Wireless Personal Communications

, Volume 103, Issue 3, pp 2501–2513 | Cite as

A Distributed Trust Management Mechanism for the Internet of Things Using a Multi-Service Approach

  • Carolina Veronica Lezama Mendoza
  • João Henrique Kleinschmidt


In the Internet of Things (IoT) heterogeneous devices can cooperate and communicate to provide or require determined services. A multi-service IoT is vulnerable to many types of malicious attacks. A trust management scheme is a strategy to establish trust between devices. In this work we propose a distributed trust management model for IoT using direct and indirect observations. The trust of a node is computed by the service quality and recommendations from neighbors. The nodes locally compute the trust of their neighbors, without the need of a central entity. We implemented the proposed strategy in the Cooja simulator of the Contiki operating system to analyze the performance of the trust model. We performed simulations using different number of malicious nodes performing the bad mouthing attack. Simulation results show the trust management scheme is able to detect malicious nodes in the network.


Internet of Things Trust management Security Multi-service 



  1. 1.
    Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of Things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516.CrossRefGoogle Scholar
  2. 2.
    Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805.CrossRefGoogle Scholar
  3. 3.
    Roman, R., Najera, P., & Lopez, J. (2011). Securing the Internet of Things. IEEE Computer, 44(9), 51–58.CrossRefGoogle Scholar
  4. 4.
    Roman, R., Zhou, J., & Lopes, J. (2013). On the features and challenges of security and privacy in distributed Internet of Things. Computer Networks, 57, 2266–2279.CrossRefGoogle Scholar
  5. 5.
    Cho, J. H., Swami, A., & Chen, R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.CrossRefGoogle Scholar
  6. 6.
    Chang, K. D., & Chen, J. L. (2012). A survey on trust management in WSNs, Internet of Things and future internet. KSII Transactions on Internet and Information Systems, 6(1), 5–23.Google Scholar
  7. 7.
    Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H. C. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80(3), 602–617.CrossRefGoogle Scholar
  8. 8.
    Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120–134.CrossRefGoogle Scholar
  9. 9.
    Guo, J., Chen, I., & Tsai, J. P. (2017). A survey of trust computation models for service management in Internet of Things systems. Computer Communications, 97(1), 1–14.CrossRefGoogle Scholar
  10. 10.
    Køien, G. M. (2011). Reflections on trust in devices: An informal survey of human trust in an Internet-of-Things context. Wireless Personal Communications, 61(3), 495–510.CrossRefGoogle Scholar
  11. 11.
    Lacuesta, R., Palacios-Navarro, G., Cetina, C., Peñalver, L., & Lloret, J. Internet of things: Where to be is to trust. EURASIP Journal on Wireless Communications and Networking, 1–16, 2012.Google Scholar
  12. 12.
    Saied, Y. B., Olivereau, A., Zeghlache, D., & Laurent, M. (2013). Trust management system design for the Internet of Things: A context-aware and multi-service approach. Computers & Security, 39, 351–365.CrossRefGoogle Scholar
  13. 13.
    Mendoza, C. V. L., & Kleinschmidt, J. H. (2015) Mitigating On–Off attacks in the internet of things using a distributed trust management scheme, International Journal of Distributed Sensor Networks, vol. 2015, article ID 859731.CrossRefGoogle Scholar
  14. 14.
    Mendoza, C. V. L., & Kleinschmidt, J. H. (2016). Defense for selective attacks in the iot with a distributed trust management scheme. In IEEE 20th international symposium on consumer electronics (pp. 1–2).Google Scholar
  15. 15.
    Chen, I. R., Guo, J., & Bao, F. (2016). Trust management for SOA-based IoT and its application to service composition. IEEE Transactions on Services Computing, 9(3), 482–495.CrossRefGoogle Scholar
  16. 16.
    Bao, F., & Chen, R. (2012). Trust management for the internet of things and its application to service composition (pp. 1–6). Mobile and Multimedia Networks (WoWMoM): IEEE International Symposium on a World of Wireless.Google Scholar
  17. 17.
    Liu, W., Yin, L., Fang, B., & Yu, X. (2012). An efficient trust evaluation approach in attacker dominated networks in internet of things. Future Information Technology, Application, and Service. Lecture Notes Electrical Engineering, 164, 559–567.CrossRefGoogle Scholar
  18. 18.
    Chen, D., Chang, G., Sun, D., Li, J., Jia, J., & Wang, X. (2011). TRM - IoT: A trust management model based on fuzzy reputation for internet of things. Computer Science and Information Systems, 8(4), 1207–1228.CrossRefGoogle Scholar
  19. 19.
    Nitti, M., Girau, R., & Atzori, L. (2014). Trustworthiness management in the social internet of things. IEEE Transactions on Knowledge and Data Engineering, 26(5), 1253–1266.CrossRefGoogle Scholar
  20. 20.
    Contiki Operating System for the Internet of Things.

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Carolina Veronica Lezama Mendoza
    • 1
  • João Henrique Kleinschmidt
    • 1
  1. 1.Universidade Federal do ABCSanto AndréBrazil

Personalised recommendations