi M. Trust Management in Internet of Things: Review, Analysis and Establishment of Evaluation Criteria. JSDP 2021; 18 (2) :3-28
URL: http://jsdp.rcisp.ac.ir/article-1-1123-en.html
Iran Telecommunication Research Cente
Abstract:   (2919 Views)
In the complex Internet of Things (IoT) paradigm that things interact with each other as well as with human beings, one approach is to implement trust management systems in order to provide security for smart network applications. Trust, in general, overlaps with concepts such as privacy, security, and reliability. However, the high number of objects in IoT, along with its dynamic nature and existence of malicious entities, make IoT trust management quite challenging. These attributes rule out the possibility of using traditional best practices for IoT networks. Trust management algorithms have been implemented for a variety of applications in IoT environments. These algorithms are usually utilized to enhance the quality of received services in the presence of malicious entities. Such algorithms and methods have been proposed to secure IoT networks in different contexts, including traffic routing, smart cities, vehicular ad-hoc networks, healthcare ecosystems, and object authentication. In this paper, first, different state of the art trust computation methods are numerically evaluated to estimate trust in a common testbed. Finding the best approach to assign a precise value to the trust level of an object is a crucial matter. Therefore, the principal parameters that make trust computation methods different are extracted and then, the existing trust calculation approaches built upon them are categorized. Type of relationship, direct trust, indirect trust, combination of trust values, trust updating process, data storage, and social relationships are considered as the parameters to analyze trust computation models with. Type of relationship between trustor and trustee can be different. Either of them can be object or human. Moreover, trust is usually a combination of direct experiences and recommenders’ feedback. There are different update methods too. Trust estimation can be updated after each transaction, a definite time interval, or both of them. Depending on the storage and accessibility of data, algorithms can be built to be centralized, decentralized or semi-centralized. Moreover, social parameters can be involved in trust assessment, which is the subject of trust management in Social IoT. After analyzing each of these parameters’ effect on trust assessment, in the next part of the article, trust-related attacks are studied. Every method that can make trust management models resistant to attacks is explained.  We introduce relevant attacks and their countermeasures in direct, indirect, and hybrid trust calculation algorithms. More importantly, we study the methods of trust model evaluation and the effect of limited resources on the performance of trust calculation algorithms. In short, we conduct a comparative survey in which trust-related IoT works are studied from four perspectives: (1) Trust calculation principles, (2) Attack resistance, (3) The effect of resource limitation on model performance, and (4) Trust management evaluation framework. Through this, we find the advantages and disadvantages of existing algorithms and make a measure for the evaluation of IoT trust management systems. We provide comparative tables to show the differences between IoT trust models. A major contribution of this paper is establishing quantitative metrics to assess trust estimation models and reveal their strengths and weaknesses under different conditions.
Full-Text [PDF 2368 kb]   (1903 Downloads)    
Type of Study: Research | Subject: Paper
Received: 2020/03/10 | Accepted: 2021/03/8 | Published: 2021/10/8 | ePublished: 2021/10/8

References
1. [1] J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Generation Comput.Syst., vol. 29, pp. 1645-1660,9, 2013. [DOI:10.1016/j.future.2013.01.010]
2. [2] H. Sundmaeker, P. Guillemin, P. Friess and S. Woelfflé, "Vision and challenges for realising the Internet of Things," in Cluster of European Research Projects on the Internet of Things-CERP IoT, 2010.
3. [3] X. Li, R. Lu, X. Liang, X. Shen, J. Chen and X. Lin, "Smart community: an internet of things application," IEEE Communications Magazine, vol. 49, no. 11, pp. 68-75, 2011. [DOI:10.1109/MCOM.2011.6069711]
4. [4] M. K. Geir, "Reflections on trust in devices: an informal survey of human trust in an internet-of-things context," Wireless Personal Communications, vol. 61, no. 3, pp. 495-510, 2011. [DOI:10.1007/s11277-011-0386-4]
5. [5] T. Eder, D. Nachtmann and D. Schreckling, "Trust and Reputation in the Internet of Things," Universit ̈at Passau, Tech. Rep., 2013.
