A Survey on Trust Computation in the Internet of Things

  • Truong, Nguyen B. (Liverpool John Moores University United Kingdom) ;
  • Jayasinghe, Upul (Liverpool John Moores University United Kingdom) ;
  • Um, Tai-Won (Electronics and Telecommunications Research Institute Korea) ;
  • Lee, Gyu Myoung (Liverpool John Moores University United Kingdom)
  • 발행 : 2016.01.29

초록

Internet of Things defines a large number of diverse entities and services which interconnect with each other and individually or cooperatively operate depending on context, conditions and environments, produce a huge personal and sensitive data. In this scenario, the satisfaction of privacy, security and trust objectives plays a critical role in the success of the Internet of Things. Trust here can be considered as a key property to establish trustworthy and seamless connectivity among entities and to guarantee secure services and applications. The aim of this study is to provide a survey on various trust computation strategies and identify future trends in the field. We discuss trust computation methods under several aspects and provide comparison of the approaches based on trust features, performance, advantages, weaknesses and limitations of each strategy. Finally the research discuss on the gap of the trust literature and raise some research directions in trust computation in the Internet of Things.

키워드

참고문헌

  1. B. A. e. al., "Towards a Decision Model based on Trust and Security Risk Management," in Seventh Australasian Conference on Information Security, 2009, pp. 61-70.
  2. Z. Yan and C. Prehofer, "Autonomic Trust Management for a Component based Software System," IEEE Transactions Dependable Secure Computing, pp. 810-823, 2011.
  3. Z. Y. e. al., "A Survey on Trust Management for Internet of Things," Journal of Network and Computer Applications, pp. 120-134, 2014.
  4. J. F. M. Blaze, J.Lacy, "Decentralized trust management," in Proceedings of IEEE Conference on Security and Privacy, 1996.
  5. N. Li and J. C. Mitchell, "Datalog with Constraints: A Foundation for Trust-management Languages," in Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages, 2003.
  6. R. L. e. al., "Internet of Things: Where to be is to Trust " EURASIP Journal on Wireless Communications and Networking, pp. 1-16, 2012.
  7. P. N. M. e. al., "A Fuzzy Approach to Trust Based Access Control in Internet of Things," in Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems, 2013.
  8. M. B. T. Beth, B. Klein, "Valuation of trust in open networks," in European Symposium on Research in Computer Security, 1994.
  9. G. Caronni, "Walking the web of trust," in Proceedings of 9th IEEE International Workshops on Enabling Technologies (WETICE), 2000.
  10. G. S. Ilung Pranata, Rukshan Athauda, "A Holistic Review on Trust and Reputation Management Systems for Digital Environments," International Journal of Computer and Information Technology, vol. 1, pp. 2277-0764, September 2012 2012.
  11. E. Chang, F. K. Hussain, and T. S. Dillon, "Fuzzy nature of trust and dynamic trust modelling in service oriented environments," in Workshop on secure web services, Fairfax, USA, 2005.
  12. E. Chang, T. Dillon, and F. K. Hussain, "Trust Reputation for Service-Oriented Environments," ed West Sussex, England: John Wiley & Sons Ltd, 2006.
  13. G. Barbian, "Trust Centrality in Online Social Networks," in Intelligence and Security Informatics Conference (EISIC), 2011 European, 2011, pp. 372-377.
  14. W. Yan, L. Lei, and L. Ee-Peng, "Price Trust Evaluation in E-service Oriented Applications," in E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E-Services, 2008 10th IEEE Conference on, 2008, pp. 165-172.
  15. L. Mui, "Computational models of trust and reputation : agents, evolutionary games, and social networks," ed: Massachusetts Institute of Technology, 2003., 2014.
  16. Z. G., "Collaborative reputation mechanisms for online communities," ed: Massachusetts Institute of Technology, 1999., 2005.
  17. S. S. Park, J. H. Lee, and T. M. Chung, "Clusterbased trust model against attacks in ad-hoc networks," 2008, pp. 526-532.
  18. Y. Ren and A. Boukerche, "Modeling and managing the trust for wireless and mobile ad hoc networks," 2008, pp. 2129-2133.
