Skip to main content
Log in

BD-Trust: behavioural and data trust management scheme for internet of things

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The emergence of Internet of Things (IoT) has paved the way to realize ubiquitous access to manifold services and applications. Effective utilization of these services vitally demands secure deployment of IoT systems where data or information can be transmitted without worrying about the uncertainty of different devices in the system. Trust Management Systems (TMS) have proved themself as impressive solutions to attain this security requirement where entities are judged based on their behavior. For IoT, influential deployment of TMS requires coping with characteristics of IoT systems such as device heterogeneity, context-awareness, dynamicity, etc. Paying attention to the quality of received data for reliable service composition and accurate assessment is also a matter of concern. This paper presents a direct observation-based distributed trust management scheme, called BD-Trust, in which trust is measured by integrating behavioral trust of devices with the data trust. For evaluation of behavioral trust, BD-Trust reckons on three trust parameters, namely success rate, satisfaction level, and credibility. Data trust is measured considering consistency in received data values for the successful interaction responses. BD-Trust employs a trust update mechanism to alleviate the effect of malicious devices that try to disrupt the process of trust management. An adaptive decay factor has been designed to reflect previously observed trust value in recent computation while updating trust scores. The effectiveness of BD-Trust has been validated through simulation experiments and results have been compared with two state-of-art schemes for trust convergence, assessment accuracy, and resilience against attacks, considering a dynamic environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Altaf A, Abbas H, Iqbal F, Derhab A (2019) Trust models of Internet of smart things: a survey, open issues, and future directions. J Netw Comput Appl 137:93–111

    Article  Google Scholar 

  • Assiri A, Almagwashi H (2018) IoT security and privacy issues. In: 2018 1st international conference on computer applications & information security (ICCAIS), IEEE, pp 1–5

  • Azzedin F, Ghaleb M (2019) Internet-of-things and information fusion: trust perspective survey. Sensors 19(8):1929

  • Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. Wirel Pers Commun 58(1):49–69

    Article  Google Scholar 

  • Bao F, Chen IR (2012) Dynamic trust management for internet of things applications. In: Proceedings of the 2012 international workshop on self-aware internet of things, pp 1–6

  • Bao F, Chen R, Guo J (2013) Scalable, adaptive and survivable trust management for community of interest based internet of things systems. In: 2013 IEEE eleventh international symposium on autonomous decentralized systems (ISADS), IEEE, pp 1–7

  • Bormann C, Ersue M, Keranen A (2014) Terminology for constrained-node networks. Fremont, CA, USA, Internet Engineering Task Force (IETF), pp 1721–2070

  • Buckland M, Gey F (1994) The relationship between recall and precision. J Am Soc Inf Sci 45(1):12–19

    Article  Google Scholar 

  • Carneiro G (2010) NS-3: network simulator 3. In: UTM Lab Meeting April, vol 20, pp 4–5

  • Chae Y, DiPippo LC, Sun YL (2014) Trust management for defending on-off attacks. IEEE Trans Parallel Distrib Syst 26(4):1178–1191

    Article  Google Scholar 

  • Chen R, Guo J, Bao F (2014) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9(3):482–495

    Article  Google Scholar 

  • Chen J, Tian Z, Cui X, Yin L, Wang X (2019) Trust architecture and reputation evaluation for internet of things. J Ambient Intell Humaniz Comput 10(8):3099–3107

    Article  Google Scholar 

  • Cho JH, Swami A, Chen R (2010) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tutor 13(4):562–583

    Article  Google Scholar 

  • Da Xu L, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inform 10(4):2233–2243

    Article  Google Scholar 

  • Feng R, Han X, Liu Q, Yu N (2015) A credible Bayesian-based trust management scheme for wireless sensor networks. Int J Distrib Sens Netw 11(11):1–9

    Article  Google Scholar 

  • Ghaleb M, din F (2021) Towards scalable and efficient architecture for modeling trust in IoT environments. Sensors 21(9):2986–3011

    Article  Google Scholar 

  • Guo J, Chen R, Tsai JJ (2017) A survey of trust computation models for service management in internet of things systems. Comput Commun 97:1–14

    Article  Google Scholar 

  • Hendler J (2009) Web 3.0 emerging. Computer 42(1):111–113

    Article  Google Scholar 

  • Hoffman K, Zage D, Nita-Rotaru C (2009) A survey of attack and defense techniques for reputation systems. ACM Comput Surv (CSUR) 42(1):1–31

    Article  Google Scholar 

  • Jayasinghe U, Otebolaku A, Um TW, Lee GM (2017) Data centric trust evaluation and prediction framework for IoT. In: 2017 ITU kaleidoscope: challenges for a data-driven society (ITU K), IEEE, pp 1–7

