The Internet of Things (IoT) applications are growing immensely. However, malicious IoT devices are major concerns that threaten the security of IoT applications. This paper proposes an intelligent reputation system for IoT devices using edge computing and cloud computing infrastructures. The proposed system can be used to mitigate the effect of malicious and malfunction IoT devices. Therefore, the proposed system can be used to enhance the effectiveness of IoT based systems such as smart cities, and reduce the risk of malicious IoT devices especially in sensitive systems, such as military applications, that leverage IoT devices. To achieve this goal, the paper proposes a new identification method for uniquely and globally identifying IoT devices wherever they move. Moreover, the paper proposes a new approach for computing the reputation of IoT devices, and calculating correct values based on these reputations. The results show that the proposed approach achieves very good results in detecting malicious IoT devices and computing very close values to the true values.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Venkatraman, B., Aloqaily, M., Reisslein, M.: An SDN architecture for time sensitive industrial IoT. J. Comput. Netw. 186, 107739 (2021)
Ridhawi, I. Al., Aloqaily, M., Boukerche, A., Jararweh Y.: Enabling intelligent IoCV services at the edge for 5G networks and beyond. IEEE Trans. Intell. Transp. Syst. (2021)
Khanna, A., Kaur, S.: Internet of Things (IoT), applications and challenges: a comprehensive review. J. Wirel. Pers. Commun. 114, 1687–1762 (2020)
Hart, J., Martinez, K.: Toward an environmental Internet of Things. J. Earth Space Sci. 2(5), 194–200 (2015)
Jararweh, Y., Otoum, S., Ridhawi, I.Al.: Trustworthy and sustainable smart city services at the edge. J. Sust. Cities Soc. 62, 102394 (2020)
Midtown Congestion Management System. https://www1.nyc.gov/html/dot/html/pr2012/pr12_25.shtml
Andrade, E., Nogueira, B., Farias, I., Araújo, D.: Performance and availability trade-offs in fog-cloud IoT environments. J. Netw. Syst. Manag. 29, 2 (2021)
Hashemi, S., Shams, F.: Fuzzy, dynamic and trust based routing protocol for IoT. J. Netw. Syst. Manag. 28, 1248–1278 (2020)
Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the social Internet of Things. IEEE Trans. Knowl. Data Eng. 26(5), 1253–1266 (2014)
Yan, Z., Ding, W., Niemi, V., Vasilakos, A.V.: Two schemes of privacy preserving trust evaluation. J. Future Gener. Comput. Syst. 62, 175–189 (2016)
Michalas, A., Komninos, N.: The lord of the sense: a privacy preserving reputation system for participatory sensing applications. In: Proceedings of the 2014 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6 (2014)
Hasan, O., Brunie, L., Bertino, E., Shang, N.: A decentralized privacy preserving reputation protocol for the malicious adversarial model. IEEE Trans. Inf. Forensics Secur. 8(6), 949–962 (2013)
Hasan, O., Brunie, L., Bertino, E.: Preserving privacy of feedback providers in decentralized reputation systems. J. Comput. Secur. 31(7), 816–826 (2012)
Asiri S., Miri, A.: An IoT trust and reputation model based on recommender systems. In: Proceedings of the 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, pp. 561–568 (2016)
Mendoza, C.V.L., Kleinschmidt, J.H.: A distributed trust management mechanism for the Internet of Things using a multi-service approach. J. Wirel. Pers. Commun. 103(3), 2501–2513 (2018)
Hussain, Y., Zhiqiu, H., Akbar, M., Alsanad, A., Alsanad, A.A., Nawaz, A., Khan, I., Khan, Z.: Context-aware trust and reputation model for fog-based IoT. J. IEEE Access 8, 31622–31632 (2020)
Chen, J., Tian, Z., Cui, X., Yin, L., Wang, X.: Trust architecture and reputation evaluation for Internet of Things. J. Ambient Intell. Humaniz. Comput. 10(8), 3099–3107 (2019)
Debe, M., Salah, K., Rehman, M.H.U., Svetinovic, D.: IoT public fog nodes reputation system: a decentralized solution using Ethereum blockchain. J. IEEE Access 7, 178082–178093 (2019)
Fortino, G., Messina, F., Rosaci, D., Sarne, G.M.L.: Using blockchain in a reputation-based model for grouping agents in the Internet of Things. IEEE Trans. Eng. Manag. 1231–1243 (2020)
Fortino, G., Messina, F., Rosaci, D., Sarnń, G.L.: Using trust and local reputation for group formation in the Cloud of Things. J. Future Gener. Comput. Syst. 89, 804–815 (2018)
Zhang, P., Kong, Y., Zhou, M.: A domain partition-based trust model for unreliable clouds. J. IEEE Trans. Inf. Forensics Secur. 13(9), 2167–2178 (2018)
Allahdadi, A., Ricardo, M.: Anomaly detection and modeling in 802.11 wireless networks. J. Netw. Syst. Manag. 27(1), 3–38 (2019)
Djedjig, N., Tandjaoui, D., Medjek, F., Romdhani, I.: Trust-aware and cooperative routing protocol for IoT security. J. Inf. Secur. Appl. 52 (2020)
Thulasiraman, P., Wang Y.: A lightweight trust-based security architecture for RPL in mobile IoT networks. In: Proceedings of the 16th IEEE Annual Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA (2019)
Murali, S., Jamalipour, A.: A lightweight intrusion detection for Sybil attack under mobile RPL in the Internet of Things. J. IEEE Internet Things 7(1), 379–388 (2020)
Alliance for Internet of Things Innovation AIOTI. https://aioti.eu/
Cooja Simulator. http://anrg.usc.edu/contiki/index.php/Cooja_Simulator
This work was supported in part by Jordan University of Science and Technology, Research Award #20190150.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Yaseen, Q., Jararweh, Y. Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System. J Netw Syst Manage 29, 45 (2021). https://doi.org/10.1007/s10922-021-09611-x