دوره 18، شماره 2 - ( 7-1400 )                   جلد 18 شماره 2 صفحات 28-3 | برگشت به فهرست نسخه ها

XML English Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Ebrahimi M, Tadayon M H, Sayad Haghighi M. Trust Management in Internet of Things: Review, Analysis and Establishment of Evaluation Criteria. JSDP. 2021; 18 (2) :3-28
URL: http://jsdp.rcisp.ac.ir/article-1-1123-fa.html
ابراهیمی مریم، تدین محمد حسام، صیادحقیقی محمد. الگوریتم‌های اعتماد در اینترنت اشیا: بررسی، تحلیل و ارائه معیارهای ارزیابی. پردازش علائم و داده‌ها. 1400; 18 (2) :28-3

URL: http://jsdp.rcisp.ac.ir/article-1-1123-fa.html


پژوهشگاه ارتباطات و فناوری اطلاعات
چکیده:   (1303 مشاهده)
در فضایی که ارتباط بین انسان‌­ها و اشیا و نیز اشیا با یکدیگر پیچیده است و انتظار اجرای برنامه‌­های کاربردی فراوانی روی بستر شبکه می­‌رود، یک رویکرد برای حرکت به سمت هوشمندی با حفظ امنیت، پیاده­‌سازی سامانه‌های مدیریت اعتماد است. اعتماد همه مفاهیم امنیت، محرمانگی، حریم خصوصی و قابلیت اطمینان را تحت تأثیر قرار می‌­دهد. تعداد زیاد اشیا در شبکه، قابلیت‌­ها و کاربردهای متنوع، پویایی بسیار بالا و همچنین حضور اشیای‌ مخرب، مدیریت اعتماد در شبکه اینترنت اشیا را به یک چالش جدی مبدل کرده است؛ به‌طوری که راه‌کارهای قدیمی پیاده‌سازی اعتماد، در  این شبکه قابل استفاده نیست. در این مقاله علاوه‌بر این‌که تحلیل جامعی روی مدل­‌های محاسبه مستقیم، غیرمستقیم و ترکیبی اعتماد انجام می‌شود، انواع حملات و روش­‌های مقابله با آن­ها، روش‌­های ارزیابی مدل‌های ارائه‌شده و تأثیر محدودیت‌­های اشیا بر مدل­‌های محاسبه اعتماد، بررسی می‌شود. حیطه این بررسی، دو حوزه مدیریت اعتماد و اینترنت اشیای اجتماعی است. به­‌طور خلاصه، مطالعات صورت‌گرفته در این حوزه از چهار دیدگاه مرور و مقایسه می‌شوند: (1) مدل‌های محاسبه اعتماد، (2) راه‌کارهای مقابله با حملات اعتماد، (3) تأثیر محدودیت­‌های عناصر اینترنت اشیا و (4) روش‌­های ارزیابی الگوریتم‌­های اعتماد؛ تا به این ترتیب بتوان با تحلیلی مناسب، به نقاط  قوت و ضعف الگوریتم­‌های موجود در مقالات مطرح پی برد و متر و معیاری برای بحث ارزیابی اعتماد در اینترنت اشیا ارائه کرد. در این راستا، روش‌­های ارزیابی (متریک‌­های) کمی‌ای ارایه می‌شود که هدف آنها کشف معایب و مزایای مدل­‌های تخمین اعتماد تحت شرایط مختلف است.
متن کامل [PDF 2368 kb]   (791 دریافت)    
نوع مطالعه: پژوهشي | موضوع مقاله: مقالات گروه امنیت اطلاعات
دریافت: 1398/12/20 | پذیرش: 1399/12/18 | انتشار: 1400/7/16 | انتشار الکترونیک: 1400/7/16

فهرست منابع
1. [1] J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Generation Comput.Syst., vol. 29, pp. 1645-1660,9, 2013. [DOI:10.1016/j.future.2013.01.010]
2. [2] H. Sundmaeker, P. Guillemin, P. Friess and S. Woelfflé, "Vision and challenges for realising the Internet of Things," in Cluster of European Research Projects on the Internet of Things-CERP IoT, 2010.