  19. R. A. Shaikh, H. Jameel, S. Lee, Y. J. Song, and S. Rajput, "Trust management problem in distributed wireless sensor networks," 2006, pp. 411-414.
  20. A. Boukerche and Y. Ren, "A security management scheme using a novel computational reputation model for wireless and mobile Ad hoc networks," 2008, pp. 88-95.
  21. B. Lagesse, M. Kumar, M. Wright, and J. M. Paluska, "DTT: A distributed trust toolkit for pervasive systems," 2009.
  22. K. Govindan and P. Mohapatra, "Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey," Communications Surveys & Tutorials, IEEE, vol. 14, pp. 279-298, 2012. https://doi.org/10.1109/SURV.2011.042711.00083
  23. F. Bao and I.-R. Chen, "Dynamic trust management for internet of things applications," presented at the Proceedings of the 2012 international workshop on Self-aware internet of things, San Jose, California, USA, 2012.
  24. M. J. Probst and S. K. Kasera, "Statistical trust establishment in wireless sensor networks," Parallel and Distributed Systems, 2007 International Conference, 2007, pp. 1-8.
  25. D. Chen, G. R. Chang, D. W. Sun, J. J. Li, J. Jia, and X. W. Wang, "TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things," COMPUTER SCIENCE AND INFORMATION SYSTEMS, vol. 8, pp. 1207-1228, 2011. https://doi.org/10.2298/CSIS110303056C
  26. A. A. Pirzada and C. McDonald, Trust establishment in pure ad-hoc networks.
  27. C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks.
  28. A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, pp. 618-644, 1/1/2007 2007. https://doi.org/10.1016/j.dss.2005.05.019
  29. C. Dellarocas, "Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior," Proceedings of the 2nd ACM Conference: Electronic Commerce, p. 150, 10/17/ 2000.
  30. N. Iltaf, A. Ghafoor, U. Zia, and M. Hussain, "An Effective Model for Indirect Trust Computation in Pervasive Computing Environment," Wireless Personal Communications, vol. 75, pp. 1689-1713, 2014/04/01 2014. https://doi.org/10.1007/s11277-013-1299-1
  31. L. Zhaoyu, A. W. Joy, and R. A. Thompson, "A dynamic trust model for mobile ad hoc networks," in Distributed Computing Systems, 2004. FTDCS 2004. Proceedings. 10th IEEE International Workshop on Future Trends of, 2004, pp. 80-85.
  32. A. Rajaram and D. S. Palaniswami, "A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks," 11/03/ 2009.
  33. L.-H. Vu, M. Hauswirth, and K. Aberer, "QoS-Based service selection and ranking with trust and reputation management," presented at the Proceedings of the 2005 Confederated international conference on On the Move to Meaningful Internet Systems - Volume >Part I, Agia Napa, Cyprus, 2005.
  34. M. H. Mashinchi, L. Lei, M. A. Orgun, and W. Yan, "The prediction of trust rating based on the quality of services using fuzzy linear regression," in Fuzzy Systems (FUZZ), 2011 IEEE International Conference on, 2011, pp. 1953-1959.
  35. A. Iliev and S. W. Smith, "Protecting Client Privacy with Trusted Computing at the Server," IEEE Security and Privacy, vol. 3, pp. 20-28, 2005.
  36. A. J, #248, sang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decis. Support Syst., vol. 43, pp. 618-644, 2007. https://doi.org/10.1016/j.dss.2005.05.019
  37. S. P. D. Rotondi, G. Altomare, A. Galipo, and S.Genolini, " Final framework architecture specification " in IoT Work vol. WP1, ed: Siemens, 2013.
  38. P. B. a. P. Samarati, "Regulating service access and information release on the web," in 7th ACM conference on computer and communications security, 2000.
  39. N. Li and J. Mitchell, "RT: A Role-based Trustmanagement Framework," in DARPA Information Survivability Conference and Exposition (DISCEX), Washington D.C, 2003.
