Abstract
The main purpose of game theory approach is to provide security- and confidence-based routing to find confidence-based secure route from initiator to destination which will satisfy some quality-of-service constraints. By applying this methodology, the utility capacity of each node is settled dependent on the verification and amassed throughput. By checking the past estimations, the utility capacity is redesigned with a punishment esteem and dependent on the refreshed utility capacity, the assault node is perceived. At the point when a middle of the road node gets a packet, it will choose its next jump dependent on the steering section. What is more, simultaneously, it will likewise affirm whether its potential next jump’s trust bigger than the trust esteem or not. If not, which indicates that the following jump is certainly not a dependable node (i.e., suspect or vindictive node) and a safe way trust-ready occasion will be enacted. The complete objective of the framework is in light of the abrupt or concealed noxious node in the steering way, so as to keep up the effectiveness of directing. Contrasted and other trust course support frameworks of this new proposed secure way trust-ready framework could diminish the directing overhead and course revelation recurrence. The fundamental reasons are: (1) this new framework is increasingly qualified to the “trust” standard, goal, way ID instead of just goal; (2) the previous bounce of every way in the forerunner list is utilized to oversee the engendering scope of the course blunder message.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Nabil, D., Tandjaoui, D., Romdhani, I., Medjek, F.: Trust Management in Internet of Things. https://doi.org/10.4018/978-1-5225-5736-4.ch007 (2018)
Li, C., Wang, G., Quot: A Light-weight commodity integrity detection Algorithm based on Chinese remainder heorem, ". In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool (2012)
Thoma, C., Cui, T., Franchetti, Franz: Secure Multiparty Computation Based Privacy Preserving Smart Metering System. Carnegie Mellon University, Pittsburgh (2018). Journal contribution
Portêlo, J., Raj, B., Trancoso, I.: Attacking a privacy preserving music matching algorithm. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, 2012, pp. 1821–1824. https://doi.org/10.1109/icassp.2012.6288255
Samaniego, M., Deters, R.: Zero-trust hierarchical management in IoT. In: 2018 IEEE International Congress on Internet of Things (ICIOT), San Francisco, CA, 2018, pp. 88–95
Burak Can, A., Bhargava, B.: SORT: A Self-ORganizing Trust model for peer-to-peer systems. IEEE Trans. Depend. Secure Comput., 14–27 (2013)
Kittur, A.S., Roshan Pais, A.: A trust model based batch verification of digital signatures in IoT. J. Ambient Intell. Hum. Comput. Springer (2019)
Chen, J.A.: Trust architecture and reputation evaluation for internet of things. J. Ambient Intell. Hum. Comput., 3099–3107 (2019)
Govil, M.C., Sharma, A.: A framework to manage trust in Internet of Things. In: 2016 International Conference on Emerging Trends in Communication Technologies (ETCT), 2016, pp. 1–5
Yan, Z., Zhang, P.: A survey on trust management for Internet of Things. ScienceDirect J. Netw. Comput. Appl., 120–134 (2014)
Malik, S., Dedeoglu, V., Kanhere, S.S., Jurdak, R.: TrustChain: trust management in Blockchain and IoT supported supply chains. In: 2019 IEEE International Conference on Blockchain (Blockchain). IEEE (2019)
Hashemi, S.Y., Aliee, F.S.: Dynamic and comprehensive trust model for IoT and its integration into RPL. J. Supercomput. (2018). https://doi.org/10.1007/s11227-018-2700-3
Reddy, V.B., Negi, A., Venkataraman, S., Venkataraman, V.R.: A similarity based trust model to mitigate badmouthing attacks in Internet of Things (IoT). In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 2019, pp. 278–282
Borkar, G.M., Mahajan, A.R.: A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel. Netw. 23, 2455–2472 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Kulkarni, N., Borkar, G.M., Marathe, N. (2021). Game Theory Approach for Trust Management in the Realm of IoT. In: Mahalle, P.N., Shinde, G.R., Dey, N., Hassanien, A.E. (eds) Security Issues and Privacy Threats in Smart Ubiquitous Computing. Studies in Systems, Decision and Control, vol 341. Springer, Singapore. https://doi.org/10.1007/978-981-33-4996-4_9
Download citation
DOI: https://doi.org/10.1007/978-981-33-4996-4_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-4995-7
Online ISBN: 978-981-33-4996-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)