Advertisement

A Centralized Trust Management Mechanism for the Internet of Things (CTM-IoT)

  • Mohammad Dahman AlshehriEmail author
  • Farookh Khadeer Hussain
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 12)

Abstract

The Internet of Things (IoT) is an extended network that allows all devices to be connected to one another over the Internet. This new network faces numerous challenges, but mainly security issues. One such issue is how the IoT’s nodes can trust each other when they are connected over the Internet. There is a lack of studies that address the issue of trust management in IoT, or that provide a fully trustworthy framework. This paper proposes and delivers a centralized trust management mechanism for IoT by adding trust modules as a feature of the central trust manager, the Super Node (SN). To deliver a comprehensive approach, the SN includes other modules which are integrated with the whole IoT Trust Management framework to provide trustworthy communication between all nodes.

References

  1. 1.
    Ahmed, A., Bakar, K.A., Channa, M.I., Khan, A.W.: A secure routing protocol with trust and energy awareness for wireless sensor network. Mobile Netw. Appl. 21(2), 272–285 (2016)CrossRefGoogle Scholar
  2. 2.
    Alshehri, M.D., Hussain, F.K.: A comparative analysis of scalable and context-aware trust management approaches for internet of things. In: International Conference on Neural Information Processing, pp. 596–605. Springer (2015)Google Scholar
  3. 3.
    Bao, F., Chen, I.-R.: Dynamic trust management for internet of things applications. In: Proceedings of the 2012 International Workshop on Self-aware Internet of Things, pp. 1–6. ACM (2012)Google Scholar
  4. 4.
    Bao, F., Chen, R., Guo, J.: Scalable, adaptive and survivable trust management for community of interest based internet of things systems. In: 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), pp. 1–7. IEEE (2013)Google Scholar
  5. 5.
    Bello, O., Zeadally, S.: Intelligent device-to-device communication in the internet of things. IEEE Syst. J. 10(3), 1172–1182 (2016)CrossRefGoogle Scholar
  6. 6.
    Chen, R., Guo, J., Bao, F.: Trust management for SOA-based IoT and its application to service composition. IEEE Trans. Serv. Comput. 9(3), 482–495 (2016)CrossRefGoogle Scholar
  7. 7.
    Guo, J., Chen, R., Tsai, J.J.: A survey of trust computation models for service management in internet of things systems. Comput. Commun. 97, 1–14 (2017)CrossRefGoogle Scholar
  8. 8.
    Jabeur, N., Yasar, AU-H, Shakshuki, E., Haddad, H.: Toward a bio-inspired adaptive spatial clustering approach for IoT applications. Future Gener. Comput. Syst. (2017)Google Scholar
  9. 9.
    Lyu, S., Liu, J., Tang, M., Xu, Y., Chen, J.: Efficiently predicting trustworthiness of mobile services based on trust propagation in social networks. Mobile Netw. Appl. 20(6), 840–852 (2015)CrossRefGoogle Scholar
  10. 10.
    Ma, T., Liu, Y., Zhang, Z.: An energy-efficient reliable trust-based data aggregation protocol for wireless sensor networks. Int J Control Autom. 8(3), 305–318 (2015)CrossRefGoogle Scholar
  11. 11.
    Miao, J., Wang, L.: Rapid identification authentication protocol for mobile nodes in internet of things with privacy protection. JNW 7(7), 1099–1105 (2012)CrossRefGoogle Scholar
  12. 12.
    Ortiz, A.M., Hussein, D., Park, S., Han, S.N., Crespi, N.: The cluster between internet of things and social networks: review and research challenges. IEEE Internet of Things J. 1(3), 206–215 (2014)CrossRefGoogle Scholar
  13. 13.
    Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRefGoogle Scholar
  14. 14.
    Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42, 120–134 (2014)CrossRefGoogle Scholar
  15. 15.
    Yu, Y., Jia, Z., Tao, W., Xue, B., Lee, C.: An efficient trust evaluation scheme for node behavior detection in the internet of things. Wirel. Pers. Commun. 93(2), 571–587 (2017)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Mohammad Dahman Alshehri
    • 1
    • 2
    Email author
  • Farookh Khadeer Hussain
    • 1
  1. 1.Faculty of Engineering and ITUniversity of Technology SydneyUltimoAustralia
  2. 2.Computer Science DepartmentTaif UniversityTaifSaudi Arabia

Personalised recommendations