  • Josang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th bled electronic commerce conference, vol 5, pp 2502–2511

  • Junior FMR, Kamienski CA (2021) A survey on trustworthiness for the internet of things. IEEE Access 9:42493–42514

    Article  Google Scholar 

  • Laner M, Nikaein N, Svoboda P, Popovic M, Drajic D, Krco S (2015) Traffic models for machine-to-machine (m2m) communications: types and applications. In: Machine-to-machine (M2M) communications. Elsevier, pp 133–154

  • Mahmud M, Kaiser MS, Rahman MM, Rahman MA, Shabut A, Al-Mamun S, Hussain A (2018) A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications. Cogn Comput 10(5):864–873

    Article  Google Scholar 

  • Manchala DW (2000) E-commerce trust metrics and models. IEEE Internet Comput 4(2):36–44

    Article  Google Scholar 

  • Mendoza CV, Kleinschmidt JH (2015) Mitigating on-off attacks in the internet of things using a distributed trust management scheme. Int J Distrib Sens Netw 11(11):859731

    Article  Google Scholar 

  • Nitti M, Girau R, Atzori L, Iera A, Morabito G (2012) A subjective model for trustworthiness evaluation in the social internet of things. In: 2012 IEEE 23rd international symposium on personal. Indoor and mobile radio communications-(PIMRC), IEEE, pp 18–23

  • Pełech-Pilichowski T (2018) On adaptive prediction of nonstationary and inconsistent large time series data. 2018 41st International Convention on Information and Communication Technology. Electronics and Microelectronics (MIPRO), IEEE, pp 1260–1265

  • Rasmusson L, Jansson S (1996) Simulated social control for secure internet commerce. In: Proceedings of the 1996 workshop on new security paradigms, pp 18–25

  • Saied YB, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the internet of things: a context-aware and multi-service approach. Comput Secur 39:351–365

    Article  Google Scholar 

  • Shaikh E, Mohiuddin I, Manzoor A (2019) Internet of things (IoT): security and privacy threats. In: 2019 2nd international conference on computer applications & information security (ICCAIS), IEEE, pp 1–6

  • Sharma A, Pilli ES, Mazumdar AP (2017a) Obviating capricious behavior in internet of things. In: 2017 international conference on advances in computing. Communications and informatics (ICACCI), IEEE, pp 480–486

  • Sharma A, Pilli ES, Mazumdar AP (2017b) Trust management in IoT. In: Foundation for smart cities, ehealth, and ubiquitous computing. Taylor & Francis, pp 221–240

  • Sharma A, Pilli ES, Mazumdar AP, Gera P (2020) Towards trustworthy internet of things: a survey on trust management applications and schemes. Comput Commun 160:475–493

    Article  Google Scholar 

  • Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164

    Article  Google Scholar 

  • Souissi I, Azzouna NB, Said LB (2019) A multi-level study of information trust models in WSN-assisted IoT. Comput Netw 151:12–30

    Article  Google Scholar 

  • Stankovic JA (2014) Research directions for the internet of things. IEEE Internet Things J 1(1):3–9

    Article  Google Scholar 

  • Stoica I, Morris R, Liben-Nowell D, Karger DR, Kaashoek MF, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans Netw 11(1):17–32

    Article  Google Scholar 

  • Sun YL, Han Z, Yu W, Liu KR (2006) Attacks on trust evaluation in distributed networks. In: 2006 40th annual conference on information sciences and systems, IEEE, pp 1461–1466

  • Ting HLJ, Kang X, Li T, Wang H, Chu CK (2021) On the trust and trust modeling for the future fully-connected digital world: a comprehensive study. IEEE Access 9:106743–106783

    Article  Google Scholar 

  • Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134

    Article  Google Scholar 

  • Yu Y, Li K, Zhou W, Li P (2012) Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J Netw Comput Appl 35(3):867–880

    Article  Google Scholar 

  • Yu Y, Jia Z, Tao W, Xue B, Lee C (2017) An efficient trust evaluation scheme for node behavior detection in the internet of things. Wirel Pers Commun 93(2):571–587

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Emmanuel S. Pilli.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article. The authors have no relevant financial or non-financial interests to disclose. This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, A., Pilli, E.S. & Mazumdar, A.P. BD-Trust: behavioural and data trust management scheme for internet of things. J Ambient Intell Human Comput 14, 16195–16207 (2023). https://doi.org/10.1007/s12652-022-03841-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-022-03841-w

Navigation