Cognitive Computation

, Volume 10, Issue 5, pp 864–873 | Cite as

A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications

  • Mufti MahmudEmail author
  • M. Shamim KaiserEmail author
  • M. Mostafizur Rahman
  • M. Arifur Rahman
  • Antesar Shabut
  • Shamim Al-Mamun
  • Amir Hussain


Rapid advancement of Internet of Things (IoT) and cloud computing enables neuroscientists to collect multilevel and multichannel brain data to better understand brain functions, diagnose diseases, and devise treatments. To ensure secure and reliable data communication between end-to-end (E2E) devices supported by current IoT and cloud infrastructures, trust management is needed at the IoT and user ends. This paper introduces an adaptive neuro-fuzzy inference system (ANFIS) brain-inspired trust management model (TMM) to secure IoT devices and relay nodes, and to ensure data reliability. The proposed TMM utilizes both node behavioral trust and data trust, which are estimated using ANFIS, and weighted additive methods respectively, to assess the nodes trustworthiness. In contrast to existing fuzzy based TMMs, simulation results confirm the robustness and accuracy of our proposed TMM in identifying malicious nodes in the communication network. With growing usage of cloud based IoT frameworks in Neuroscience research, integrating the proposed TMM into existing infrastructure will assure secure and reliable data communication among E2E devices.


ANFIS Neuro-fuzzy system Cybersecurity Behavioral trust Data trust Quality of service Neuroscience big data Brain research 



The work was supported by ACS Lab ( The authors would like to acknowledge members of the ACS Lab for proof-reading the manuscript. Amir Hussain was supported by the UK Engineering and Physical Sciences Research Council (EPSRC) through grant numbers EP/I009310/1 and EP/M026981/1.

Author Contributions

This work was carried out in close collaboration between all co-authors. MM, MSK, MMR, MAR, and SAM first defined the research theme and contributed an early design of the system. MSK and AS further implemented and refined the system development. MM and MSK first drafted the paper and all authors edited the draft. All authors have contributed to, seen, and approved the final manuscript.

Compliance with Ethical Standards

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed Consent

As this article does not contain any studies with human participants or animals performed by any of the authors, the informed consent in not applicable.