6. [6] Z. Yan, P. Zhang and A. V. Vasilakos, "A survey on trust management for Internet of Things," Journal of Network and Computer Applications , vol. 42, pp. 120-134, June 2014. [DOI:10.1016/j.jnca.2014.01.014]
7. [7] S. Sicari, A. Rizzardi, L. A. Grieco and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Computer networks, vol. 76, pp. 146-164, 2015. [DOI:10.1016/j.comnet.2014.11.008]
8. [8] V. Suryani and and others, "A survey on trust in Internet of Things," in Information Technology and Electrical Engineering (ICITEE), 2016 8th International Conference on, 2016. [DOI:10.1109/ICITEED.2016.7863238]
9. [9] W. Abdelghani, C. A. Zayani, I. Amous and F. Sèdes, "Trust management in social internet of things: a survey," in Conference on e-Business, e-Services and e-Society, 2016. [DOI:10.1007/978-3-319-45234-0_39]
10. [10] C. Perera, A. Zaslavsky, P. Christen and D. Georgakopoulos, "Context aware computing for the internet of things: A survey," vol. 16, no. 1, pp. 414-454, 2014. [DOI:10.1109/SURV.2013.042313.00197]
11. [11] J. Guo, R. Chen and J. J. Tsai, "A survey of trust computation models for service management in internet of things systems," Computer Communications, vol. 97, pp. 1-14, 2017. [DOI:10.1016/j.comcom.2016.10.012]
12. [12] Elizabeth J.Chang, Farookh Khadeer Hussain and Tharam S. Dillon , "Fuzzy Nature of Trust and Dynamic Trust Modeling in Service Oriented Environments," in Proceedings of the 2005 workshop on Secure web services. ACM, 2005.
13. [13] M. Blaze, J. Feigenbaum and J. Lacy, "Decentralized trust management," in Security and Privacy, 1996. Proceedings, 1996 IEEE Symposium on, 1996.
14. [14] A. Josang, C. Keser and T. Dimitrakos, "Can we manage trust?," in iTrust, 2005. [DOI:10.1007/11429760_7]
15. [15] S. Chaeikar, M. Alizadeh, M. Tadayon and A. Jolfaei, "An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems," International Journal of Intelligent Systems, DOI:10.1002/int.22435, 25 April 2021. [DOI:10.1002/int.22435]
16. [16] D.Chen, G.Chang, D.Sun, J.Li, J.Jia and X.Wang, "TRM-IoT:A trust management model based on fuzzy reputation for Internet of things," Comput. Sci. Inf. Syst., vol. 8, pp. 1207-1228, 2011. [DOI:10.2298/CSIS110303056C]
17. [17] F. Bao and I.-R. Chen, "Dynamic trust management for internet of things applications," in Proceedings of the 2012 international workshop on Self-aware internet of things, San Jose, California, USA, 2012. [DOI:10.1145/2378023.2378025]
18. [18] S. Yosra Ben, O. Alexis, Z. Djamal and L. Maryline, "Trust management system design for the Internet of Things: A context-aware and multi-service approach," Computer and Security, vol. 39, pp. 351-365, 2013. [DOI:10.1016/j.cose.2013.09.001]
19. [19] C. Ray, F. Bao and J. Guo, "Trust management for SOA-based IoT and its application to service composition," IEEE Transactions on Services Computing, vol. 9, no. 3, pp. 482-495, 2016. [DOI:10.1109/TSC.2014.2365797]
20. [20] H. Al-Hamadi, R. Chen and J.-H. Cho, "Trust management of smart service communities," IEEE Access, vol. 7, pp. 26362-26378, 2019. [DOI:10.1109/ACCESS.2019.2901023]
21. [21] M. Nitti, R. Gira, L. Atzori, A. Iera and G. Morabito, "A subjective model for trustworthiness evaluation in the social Internet of Things," in Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium on, 2012. [DOI:10.1109/PIMRC.2012.6362662]
22. [22] B. Fenye, R. Chen and J. Guo, "Scalable, adaptive and survivable trust management for community of interest based internet of things systems," in Autonomous Decentralized Systems (ISADS), 2013 IEEE Eleventh International Symposium on , 2013.