  40. W. N. R. Gavriloaie, D. Olmedilla, K. E. Seamons, M.Winslett, "How to use declarative policies and negotiation to access sensitive resources on the semantic web," in 1st European Semantic Web Symposium (ESWS), Crete, Greece, 2004.
  41. P. A. Bonatti and D. Olmedilla, "Driving and monitoring provisional trust negotiation with metapolicies," in IEEE 6th International Workshop on Policies for Distributed Systems and Networks (POLICY), Stockholm, Sweden, 2005.
  42. T. Y. M. Winslett, K.E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B.Smith, L. Yu, "Negotiating trust on the web," IEEE Internet Computing, pp. 30-37, 2002.
  43. B. C. N. J. Kohl, " The Kerberos network authentication service,," IETF RFC 15101993.
  44. K. E. S. W.H.Winsborough, V.E. Jones, "Automated trust negotiation," in Proceedings of the DARPA Information Survivability Conference, 2000, pp. 88-102.
  45. M. W. T. Yu, "Policy migration for sensitive credentials in trust negotiation," in Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society (WPES 03), New York, USA, 2003, pp. 9-20.
  46. M. W. T. Yu, K.E. Seamons, "Interoperable Strategies in Automated Trust Negotation," in Proceedings of the 8th ACM Conference on Computer and Communications Security, New York, USA, 2001, pp. 146-155.
  47. D. O. W. Nejdl, M. Winslett, "Peertrust: automated trust negotiation for peers on the semantic web,," in Proceedings of Workshop on Secure Data Management in a Connected World in Conjunction with the 30th International Conference on Very Large Data Bases, 2004, pp. 118-132.
  48. W. H. W. N. Li, J.C. Mitchell, "Distributed credential chain discovery in trust management," Computer Security 11, pp. 35-86, 2003. https://doi.org/10.3233/JCS-2003-11102
  49. C. D. J. J.-M. Seigneur, "Trust enhanced ubiquitous payment without too much privacy loss," in Proceedings of the 2004 ACM Symposium on Applied Computing, New York, USA, 2004, pp. 1593-1599.
  50. N. M. S. F.L. Gandon, "Semantic web technologies to reconcile privacy and context awareness," in UbiMob '04: Proceedings of the 1st French-speaking Conference on Mobility and Ubiquity Computing, New York, USA, 2004, pp. 123-130.
  51. J. B. A. Uszok, R. Jeffers, N. Suri, P. Hayes, M. Breedy, L. Bunch,M. Johnson, S.Kulkarni, J. Lott, "Kaos policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement policy," in POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, Washington DC, USA, 2003.
  52. T. W. F. L. Kagal, A. Joshi, "A policy-based approach to security for Semantic Web," in Proceedings of the 2nd International Semantic Web Conference, 2003, pp. 402-418.
  53. K. K. M. Nielsen, "Towards a formal notion of trust," in Proceedings of the 5thACMSIGPLAN International Conference on Principles and Practice of Declaritive Programming, New York, USA, 2003.
  54. OASIS, "WS-Trust 1.4," in WS-Trust 1.4, ed, 2012.
  55. M. N. M. Carbone, V. Sassone, "A formal model for trust in dynamic networks," in Proceedings of International Conference on Software Engineering and Formal Methods, 2003.
  56. P. S. M.Y. Becker, Cassandra, "Distributed access control policies with tunable expressiveness," in International Workshop on Policies for Distributed Systems and Networks, 2004.
  57. W. N. T. Leithead, D. Olmedilla, K.E. Seamons, M. Winslett, T. Yu, C.C. Zhang, "How to exploit ontologies for trust negotiation," in Workshop on Trust, Security, and Reputation on the Semantic Web (ISWC), 2004.
  58. J. F. M. Blaze, J. Lacy, "Decentralized trust management," in Proceedings of IEEE Symposium on Security and Privacy, 1996, pp. 164-173.
  59. J. F. M. Blaze, J. Ioannidis, A. Keromytis,, "The KeyNote Trust Management System," University of Pennsylvania, Pennsylvania, USA1999.
  60. L. L. L. Xiong, "A Reputation-based Trust Model for Peer-to-Peer E-Commerce Communities," in IEEE International Conference on E-Commerce Technology (CEC), 2003, pp. 275-284.