  1. 1.
    Mahmud M, Kaiser MS, Hussain A, Vassanelli S. 2018. Applications of deep learning and reinforcement learning to Biological Data. IEEE Trans Neural Netw Learn Syst. 2018. [Epub ahead of print].CrossRefGoogle Scholar
  2. 2.
    Schadt EE, Linderman MD, Sorenson J, Lee L, Nolan GP. Computational solutions to large-scale data management and analysis. Nat Rev Genet 2010;11(9):647–657.CrossRefGoogle Scholar
  3. 3.
    Shahand S, Benabdelkader A, Jaghoori MM, Mourabit Ma, Huguet J, Caan MWA, et al. A data-centric neuroscience gateway: design, implementation, and experiences. Concurr Computat: Pract Exper 2015; 27(2):489–506.CrossRefGoogle Scholar
  4. 4.
    Landhuis E. Neuroscience: Big brain, big data. Nature. 2017;541:559–561.CrossRefGoogle Scholar
  5. 5.
    Sakkalis V. Applied strategies towards EEG/MEG biomarker identification in clinical and cognitive research. Biomark Med 2011;5(1):93–105.CrossRefGoogle Scholar
  6. 6.
    McMillan CT. Neurodegenerative disease: MRI biomarkers — a precision medicine tool in neurology? Nat Rev Neurol 2016;12(6):323–324.CrossRefGoogle Scholar
  7. 7.
    Liu S, Cai W, Liu S, Zhang F, Fulham M, Feng D, et al. Multimodal neuroimaging computing: a review of the applications in neuropsychiatric disorders. Brain Inf 2015;2(3):167–180.CrossRefGoogle Scholar
  8. 8.
    Al-jawahiri R, Milne E. Resources available for autism research in the big data era: a systematic review. Peer J 2017;5:e2880.CrossRefGoogle Scholar
  9. 9.
    Young AL, Oxtoby NP, Schott JM, Alexander DC. Data-driven models of neurodegenerative disease. Adv Clin Neurosci Rehabil 2014;14(5):6–9.Google Scholar
  10. 10.
    Burns R, Vogelstein J, Szalay A. From cosmos to connectomes: the evolution of data-intensive science. Neuron 2014;83(6):1249–1252.CrossRefGoogle Scholar
  11. 11.
    Mahmud M, Pulizzi R, Vasilaki E, Giugliano M. QSpike tools: a generic framework for parallel batch preprocessing of extracellular neuronal signals recorded by substrate microelectrode arrays. Front Neuroinform 2014; 8: 26. Scholar
  12. 12.
    Mahmud M, Vassanelli S. Processing and analysis of multichannel extracellular neuronal signals: State-of-the-art and challenges. Front Neurosci 2016;10:248. Scholar
  13. 13.
    Neuro Cloud Consortium. To the cloud! a grassroots proposal to accelerate brain science discovery. Neuron 2016; 92(3):622– 627.CrossRefGoogle Scholar
  14. 14.
    Luo B, Hussain A, Mahmud M, Tang J. Advances in brain-inspired cognitive systems. Cogn Comput 2016;8(5):795–796.Google Scholar
  15. 15.
    Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Ullah Khan S. The rise of “big data” on cloud computing: Review and open research issues. Inf Syst 2015;47:98–115.CrossRefGoogle Scholar
  16. 16.
    Mahmud M, Travalin D, Bertoldo A, Girardi S, Maschietto M, Vassanelli S. An automated classification method for single sweep local field potentials recorded from rat barrel cortex under mechanical whisker stimulation. J Med Biol Eng 2012;32(6):397–404.CrossRefGoogle Scholar
  17. 17.
    Mahmud M, Bertoldo A, Girardi S, Maschietto M, Vassanelli S. SigMate: A Matlab-based automated tool for extracellular neuronal signal processing and analysis. J Neurosci Methods 2012;207(1):97–112.CrossRefGoogle Scholar
  18. 18.
    Mahmud M, Cecchetto C, Vassanelli S. An automated method for characterization of evoked single-trial local field potentials recorded from rat barrel cortex under mechanical whisker stimulation. Cogn Comput 2016;8(5): 935–945.CrossRefGoogle Scholar
  19. 19.
    Mahmud M, Rahman MM, Travalin D, Raif P, Hussain A. Service oriented architecture based web application model for collaborative biomedical signal analysis. Biomed Eng-Biomed Tech 2012;57(Sl-1):780–783. Scholar
  20. 20.
    Zhang Y, Qiu M, Tsai CW, Hassan MM, Alamri A. Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Syst J 2017;11(1):88–95.CrossRefGoogle Scholar
  21. 21.
    Ullah A, Li J, Hussain A, Yang E. Towards a biologically inspired soft switching approach for cloud resource provisioning. Cogn Comput 2016;8(5):992–1005.CrossRefGoogle Scholar
  22. 22.
    Shabut AM, Dahal KP, Bista SK, Awan IU. Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans Mob Comput 2015;14(10):2101–2115.CrossRefGoogle Scholar
  23. 23.
    Shabut AM, Dahal K. Social factors for data sparsity problem of trust models in MANETs. Proceedings of the ICNC; 2017. p. 876–880.Google Scholar
  24. 24.
    Chen D, Chang G, Sun D, Li J, Jia J, Wang X. TRM-IoT: A trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 2011;8:1207–1228.CrossRefGoogle Scholar
  25. 25.
    Marzi H, Li M. An enhanced bio-inspired trust and reputation model for wireless sensor network. Procedia Comput Sci 2013;19:1159–1166.CrossRefGoogle Scholar
  26. 26.
    Ben Saied Y, Olivereau A, Zeghlache D, Laurent M. Trust management system design for the Internet of Things: A context-aware and multi-service approach. Comput Secur 2013;39(Part B):351–365.CrossRefGoogle Scholar
  27. 27.