23. [23] M. Nitti, R. Girau and L. Atzori, "Trustworthiness Management in the Social Internet of Things," Knowledge and Data Engineering, IEEE Transactions on, vol. 26, pp. 1253-1266, 2014. [DOI:10.1109/TKDE.2013.105]
24. [24] Chen, Ray, Fenye Bao and Jia Guo, "Trust-based service management for social internet of things systems," IEEE transactions on dependable and secure computing, vol. 13, no. 6, pp. 684-696, 2016. [DOI:10.1109/TDSC.2015.2420552]
25. [25] R. Sherif Emad Abdel, A. Ayman and E. Mohamad Abou, "CBSTM-IoT: Context-based social trust model for the Internet of Things," in Selected Topics in Mobile & Wireless Networking (MoWNeT), 2016 International Conference on, 2016.
26. [26] D. Airehrour, J. Gutierrez and S. K. Ray, "SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things," Future Generation Computer Systems, vol. 93, pp. 860-876, 2019. [DOI:10.1016/j.future.2018.03.021]
27. [27] A. Tandon and P. Srivastava, "Trust-based Enhanced Secure Routing against Rank and Sybil Attacks in IoT," in 2019 Twelfth International Conference on Contemporary Computing (IC3), 2019. [DOI:10.1109/IC3.2019.8844935]
28. [28] X. Anita, L. M. Martin and M. A. Bhagyaveni, "Two-way acknowledgment-based trust framework for wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 9, no. 5, p. 952905, 2013. [DOI:10.1155/2013/952905]
29. [29] S. Bhattacharya and A. Ghosh, "Entropy Trust based Approach against IP spoofing attacks in network," International Journal of Computer Applications, vol. 67, no. 23, 2013.
30. [30] R. A. Raje and A. V. Sakhare, "Routing in wireless sensor network using fuzzy based trust model," in 2014 Fourth International Conference on Communication Systems and Network Technologies, 2014. [DOI:10.1109/CSNT.2014.111]
31. [31] Y. Gao and W. Liu, "BeTrust: a dynamic trust model based on bayesian inference and tsallis entropy for medical sensor networks," Journal of Sensors, vol. 2014, 2014. [DOI:10.1155/2014/649392]
32. [32] T. Yang, X. Xiangyang, L. Peng, L. Tonghui and P. Leina, "A secure routing of wireless sensor networks based on trust evaluation model," Procedia computer science, vol. 131, pp. 1156-1163, 2018. [DOI:10.1016/j.procs.2018.04.289]
33. [33] O. AlFarraj, A. AlZubi and A. Tolba, "Trust-based neighbor selection using activation function for secure routing in wireless sensor networks," Journal of Ambient Intelligence and Humanized Computing, pp. 1-11, 2018. [DOI:10.1007/s12652-018-0885-1]
34. [34] M. Selvi, K. Thangaramya, S. Ganapathy, K. Kulothunganx, H. K. Nehemiah and A. Kannan, "An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks," Wireless Personal Communications, vol. 105, no. 4, pp. 1475-1490, 2019. [DOI:10.1007/s11277-019-06155-x]
35. [35] W. Fang, W. Zhang, W. Chen, Y. Liu and C. Tang, "TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing," Wireless Networks, pp. 1-14, 2019. [DOI:10.1007/s11276-019-02129-w]
36. [36] A. Alnasser and H. Sun, "A fuzzy logic trust model for secure routing in smart grid networks," IEEE access, vol. 5, pp. 17896-17903, 2017. [DOI:10.1109/ACCESS.2017.2740219]
37. [37] Sh. M. Antesar, P. Keshav Dahal, S. K. Bista and I. U. Awan, "Recommendation based trust model with an effective defence scheme for MANETs," IEEE Transactions on Mobile Computing, vol. 14, no. 10, pp. 2101-2115, 2015. [DOI:10.1109/TMC.2014.2374154]
38. [38] V. V. Sarbhukan and L. Ragha, "Establishing Secure Routing Path Using Trust to Enhance Security in MANET," Wireless Personal Communications, vol. 110, no. 1, pp. 245-255, 2020. [DOI:10.1007/s11277-019-06724-0]
39. [39] L. Wenjia, S. Houbing and Z. Feng, "Policy-based secure and trustworthy sensing for internet of things in smart cities," IEEE Internet of Things Journal, 27 jun 2017.
