QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment
Main Article Content
Abstract
In the rapidly growing and increasingly complex Internet of Things (IoT) ecosystem, securing communication and data exchanges between devices is a major concern. To address this, we proposed QS-Trust, a trust-based security model considering both Quality of Service (QoS) and social parameters. QS-Trust uses a trust value to determine the trust level between devices and employs a QoS-aware trust-based algorithm to improve the security of data transmissions. Additionally, the model incorporates intelligence parameters such as computing power, memory capacity, device behavior and context information to enhance the accuracy of trust evaluation. Our simulation results demonstrated that QS-Trust effectively improved the security of the IoT ecosystem while maintaining the high level of QoS. The execution time of QS-Trust was in the range of 21 to 128 milliseconds, which is efficient for real-time IoT applications. QS-Trust offers a promising solution for securing the IoT ecosystem. The QS-Trust model effectively addresses the challenges of maintaining accurate and up-to-date trust levels in dynamic IoT environments through its decentralized approach, multi-factor evaluations, and adaptive algorithms. By continuously monitoring device performance and interactions and dynamically adjusting trust scores, QS-Trust ensures that the IoT network remains secure and reliable.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright
Open Access authors retain the copyrights of their papers, and all open access articles are distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided that the original work is properly cited.
The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.
While the advice and information in this journal are believed to be true and accurate on the date of its going to press, neither the authors, the editors, nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.
This work is licensed under a Creative Commons Attribution 4.0 International License.
References
2. C. Marche and M. Nitti, Trust-Related Attacks and Their Detection: A Trust Management Model for the Social IoT, IEEE Trans. Netw. Serv. Manag. 18 (2021) 3297–3308.
3. S. Joshi and D. K. Mishra, A roadmap towards trust management & privacy preservation in mobile ad hoc networks, Proc. 2016 Int. Conf. ICT Business, Ind. Gov. ICTBIG 2016, 2017.
4. S. F. Auliya, L. E. Nugroho, and N. A. Setiawan, A review on smartphone usage data for user identification and user profiling, Commun. Sci. Technol. 6 (2021) 25–34.
5. B. Tang, H. Kang, J. Fan, Q. Li, and R. Sandhu, IoT passport: A blockchain-based trust framework for collaborative internet-of-things, Proc. ACM Symp. Access Control Model. Technol. SACMAT, (2019) 83–92.
6. D. M. Menon and N. Radhika, A Trust-Based Framework and Deep Learning-Based Attack Detection for Smart Grid Home Area Network, Int. J. Intell. Eng. Syst. 15 (2022) 106–116.
7. J. Chen, Z. Tian, X. Cui, L. Yin, and X. Wang, Trust architecture and reputation evaluation for internet of things, J. Ambient Intell. Humaniz. Comput. 0 (2018) 1–9.
8. N. B. Truong, T. W. Um, and G. M. Lee, A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things, Innov. Clouds, Internet Networks (2016).
9. T. Khan et al., An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach, Comput. Commun. 209 (2023) 217–229.
10. S. Javanmardi, M. Shojafar, S. Shariatmadari, and S. S. Ahrabi, FR trust: A fuzzy reputation-based model for trust management in semantic P2P grids, Int. J. Grid Util. Comput. 6 (2015) 57–66.
11. I. Uddin, M. Guizani, B. S. Kim, S. Hassan, and M. K. Khan, Trust management techniques for the internet of things: A survey, IEEE Access, 7 (2019) 29763–29787.
12. X. Wu, A robust and adaptive trust management system for guaranteeing the availability in the internet of things environments, KSII Trans. Internet Inf. Syst. 12 (2018) 2396–2413.
13. V. Mohammadi, A. M. Rahmani, A. M. Darwesh, and A. Sahafi, Trust-based recommendation systems in Internet of Things: a systematic literature review, Human-centric Comput. Inf. Sci., 9 (2019) 21.
14. Y. B Saied, A. Olivereau, D. Zeghlache, and M. Laurent, Trust management system design for the Internet of Things: A context-aware and multi-service approach, Comput. Secur. 39 (2013) 351–365.
15. Y. B. Saied, A. Olivereau, D. Zeghlache, and M. Laurent, Lightweight collaborative key establishment scheme for the Internet of Things, Comput. Networks 64 (2014) 273–295.
16. Y. Chae, L. C. DiPippo, and Y. L. Sun, Trust Management for Defending On-Off Attacks, IEEE Trans. Parallel Distrib. Syst. 26 (2015) 1178–1191.
17. G. D. Putra, V. Dedeoglu, S. S. Kanhere, and R. Jurdak, Trust Management in Decentralized IoT Access Control System, IEEE Int. Conf. Blockchain Cryptocurrency, ICBC 2020 (2020).
18. V. Suryani, S. Sulistyo, and W. Widyawan, ConTrust: A trust model to enhance the privacy in internet of things, Int. J. Intell. Eng. Syst. 10 (2017) 30–37.
19. M. Masmoudi, W. Abdelghani, and I. Amous, Deep Learning for Trust-Related Attacks Detection in Social Internet of Things, in Lecture Notes on Data Engineering and Communications Technologies, Cham: Springer International Publishing (41) 2020.
20. M. Nitti, R. Girau, L. Atzori, A. Iera, and G. Morabito, A subjective model for trustworthiness evaluation in the social Internet of Things, IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC), Sydney: IEEE (2012) 18–23.
21. C. Boudagdigue, A. Benslimane, A. Kobbane, and J. Liu, Trust Management in Industrial Internet of Things, IEEE Trans. Inf. Forensics Secur. 15 (2020) 3667–3682.
22. J. Guo, I. R. Chen, and J. J. P. Tsai, A survey of trust computation models for service management in internet of things systems, Comput. Commun. 97 (2017) 1–14.
23. N. B. Truong, H. Lee, B. Askwith, and G. M. Lee, Toward a trust evaluation mechanism in the social internet of things, Sensors (Switzerland) 17 (2017) 1–24.
24. L. Atzori, A. Iera, and G. Morabito, SIoT: Giving a social structure to the internet of things, IEEE Commun. Lett., 15 (2011) 1193–1195.
25. A. Favier, L. Arantes, J. Lejeune, and P. Sens, Centrality-Based Eventual Leader Election in Dynamic Networks, IEEE 20th Int. Symp. Netw. Comput. Appl. NCA (2021).
26. M. Nitti, R. Girau, and L. Atzori, Trustworthiness Management in the Social Internet of Things, IEEE Trans. Knowl. Data Eng. 26 (2014) 1253–1266.
27. M. Numan, F. Subhan, W. Z. Khan, B. Assiri, and N. Armi, Well-organized bully leader election algorithm for distributed system, Proc. - 2018 Int. Conf. Radar, Antenna, Microwave, Electron. Telecommun. ICRAMET (2018) 5–10.