مدل اعتماد توزیعشده رویداد محور برای شبکه اينترنت اشيا
محورهای موضوعی : مهندسی برق و کامپیوترزهرا هادیان 1 , فضل الله ادیب نیا 2 , وحید رنجبر 3
1 - دانشكده مهندسی كامپیوتر، دانشگاه یزد، ایران
2 - دانشكده مهندسی كامپیوتر، دانشگاه یزد، ایران
3 - دانشکده مهندسی کامپیوتر، دانشگاه یزد، ایران
کلید واژه: اینترنت اشیا, مدیریت اعتماد, مدیریت اعتماد توزیعشده, ارزیابی اعتماد.,
چکیده مقاله :
چشماندازی از اینترنت آینده بهگونهای معرفی شده که دستگاههای محاسباتی مختلف به یکدیگر متصل میشوند تا شبکهای به نام اینترنت اشیا را تشکیل دهند. اینترنت اشیا با ارائه بسیاری از برنامهها و وسایل هوشمند که میتوان از راه دور کنترل کرد، زندگی انسان را تسهیل میکند. امنیت اینترنت اشیا به دلیل ویژگیهای ذاتی اینترنت اشیا بهویژه ناهمگونی گرهها از نظر منابع، یک کار چالشبرانگیز است. مدیریت اعتماد با محاسبه و تجزیهوتحلیل اعتماد بین گرهها، در برقراری ارتباط بین گرهها این امکان را فراهم میکند که گره، تصمیم مناسب و قابل اعتمادی بگیرد. هدف طرحهای مدیریت در یک سیستم توزیعشده این است که بر اساس رفتارهای قبلی گرهها، رفتارهای آینده آنها را پیشبینی کند. در این مقاله یک روش مدیریت اعتماد توزیعشده رویدادمحور پیشنهاد شده که به محاسبه اعتماد بین اشیا با استفاده از جمع وزنی میپردازد. در این روش، گرهها میتوانند رفتار دیگر گرهها را ارزیابی کنند. با توجه به شبیهسازی انجامشده، روش پیشنهادی در مقایسه با روش DDTMS، سریعتر است و در تعداد تراکنش
A vision of the future Internet has been introduced in which various computing devices will be connected to each other to form a network called the Internet of Things. The Internet of Things facilitates human life by providing many applications and smart devices that can be controlled remotely. IoT security is a challenging task due to the inherent characteristics of IoT, especially the heterogeneity of nodes in terms of resources. Trust management, by calculating and analyzing the trust between nodes, enables the node to make an appropriate and reliable decision in communication between nodes. The goal of trust management schemes in a distributed system is to predict the future behavior of nodes based on their previous behavior. In this paper, an event-based distributed trust management method is proposed that calculates the trust between objects using weighted summation. In this method, nodes can evaluate the behavior of other nodes. According to the performed simulation, the proposed method is faster in comparison with the DDTMS method and identifies malicious nodes in fewer transactions and is also more resistant to on-off and bad-mouthing attacks.
[1] R. Thirukkumaran and P. Muthu Kannan, "Survey: security and trust management in Internet of Things," in Proc. IEEE Global Conf. on Wireless Computing and Networking, GCWCN'18, pp. 131-134, Lonavala, India, 23-24 Nov. 2018.
[2] L. Yijia, J. Wang, Z. Yan, Z. Wan, and R. Jäntti, "A survey on blockchain-based trust management for Internet of Things," IEEE Internet of Things J., vol. 10, no. 7, pp. 5898-5922, 1 Apr. 2023.
[3] U. Din, M. Guizani, B. S. Kim, S. Hassan, and M. Khurram Khan, "Trust management techniques for the Internet of Things: a survey," IEEE Access, vol. 7, pp. 29763-29787, 2019.
[4] S. Dhelim, et al., "Trust2Vec: large-scale IoT trust management system based on signed network embeddings," IEEE Internet of Things J., vol. 10, no. 1, pp. 553-562, 1 Jan. 2022.
[5] A. Ali, et al., "Multilevel central trust management approach for task scheduling on IoT-based mobile cloud computing," Sensors, vol. 22, no. 1, Article ID: 108, Jan. 2022.
[6] K. A. Awan, I. Ud Din, A. Almogren, M. Guizani, and S. Khan, "StabTrust-a stable and centralized trust-based clustering mechanism for IoT enabled vehicular Ad-Hoc networks," IEEE Access, vol. 8, pp. 21159-21177, 2020.
[7] M. D. Alshehri and F. K. Hussain, "A centralized trust management mechanism for the Internet of Things (CTM-IoT)," in Proc. of 12th Int. Conf.on Broad-Band Wireless Computing, Communication and Applications, BWCCA'18, pp. 533-543, Barcelona, Spain, 8-10 Nov. 2018.
[8] J. Guo, Trust-Based Service Management of Internet of Things Systems and Its Applications, Apr. 2018, Accessed: Jul. 25, 2021. [Online]. Available: https://vtechworks.lib.vt.edu/handle/10919/82854
[9] O. Ben Abderrahim, M. H. Elhdhili, and L. Saidane, "TMCoI-SIOT: a trust management system based on communities of interest for the social Internet of Things," in Proc. 13th Int. Wireless Communications and Mobile Computing Conf., IWCMC'17, pp. 747-752, Valencia, Spain , 26-30 Jun. 2017.
[10] Q. Arshad, W. Zada Khan, F. Azam, M. K. Khan, H. Yu, and Y. B. Zikria, "Blockchain-based decentralized trust management in IoT: systems, requirements and challenges," Complex & Intelligent Systems, vol. 9, no. 6, pp. 6155-6176, 2023.
[11] K. A. Awan, et al., "RobustTrust-a pro-privacy robust distributed trust management mechanism for Internet of Things," IEEE Access, vol. 7, pp. 62095-62106, 2019.
[12] R. Das, M. Singh, and K. Majumder, "SGSQoT: a community-based trust management scheme in Internet of Things," in Proc. of Int. Ethical Hacking Conf., EHaCON'18, pp. 209-222, Kolkata, India, 2019.
[13] Y. Alghofaili and M. A. Rassam, "A trust management model for IoT devices and services based on the multi-criteria decision-making approach and deep long short-term memory technique," Sensors, vol. 22, no. 2, Article ID: 834, Jan. 2022.
[14] A. Adewuyi, H. Cheng, Q. Shi, J. Cao, Á. MacDermott, and X. Wang, "CTRUST: a dynamic trust model for collaborative applications in the Internet of Things," IEEE Internet of Things J., vol. 6, no. 3, pp. 5432-5445, Jun. 2019.
[15] P. Massa and P. Avesani, "Trust-aware recommender systems," in Proc. ACM Recommender Systems Conf., RecSys'07, pp. 17-24, Minneapolis, MN, USA, 19-20 Oct. 2007.
[16] S. W. A. Hamdani, et al., "Dynamic distributed trust management scheme for the Internet of Things," Turk J. Elec Eng & Comp Sci, vol. 29, no. 2, pp. 796-815, Mar. 2021.
[17] F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt, "Cross-level sensor network simulation with COOJA," in Proc. 31st IEEE Conf. on Local Computer Networks, pp. 641-648, Tampa, FL, USA, 16-18 Nov. 2006.