40. [40] X. Xu, X. Liu, Z. Xu, F. Dai, . X. Zhang and L. Qi, "Trust-oriented IoT service placement for smart cities in edge computing," vol. 7, no. 5, pp. 4084-4091, 2019. [DOI:10.1109/JIOT.2019.2959124]
41. [41] J. Guo, I.-R. Chen, D.-C. Wang, J. J. Tsai and H. Al-Hamadi, "Trust-based iot cloud participatory sensing of air quality," Wireless Personal Communications, vol. 105, no. 4, pp. 1461-1474, 2019. [DOI:10.1007/s11277-019-06154-y]
42. [42] G. C. Karmakar, R. Das and J. Kamruzzaman, "IoT Sensor Numerical Data Trust Model Using Temporal Correlation," IEEE Internet of Things Journal, vol. 7, no. 4, pp. 2573-2581, 2019. [DOI:10.1109/JIOT.2019.2957201]
43. [43] Z. Liu, J. Weng, J. Ma, J. Guo, B. Feng, Z. Jiang and K. Wei, "TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs," IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4028-4048, 2019. [DOI:10.1109/JIOT.2019.2957520]
44. [44] A. Alnasser, H. Sun and J. Jiang, "Recommendation-based Trust Model for Vehicle-to-Everything (V2X)," IEEE Internet of Things Journal, vol. 7, no. 1, pp. 440-450, 2019. [DOI:10.1109/JIOT.2019.2950083]
45. [45] J. Guo, X. Li, Z. Liu, J. Ma, C. Yang, J. Zhang and D. Wu, "TROVE: A Context Awareness Trust Model for VANETs Using Reinforcement Learning," IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6647-6662, 2020. [DOI:10.1109/JIOT.2020.2975084]
46. [46] F. Ahmad, F. Kurugollu, A. Adnane, R. Hussain and F. Hussain, "MARINE: Man-in-the-middle Attack Resistant trust model IN connEcted vehicles," IEEE Internet of Things Journal, vol. 7, no. 4, pp. 3310-3322, 2020. [DOI:10.1109/JIOT.2020.2967568]
47. [47] S. Nasiri, F. Sadoughi, M. H. Tadayon and A. Dehnad, "Security and privacy mechanisms of Internet of things in healthcare and non-healthcare industry," Journal of Health Administration, vol. 22, no. 4, 2019.