3. [3] X. Li, R. Lu, X. Liang, X. Shen, J. Chen and X. Lin, "Smart community: an internet of things application," IEEE Communications Magazine, vol. 49, no. 11, pp. 68-75, 2011. [DOI:10.1109/MCOM.2011.6069711]
4. [4] M. K. Geir, "Reflections on trust in devices: an informal survey of human trust in an internet-of-things context," Wireless Personal Communications, vol. 61, no. 3, pp. 495-510, 2011. [DOI:10.1007/s11277-011-0386-4]
5. [5] T. Eder, D. Nachtmann and D. Schreckling, "Trust and Reputation in the Internet of Things," Universit ̈at Passau, Tech. Rep., 2013.
6. [6] Z. Yan, P. Zhang and A. V. Vasilakos, "A survey on trust management for Internet of Things," Journal of Network and Computer Applications , vol. 42, pp. 120-134, June 2014. [DOI:10.1016/j.jnca.2014.01.014]
7. [7] S. Sicari, A. Rizzardi, L. A. Grieco and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Computer networks, vol. 76, pp. 146-164, 2015. [DOI:10.1016/j.comnet.2014.11.008]
8. [8] V. Suryani and and others, "A survey on trust in Internet of Things," in Information Technology and Electrical Engineering (ICITEE), 2016 8th International Conference on, 2016. [DOI:10.1109/ICITEED.2016.7863238]
9. [9] W. Abdelghani, C. A. Zayani, I. Amous and F. Sèdes, "Trust management in social internet of things: a survey," in Conference on e-Business, e-Services and e-Society, 2016. [DOI:10.1007/978-3-319-45234-0_39]
10. [10] C. Perera, A. Zaslavsky, P. Christen and D. Georgakopoulos, "Context aware computing for the internet of things: A survey," vol. 16, no. 1, pp. 414-454, 2014. [DOI:10.1109/SURV.2013.042313.00197]
11. [11] J. Guo, R. Chen and J. J. Tsai, "A survey of trust computation models for service management in internet of things systems," Computer Communications, vol. 97, pp. 1-14, 2017. [DOI:10.1016/j.comcom.2016.10.012]
12. [12] Elizabeth J.Chang, Farookh Khadeer Hussain and Tharam S. Dillon , "Fuzzy Nature of Trust and Dynamic Trust Modeling in Service Oriented Environments," in Proceedings of the 2005 workshop on Secure web services. ACM, 2005.
13. [13] M. Blaze, J. Feigenbaum and J. Lacy, "Decentralized trust management," in Security and Privacy, 1996. Proceedings, 1996 IEEE Symposium on, 1996.
14. [14] A. Josang, C. Keser and T. Dimitrakos, "Can we manage trust?," in iTrust, 2005. [DOI:10.1007/11429760_7]
15. [15] S. Chaeikar, M. Alizadeh, M. Tadayon and A. Jolfaei, "An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems," International Journal of Intelligent Systems, DOI:10.1002/int.22435, 25 April 2021. [DOI:10.1002/int.22435]
16. [16] D.Chen, G.Chang, D.Sun, J.Li, J.Jia and X.Wang, "TRM-IoT:A trust management model based on fuzzy reputation for Internet of things," Comput. Sci. Inf. Syst., vol. 8, pp. 1207-1228, 2011. [DOI:10.2298/CSIS110303056C]
17. [17] F. Bao and I.-R. Chen, "Dynamic trust management for internet of things applications," in Proceedings of the 2012 international workshop on Self-aware internet of things, San Jose, California, USA, 2012. [DOI:10.1145/2378023.2378025]
18. [18] S. Yosra Ben, O. Alexis, Z. Djamal and L. Maryline, "Trust management system design for the Internet of Things: A context-aware and multi-service approach," Computer and Security, vol. 39, pp. 351-365, 2013. [DOI:10.1016/j.cose.2013.09.001]
19. [19] C. Ray, F. Bao and J. Guo, "Trust management for SOA-based IoT and its application to service composition," IEEE Transactions on Services Computing, vol. 9, no. 3, pp. 482-495, 2016. [DOI:10.1109/TSC.2014.2365797]
20. [20] H. Al-Hamadi, R. Chen and J.-H. Cho, "Trust management of smart service communities," IEEE Access, vol. 7, pp. 26362-26378, 2019. [DOI:10.1109/ACCESS.2019.2901023]
21. [21] M. Nitti, R. Gira, L. Atzori, A. Iera and G. Morabito, "A subjective model for trustworthiness evaluation in the social Internet of Things," in Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium on, 2012. [DOI:10.1109/PIMRC.2012.6362662]
22. [22] B. Fenye, R. Chen and J. Guo, "Scalable, adaptive and survivable trust management for community of interest based internet of things systems," in Autonomous Decentralized Systems (ISADS), 2013 IEEE Eleventh International Symposium on , 2013.