    Dolera Tormo G, Gomez Marmol F, Martinez Perez G. Dynamic and flexible selection of a reputation mechanism for heterogeneous environments. Future Gener Comput Syst 2015;49:113–124.CrossRefGoogle Scholar
  28. 28.
    Fang W, Zhang C, Shi Z, Zhao Q, Shan L. BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks. J Netw Comput Appl 2016;59:88–94.CrossRefGoogle Scholar
  29. 29.
    Ruan Y, Durresi A, Alfantoukh L. Trust management framework for internet of things. Proceedings of the AINA; 2016. p. 1013–1019.Google Scholar
  30. 30.
    Chen IR, Guo J, Bao F, Cho JH. Integrated social and quality of service trust management of mobile groups in ad hoc networks. Proceedings of the ICICS; 2013. p. 1–5.Google Scholar
  31. 31.
    Zhang Y, Qiu M, Tsai CW, Hassan MM, Alamri A. Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Syst J 2017;11(1):88–95.CrossRefGoogle Scholar
  32. 32.
    Kaiser MS, Chowdhury ZI, Mamun SA, Hussain A, Mahmud M. A neuro-fuzzy control system based on feature extraction of surface electromyogram signal for solar-powered wheelchair. Cogn Comput 2016;8(5): 946–954.CrossRefGoogle Scholar
  33. 33.
    Yan Z, Zhang P, Vasilakos AV. A survey on trust management for Internet of Things. J Netw Comput Appl 2014;42:120–134.CrossRefGoogle Scholar
  34. 34.
    Afsana F, Jahan N, Sunny FA, Kaiser MS, Mamun SA. Trust and energy aware Cluster modeling and spectrum handoff for cognitive radio ad-hoc network. Proceedings of the ICEEICT; 2015. p. 1–6.Google Scholar
  35. 35.
    Zhang ZX. The effects of frequency of social interaction and relationship closeness on reward allocation. J Psychol 2001;135(2):154–164.CrossRefGoogle Scholar
  36. 36.
    Jøsang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision. Decis Support Syst 2007;43(2):618–644.CrossRefGoogle Scholar
  37. 37.
    Cherry B. Entrepreneur as trust-builder: interaction frequency and relationship duration as moderators of the factors of perceived trustworthiness. Int J Bus Glob 2014;14(1):97–121.CrossRefGoogle Scholar
  38. 38.
    Daly EM, Haahr M. Social network analysis for information flow in disconnected delay-tolerant MANETs. IEEE Trans Mob Comput 2009;8(5):606–621.CrossRefGoogle Scholar
  39. 39.
    Momani M, Takruri M, Al-Hmouz R. Risk assessment algorithm in wireless sensor networks using beta distribution. CoRR 2014. arXiv:1410.3041.
  40. 40.
    Liu Y, Chitawa US, Guo G, Wang X, Tan Z, Wang S. A Reputation Model for Aggregating Ratings Based on Beta Distribution Function. Proceedings of the ICCSE; 2017. p. 77–81.Google Scholar
  41. 41.
    Josang A, Ismail R. The beta reputation system. Proceedings of the BLED; 2002. p. 324–337.Google Scholar
  42. 42.
    Takagi T, Sugeno M. Fuzzy identification of systems and its applications to modeling and control. IEEE Trans Syst Man, Cybern 1985;SMC-15(1):116–132.CrossRefGoogle Scholar
  43. 43.
    Al-Hmouz A, Shen J, Al-Hmouz R, Yan J. Modeling and Simulation of an Adaptive Neuro-Fuzzy Inference System (ANFIS) for Mobile Learning. IEEE Trans Learn Technol 2012;5(3):226–237.CrossRefGoogle Scholar
  44. 44.
    Issariyakul T, Hossain E. Introduction to network simulator, Vol 2. Boston: Springer; 2009.CrossRefGoogle Scholar
  45. 45.
    Gopinath S, Nagarajan N. Energy based reliable multicast routing protocol for packet forwarding in MANET. J Appl Res Technol 2015;13(3):374–381.CrossRefGoogle Scholar
  46. 46.
    Kaur R, Sharma N. Dynamic node recovery for improved throughput in MANET. Proceedings of the NGCT; 2015. p. 325–330.Google Scholar
  47. 47.
    Gupta NK, Pandey K. Trust based Ad-hoc on Demand Routing protocol for MANET. Proceedings of the IC3; 2013. p. 225–231.Google Scholar
  48. 48.
    Talreja R, Sathish S, Nenwani K. Trust Variable Factor : A trust based method to detect misbehaving nodes in MANET. Proceedings of the ICEEOT; 2016. p. 3238–3241.Google Scholar
  49. 49.
    Dhananjayan G, Subbiah J. T2AR: trust-aware ad-hoc routing protocol for MANET. Springer Plus 2016;5 (1):995.CrossRefGoogle Scholar
  50. 50.
    Ghosh S, Biswas S, Sarkar D, Sarkar PP. A novel Neuro-fuzzy classification technique for data mining. Egypt Inform J 2014;15(3):129–147.CrossRefGoogle Scholar
  51. 51.
    Gu Q, Zhu L, Cai Z. Computational Intelligence and Intelligent Systems. Evaluation measures of the classification performance of imbalanced data sets. Berlin: Springer; 2009. p. 461–471.Google Scholar
  52. 52.
    Andel TR, Yasinsac A. Adaptive threat modeling for secure Ad Hoc routing protocols. Electron Notes Theor Comput Sci 2008;197(2):3–14.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.NeuroChip Lab, Department of Biomedical SciencesUniversity of PadovaPadovaItaly
  2. 2.Institute of Information TechnologyJahangirnagar UniversityDhakaBangladesh
  3. 3.School of MathematicsAmerican International University - BangladeshDhakaBangladesh
  4. 4.Department of Computer ScienceUniversity of SheffieldSheffieldUK
  5. 5.Anglia Ruskin UniversityChelmsfordUK
  6. 6.Saitama UniversitySaitamaJapan
  7. 7.University of StirlingStirlingUK

Personalised recommendations