  61. e. a. P. Resnick, "Reputation Systems " Communications of the ACM, pp. vol. 43, pp. 45-48, 2000.
  62. S. H. A. Abdul-Rahman, "A distributed trust model," in The New Security Paradigms Workshop, 1997, pp. 48-60.
  63. S. H. A. Abdul-Rahman, "Using recommendations for managing trust in distributed systems," in Proceedings of IEEE International Conference on Communication, 1997.
  64. M. P. S. B. Yu, "A social mechanism of reputation management in electronic communities," in International Workshop on Cooperative Information Agents, London, UK, 2000, pp. 154-165.
  65. M. P. S. B. Yu, "An evidential model of distributed reputation management," in AAMAS '02: Proceedings of the First International Joint Conference onAutonomousAgents and Multiagent Systems, New York, USA, 2002, pp. 294-301.
  66. M. P. S. B. Yu, "Detecting deception in reputation management," in AAMAS '03: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, New York, USA, 2003, pp. 73-80.
  67. C. S. J. Sabater, "Reputation and social network analysis in multiagent systems," in AAMAS '02: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, New York, USA, 2002.
  68. M. B. T. Beth, B. Klein, "Valuation of trust in open networks," in Proceedings of the 3rd European Symposium on Research in Computer Security, 1994.
  69. L. P. S. Brin, "The anatomy of a large-scale hypertextual Web search engine," Computer Networks, pp. 107-117, 1998.
  70. M. T. S. S.D.Kamvar, H. Garcia-Molina, "The eigentrust algorithm for reputation management in P2P networks," in 12th International Conference on World Wide Web, New York, NY, USA, 2003.
  71. D. C. d. V. E. Damiani, S. Paraboschi, P. Samarati, F. Violante, "A reputation-based approach for choosing reliable resources in peer-to-peer networks," in 9th ACM Conference on Computer and Communications Security, New York, NY, USA, 2002.
  72. J. H. J. Golbeck, "Accuracy of metrics for inferring trust and reputation," in Proceedings of the 14th International Conference on Knowledge Engineering and Knowledge Management, 2004.
  73. J. H. J. Golbeck, "Inferring reputation on the semantic web," in Proceedings of the 13th InternationalWorldWideWeb Conference, 2004.
  74. P. A. P. Massa, "Controversial users demand local trust metrics: an experimental study on epinions. com community," in 25th American Association for Artificial Intelligence Conference, 2005.
  75. W. N. P.-A. Chirita, M. Schlosser, O. Scurtu, "Personalized reputation management in P2P networks," in Proceedings of the Trust, Security and Reputation Workshop Held at the 3rd International Semantic Web Conference, 2004.
  76. F. B. a. I. R. Chen, "Dynamic Trust Management for the Internet of Things Applications," in International Workshop on Self-Aware Internet of Things, San Jose, USA, 2012.
  77. I. R. C. F. Bao, "Trust Management for the Internet of Things and Its Application to Service Composition," in IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Francisco, USA, June 2012.
  78. G. C. D. Chen, D. Sun, J. Li, J. Jia, X. Wang, "TRM-IoT: a trust management model based on fuzzy reputation for Internet of Things," Computer Science and Information Systems, vol. 8, pp. 1207-1228, 2011. https://doi.org/10.2298/CSIS110303056C
  79. Nguyen B.Truong, Tai-Won Um, Gyu Myoung Lee, "A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things," in Innovations in Clouds, Internet and Networks (ICIN), Paris, France, March 2016.
  80. A. Josang, "A logic for uncertain probabilities," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 9, pp. 279-311, June 2001. https://doi.org/10.1142/S0218488501000831
  81. R. I. A. Josang, C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, 2007.
  82. I. R. C. F. Bao, J. Guo, "Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems," in 11th International Symposium on Autonomous Decentralized System, Mexico City, Mexico, 2013.
  83. J. G. I.R. Chen, "Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection," in International Conference on. Advanced Information Networking and Applications, Victoria, Canada, 2014.