23. [23] M. Nitti, R. Girau and L. Atzori, "Trustworthiness Management in the Social Internet of Things," Knowledge and Data Engineering, IEEE Transactions on, vol. 26, pp. 1253-1266, 2014. [DOI:10.1109/TKDE.2013.105]
24. [24] Chen, Ray, Fenye Bao and Jia Guo, "Trust-based service management for social internet of things systems," IEEE transactions on dependable and secure computing, vol. 13, no. 6, pp. 684-696, 2016. [DOI:10.1109/TDSC.2015.2420552]
25. [25] R. Sherif Emad Abdel, A. Ayman and E. Mohamad Abou, "CBSTM-IoT: Context-based social trust model for the Internet of Things," in Selected Topics in Mobile & Wireless Networking (MoWNeT), 2016 International Conference on, 2016.
26. [26] D. Airehrour, J. Gutierrez and S. K. Ray, "SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things," Future Generation Computer Systems, vol. 93, pp. 860-876, 2019. [DOI:10.1016/j.future.2018.03.021]
27. [27] A. Tandon and P. Srivastava, "Trust-based Enhanced Secure Routing against Rank and Sybil Attacks in IoT," in 2019 Twelfth International Conference on Contemporary Computing (IC3), 2019. [DOI:10.1109/IC3.2019.8844935]
28. [28] X. Anita, L. M. Martin and M. A. Bhagyaveni, "Two-way acknowledgment-based trust framework for wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 9, no. 5, p. 952905, 2013. [DOI:10.1155/2013/952905]
29. [29] S. Bhattacharya and A. Ghosh, "Entropy Trust based Approach against IP spoofing attacks in network," International Journal of Computer Applications, vol. 67, no. 23, 2013.
30. [30] R. A. Raje and A. V. Sakhare, "Routing in wireless sensor network using fuzzy based trust model," in 2014 Fourth International Conference on Communication Systems and Network Technologies, 2014. [DOI:10.1109/CSNT.2014.111]
31. [31] Y. Gao and W. Liu, "BeTrust: a dynamic trust model based on bayesian inference and tsallis entropy for medical sensor networks," Journal of Sensors, vol. 2014, 2014. [DOI:10.1155/2014/649392]
32. [32] T. Yang, X. Xiangyang, L. Peng, L. Tonghui and P. Leina, "A secure routing of wireless sensor networks based on trust evaluation model," Procedia computer science, vol. 131, pp. 1156-1163, 2018. [DOI:10.1016/j.procs.2018.04.289]
33. [33] O. AlFarraj, A. AlZubi and A. Tolba, "Trust-based neighbor selection using activation function for secure routing in wireless sensor networks," Journal of Ambient Intelligence and Humanized Computing, pp. 1-11, 2018. [DOI:10.1007/s12652-018-0885-1]
34. [34] M. Selvi, K. Thangaramya, S. Ganapathy, K. Kulothunganx, H. K. Nehemiah and A. Kannan, "An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks," Wireless Personal Communications, vol. 105, no. 4, pp. 1475-1490, 2019. [DOI:10.1007/s11277-019-06155-x]
35. [35] W. Fang, W. Zhang, W. Chen, Y. Liu and C. Tang, "TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing," Wireless Networks, pp. 1-14, 2019. [DOI:10.1007/s11276-019-02129-w]
36. [36] A. Alnasser and H. Sun, "A fuzzy logic trust model for secure routing in smart grid networks," IEEE access, vol. 5, pp. 17896-17903, 2017. [DOI:10.1109/ACCESS.2017.2740219]
37. [37] Sh. M. Antesar, P. Keshav Dahal, S. K. Bista and I. U. Awan, "Recommendation based trust model with an effective defence scheme for MANETs," IEEE Transactions on Mobile Computing, vol. 14, no. 10, pp. 2101-2115, 2015. [DOI:10.1109/TMC.2014.2374154]
38. [38] V. V. Sarbhukan and L. Ragha, "Establishing Secure Routing Path Using Trust to Enhance Security in MANET," Wireless Personal Communications, vol. 110, no. 1, pp. 245-255, 2020. [DOI:10.1007/s11277-019-06724-0]
39. [39] L. Wenjia, S. Houbing and Z. Feng, "Policy-based secure and trustworthy sensing for internet of things in smart cities," IEEE Internet of Things Journal, 27 jun 2017.
