QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment

Main Article Content

Warsun Najib
Selo Sulistyo
Widyawan

Abstract

In the rapidly growing and increasingly complex Internet of Things (IoT) ecosystem, securing communication and data exchanges between devices is a major concern. To address this, we proposed QS-Trust, a trust-based security model considering both Quality of Service (QoS) and social parameters. QS-Trust uses a trust value to determine the trust level between devices and employs a QoS-aware trust-based algorithm to improve the security of data transmissions. Additionally, the model incorporates intelligence parameters such as computing power, memory capacity, device behavior and context information to enhance the accuracy of trust evaluation. Our simulation results demonstrated that QS-Trust effectively improved the security of the IoT ecosystem while maintaining the high level of QoS. The execution time of QS-Trust was in the range of 21 to 128 milliseconds, which is efficient for real-time IoT applications. QS-Trust offers a promising solution for securing the IoT ecosystem. The QS-Trust model effectively addresses the challenges of maintaining accurate and up-to-date trust levels in dynamic IoT environments through its decentralized approach, multi-factor evaluations, and adaptive algorithms. By continuously monitoring device performance and interactions and dynamically adjusting trust scores, QS-Trust ensures that the IoT network remains secure and reliable.

Downloads

Download data is not yet available.

Article Details

How to Cite
Najib, W., Sulistyo, S., & Widyawan. (2024). QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment. Communications in Science and Technology, 9(1), 153-160. https://doi.org/10.21924/cst.9.1.2024.1419
Section
Articles

References

1. R. Roman, P. Najera, and J. Lopez, Securing the Internet of Things, Computer (Long. Beach. Calif) 44 (2011) 51–58.
2. C. Marche and M. Nitti, Trust-Related Attacks and Their Detection: A Trust Management Model for the Social IoT, IEEE Trans. Netw. Serv. Manag. 18 (2021) 3297–3308.
3. S. Joshi and D. K. Mishra, A roadmap towards trust management & privacy preservation in mobile ad hoc networks, Proc. 2016 Int. Conf. ICT Business, Ind. Gov. ICTBIG 2016, 2017.
4. S. F. Auliya, L. E. Nugroho, and N. A. Setiawan, A review on smartphone usage data for user identification and user profiling, Commun. Sci. Technol. 6 (2021) 25–34.
5. B. Tang, H. Kang, J. Fan, Q. Li, and R. Sandhu, IoT passport: A blockchain-based trust framework for collaborative internet-of-things, Proc. ACM Symp. Access Control Model. Technol. SACMAT, (2019) 83–92.
6. D. M. Menon and N. Radhika, A Trust-Based Framework and Deep Learning-Based Attack Detection for Smart Grid Home Area Network, Int. J. Intell. Eng. Syst. 15 (2022) 106–116.
7. J. Chen, Z. Tian, X. Cui, L. Yin, and X. Wang, Trust architecture and reputation evaluation for internet of things, J. Ambient Intell. Humaniz. Comput. 0 (2018) 1–9.
8. N. B. Truong, T. W. Um, and G. M. Lee, A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things, Innov. Clouds, Internet Networks (2016).
9. T. Khan et al., An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach, Comput. Commun. 209 (2023) 217–229.
10. S. Javanmardi, M. Shojafar, S. Shariatmadari, and S. S. Ahrabi, FR trust: A fuzzy reputation-based model for trust management in semantic P2P grids, Int. J. Grid Util. Comput. 6 (2015) 57–66.
11. I. Uddin, M. Guizani, B. S. Kim, S. Hassan, and M. K. Khan, Trust management techniques for the internet of things: A survey, IEEE Access, 7 (2019) 29763–29787.
12. X. Wu, A robust and adaptive trust management system for guaranteeing the availability in the internet of things environments, KSII Trans. Internet Inf. Syst. 12 (2018) 2396–2413.
13. V. Mohammadi, A. M. Rahmani, A. M. Darwesh, and A. Sahafi, Trust-based recommendation systems in Internet of Things: a systematic literature review, Human-centric Comput. Inf. Sci., 9 (2019) 21.
14. Y. B Saied, A. Olivereau, D. Zeghlache, and M. Laurent, Trust management system design for the Internet of Things: A context-aware and multi-service approach, Comput. Secur. 39 (2013) 351–365.
15. Y. B. Saied, A. Olivereau, D. Zeghlache, and M. Laurent, Lightweight collaborative key establishment scheme for the Internet of Things, Comput. Networks 64 (2014) 273–295.
16. Y. Chae, L. C. DiPippo, and Y. L. Sun, Trust Management for Defending On-Off Attacks, IEEE Trans. Parallel Distrib. Syst. 26 (2015) 1178–1191.
17. G. D. Putra, V. Dedeoglu, S. S. Kanhere, and R. Jurdak, Trust Management in Decentralized IoT Access Control System, IEEE Int. Conf. Blockchain Cryptocurrency, ICBC 2020 (2020).
18. V. Suryani, S. Sulistyo, and W. Widyawan, ConTrust: A trust model to enhance the privacy in internet of things, Int. J. Intell. Eng. Syst. 10 (2017) 30–37.
19. M. Masmoudi, W. Abdelghani, and I. Amous, Deep Learning for Trust-Related Attacks Detection in Social Internet of Things, in Lecture Notes on Data Engineering and Communications Technologies, Cham: Springer International Publishing (41) 2020.
20. M. Nitti, R. Girau, L. Atzori, A. Iera, and G. Morabito, A subjective model for trustworthiness evaluation in the social Internet of Things, IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC), Sydney: IEEE (2012) 18–23.
21. C. Boudagdigue, A. Benslimane, A. Kobbane, and J. Liu, Trust Management in Industrial Internet of Things, IEEE Trans. Inf. Forensics Secur. 15 (2020) 3667–3682.
22. J. Guo, I. R. Chen, and J. J. P. Tsai, A survey of trust computation models for service management in internet of things systems, Comput. Commun. 97 (2017) 1–14.
23. N. B. Truong, H. Lee, B. Askwith, and G. M. Lee, Toward a trust evaluation mechanism in the social internet of things, Sensors (Switzerland) 17 (2017) 1–24.
24. L. Atzori, A. Iera, and G. Morabito, SIoT: Giving a social structure to the internet of things, IEEE Commun. Lett., 15 (2011) 1193–1195.
25. A. Favier, L. Arantes, J. Lejeune, and P. Sens, Centrality-Based Eventual Leader Election in Dynamic Networks, IEEE 20th Int. Symp. Netw. Comput. Appl. NCA (2021).
26. M. Nitti, R. Girau, and L. Atzori, Trustworthiness Management in the Social Internet of Things, IEEE Trans. Knowl. Data Eng. 26 (2014) 1253–1266.
27. M. Numan, F. Subhan, W. Z. Khan, B. Assiri, and N. Armi, Well-organized bully leader election algorithm for distributed system, Proc. - 2018 Int. Conf. Radar, Antenna, Microwave, Electron. Telecommun. ICRAMET (2018) 5–10.