48. [48] S. Nasiri, F. Sadoughi, M. H. Tadayon and A. Dehnad, "Security requirements of internet of things-based healthcare system: a survey study," Acta Informatica Medica, vol. 27, no. 4, p. 253, 2019. [DOI:10.5455/aim.2019.27.253-258] [PMID] [PMCID]
49. [49] K. Kang, , Z. Pang, , L. Da Xu, , L. Ma, and C.Wang, "An interactive trust model for application market of the internet of things," IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1516-1526, 2014. [DOI:10.1109/TII.2014.2306799]
50. [50] H. Al-Hamadi and I.-R. Chen, "Trust-based decision making for health IoT systems," IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1408-1419, 2017. [DOI:10.1109/JIOT.2017.2736446]
51. [51] M. T. Hammi, B. Hammi, P. Bellot and A. Serhrouchni, "Bubbles of Trust: A decentralized blockchain-based authentication system for IoT," Computers and Security, vol. 78, pp. 126-142, 2018. [DOI:10.1016/j.cose.2018.06.004]
52. [52] N. Ghosh, S. Chandra, V. Sachidananda and Y. Elovici, "SoftAuthZ: A Context-Aware, Behavior-Based Authorization Framework for Home IoT," IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10773-10785, 2019. [DOI:10.1109/JIOT.2019.2941767]
53. [53] S. Janbabaei, H. Gharaee and N. Mohammadzadeh, "The Lightweight Authentication Scheme with Capabilities of Anonymity and Trust in Internet of Things (IoT)," Signal and Data Processing, vol. 15, no. 4, pp. 111-122, 2019. [DOI:10.29252/jsdp.15.4.111]
54. [54] L. Jun, S. Zhiqi and M. Chunyan, "Using Blockchain Technology to Build Trust in Sharing LoRaWAN IoT," in Proceedings of the 2nd International Conference on Crowd Science and Engineering, 2017.
55. [55] B. Wen, Z. Luo and Y. Wen, "Evidence and Trust: IoT Collaborative Security Mechanism," in 2018 Eighth International Conference on Information Science and Technology (ICIST), 2018. [DOI:10.1109/ICIST.2018.8426148]
56. [56] M. Zhaofeng, W. Lingyun, W. Xiaochang, W. Zhen and Z. Weizhe, "Blockchain-Enabled Decentralized Trust Management and Secure Usage Control of IoT Big Data," IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4000-4015, 2019. [DOI:10.1109/JIOT.2019.2960526]
57. [57] S. Guo, Y. Dai, S. Xu, X. Qiu and F. Qi, "Trusted cloud-edge network resource management: Drl-driven service function chain orchestration for IoT," IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6010-6022, 2020. [DOI:10.1109/JIOT.2019.2951593]
58. [58] B. Jafarian, N. Yazdani and M. Sayad Haghighi, "Discrimination-aware trust management for social internet of things," Computer Networks, vol. 178, p. 107254, 2020. [DOI:10.1016/j.comnet.2020.107254]
59. [59] B. Fenye and R. Chen, "Trust management for the internet of things and its application to service composition," in World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a, 2012. [DOI:10.1109/WoWMoM.2012.6263792]
60. [60] L. Qinghua, S. Zhu and G. Cao, "Routing in socially selfish delay tolerant networks," in NFOCOM, 2010 Proceedings IEEE, 2010.
61. [61] L. Atzori, A. Iera and G. Morabito, "SIoT: Giving a Social Structure to the Internet of Things," EEE Communications Letters, vol. 15, no. 11, pp. 1193 - 1195, 13 10 2011. [DOI:10.1109/LCOMM.2011.090911.111340]
62. [62] Y.L. Sun, Z. Han, W. Yu and K.J.R. Liu, "A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks," in INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006. [DOI:10.1109/INFOCOM.2006.154]
63. [63] F. Bao, I. Chen and J. Guo, "Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems," in Autonomous Decentralized Systems (ISADS), 2013 IEEE Eleventh International Symposium on, 2013. [DOI:10.1109/ISADS.2013.6513398]
64. [64] Z. Zibin, Y. Zhang and M. R. Lyu, "Investigating QoS of real-world web services," IEEE Transactions on Services Computing, vol. 1, pp. 32-39, Jan 2014. [DOI:10.1109/TSC.2012.34]
65. [65] X. Li and L. Liu, "Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities," IEEE transactions on Knowledge and Data Engineering, vol. 7, Jul 2004.
66. [66] K. Sepandar D, M. T. Schlosser and H. G. Molina, "The eigentrust algorithm for reputation management in p2p networks," in Proceedings of the 12th international conference on World Wide Web, 2003.

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2015 All Rights Reserved | Signal and Data Processing