40. [40] X. Xu, X. Liu, Z. Xu, F. Dai, . X. Zhang and L. Qi, "Trust-oriented IoT service placement for smart cities in edge computing," vol. 7, no. 5, pp. 4084-4091, 2019. [DOI:10.1109/JIOT.2019.2959124]
41. [41] J. Guo, I.-R. Chen, D.-C. Wang, J. J. Tsai and H. Al-Hamadi, "Trust-based iot cloud participatory sensing of air quality," Wireless Personal Communications, vol. 105, no. 4, pp. 1461-1474, 2019. [DOI:10.1007/s11277-019-06154-y]
42. [42] G. C. Karmakar, R. Das and J. Kamruzzaman, "IoT Sensor Numerical Data Trust Model Using Temporal Correlation," IEEE Internet of Things Journal, vol. 7, no. 4, pp. 2573-2581, 2019. [DOI:10.1109/JIOT.2019.2957201]
43. [43] Z. Liu, J. Weng, J. Ma, J. Guo, B. Feng, Z. Jiang and K. Wei, "TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs," IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4028-4048, 2019. [DOI:10.1109/JIOT.2019.2957520]
44. [44] A. Alnasser, H. Sun and J. Jiang, "Recommendation-based Trust Model for Vehicle-to-Everything (V2X)," IEEE Internet of Things Journal, vol. 7, no. 1, pp. 440-450, 2019. [DOI:10.1109/JIOT.2019.2950083]
45. [45] J. Guo, X. Li, Z. Liu, J. Ma, C. Yang, J. Zhang and D. Wu, "TROVE: A Context Awareness Trust Model for VANETs Using Reinforcement Learning," IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6647-6662, 2020. [DOI:10.1109/JIOT.2020.2975084]
46. [46] F. Ahmad, F. Kurugollu, A. Adnane, R. Hussain and F. Hussain, "MARINE: Man-in-the-middle Attack Resistant trust model IN connEcted vehicles," IEEE Internet of Things Journal, vol. 7, no. 4, pp. 3310-3322, 2020. [DOI:10.1109/JIOT.2020.2967568]
47. [47] نصیری سمیه، صدوقی فرحناز، تدین محمدحسام، دهناد افسانه، "مکانیسم‌های امنیت و حریم خصوصی اینترنت اشیا در صنعت مراقبت سلامت و غیرسلامت"، مدیریت سلامت،22 (4)، 105-86، 1398.
48. [47] S. Nasiri, F. Sadoughi, M. H. Tadayon and A. Dehnad, "Security and privacy mechanisms of Internet of things in healthcare and non-healthcare industry," Journal of Health Administration, vol. 22, no. 4, 2019.
49. [48] S. Nasiri, F. Sadoughi, M. H. Tadayon and A. Dehnad, "Security requirements of internet of things-based healthcare system: a survey study," Acta Informatica Medica, vol. 27, no. 4, p. 253, 2019. [DOI:10.5455/aim.2019.27.253-258] [PMID] [PMCID]
50. [49] K. Kang, , Z. Pang, , L. Da Xu, , L. Ma, and C.Wang, "An interactive trust model for application market of the internet of things," IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1516-1526, 2014. [DOI:10.1109/TII.2014.2306799]
51. [50] H. Al-Hamadi and I.-R. Chen, "Trust-based decision making for health IoT systems," IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1408-1419, 2017. [DOI:10.1109/JIOT.2017.2736446]
52. [51] M. T. Hammi, B. Hammi, P. Bellot and A. Serhrouchni, "Bubbles of Trust: A decentralized blockchain-based authentication system for IoT," Computers and Security, vol. 78, pp. 126-142, 2018. [DOI:10.1016/j.cose.2018.06.004]
53. [52] N. Ghosh, S. Chandra, V. Sachidananda and Y. Elovici, "SoftAuthZ: A Context-Aware, Behavior-Based Authorization Framework for Home IoT," IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10773-10785, 2019. [DOI:10.1109/JIOT.2019.2941767]
54. [53] جانبابایی شادی، قرائی حسین، محمدزاده ناصر، "ارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا"، پردازش علائم و داده‌ها، 15 (4)، 111-122، 1397.
55. [53] S. Janbabaei, H. Gharaee and N. Mohammadzadeh, "The Lightweight Authentication Scheme with Capabilities of Anonymity and Trust in Internet of Things (IoT)," Signal and Data Processing, vol. 15, no. 4, pp. 111-122, 2019. [DOI:10.29252/jsdp.15.4.111]
56. [54] L. Jun, S. Zhiqi and M. Chunyan, "Using Blockchain Technology to Build Trust in Sharing LoRaWAN IoT," in Proceedings of the 2nd International Conference on Crowd Science and Engineering, 2017.
57. [55] B. Wen, Z. Luo and Y. Wen, "Evidence and Trust: IoT Collaborative Security Mechanism," in 2018 Eighth International Conference on Information Science and Technology (ICIST), 2018. [DOI:10.1109/ICIST.2018.8426148]
58. [56] M. Zhaofeng, W. Lingyun, W. Xiaochang, W. Zhen and Z. Weizhe, "Blockchain-Enabled Decentralized Trust Management and Secure Usage Control of IoT Big Data," IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4000-4015, 2019. [DOI:10.1109/JIOT.2019.2960526]
59. [57] S. Guo, Y. Dai, S. Xu, X. Qiu and F. Qi, "Trusted cloud-edge network resource management: Drl-driven service function chain orchestration for IoT," IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6010-6022, 2020. [DOI:10.1109/JIOT.2019.2951593]
60. [58] B. Jafarian, N. Yazdani and M. Sayad Haghighi, "Discrimination-aware trust management for social internet of things," Computer Networks, vol. 178, p. 107254, 2020. [DOI:10.1016/j.comnet.2020.107254]
61. [59] B. Fenye and R. Chen, "Trust management for the internet of things and its application to service composition," in World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a, 2012. [DOI:10.1109/WoWMoM.2012.6263792]
62. [60] L. Qinghua, S. Zhu and G. Cao, "Routing in socially selfish delay tolerant networks," in NFOCOM, 2010 Proceedings IEEE, 2010.
63. [61] L. Atzori, A. Iera and G. Morabito, "SIoT: Giving a Social Structure to the Internet of Things," EEE Communications Letters, vol. 15, no. 11, pp. 1193 - 1195, 13 10 2011. [DOI:10.1109/LCOMM.2011.090911.111340]
64. [62] Y.L. Sun, Z. Han, W. Yu and K.J.R. Liu, "A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks," in INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006. [DOI:10.1109/INFOCOM.2006.154]
65. [63] F. Bao, I. Chen and J. Guo, "Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems," in Autonomous Decentralized Systems (ISADS), 2013 IEEE Eleventh International Symposium on, 2013. [DOI:10.1109/ISADS.2013.6513398]
66. [64] Z. Zibin, Y. Zhang and M. R. Lyu, "Investigating QoS of real-world web services," IEEE Transactions on Services Computing, vol. 1, pp. 32-39, Jan 2014. [DOI:10.1109/TSC.2012.34]
67. [65] X. Li and L. Liu, "Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities," IEEE transactions on Knowledge and Data Engineering, vol. 7, Jul 2004.
68. [66] K. Sepandar D, M. T. Schlosser and H. G. Molina, "The eigentrust algorithm for reputation management in p2p networks," in Proceedings of the 12th international conference on World Wide Web, 2003.

ارسال نظر درباره این مقاله : نام کاربری یا پست الکترونیک شما:
CAPTCHA

ارسال پیام به نویسنده مسئول


بازنشر اطلاعات
Creative Commons License این مقاله تحت شرایط Creative Commons Attribution-NonCommercial 4.0 International License قابل بازنشر است.

کلیه حقوق این تارنما متعلق به فصل‌نامة علمی - پژوهشی پردازش علائم و داده‌ها است.