skip to main content
10.1145/3600160.3605074acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT

Published:29 August 2023Publication History

ABSTRACT

The proliferation of IoT networks across various sectors necessitates robust Trust Management mechanisms for secure and reliable operations. This paper proposes a Multi-Attribute Decision Making (MADM)-based approach for trust score calculation in IoT Trust Management. This solution addresses limitations of existing methods by considering multiple attributes and providing a comprehensive evaluation of trustworthiness. The methodology computes a device's trust score by integrating factors such as Cyber Risk, Ease of Access, and Security Level using a weighted sum-based calculation. The Analytical Hierarchy Process (AHP) to determine the factors’ weights is utilized, contributing a novel approach to IoT Trust Management. Furthermore, this approach includes dynamic trust score updates throughout the device's lifetime, accommodating changes in the device's Cyber Risk for accurate trust assessment. A trust score penalization mechanism for devices below a predefined threshold is also introduced, enabling prompt risk mitigation. A simulated assessment, considering varying numbers of IoT devices, evaluates the effectiveness of the proposed methodology. By addressing limitations and introducing innovative components, the proposed MADM-based approach enhances security, reliability, and overall performance of IoT networks. This research advances trust management in IoT and provides valuable insights for developing secure and trustworthy IoT ecosystems.

References

  1. Alam S, Zardari S, Shamsi JA. Blockchain-Based Trust and Reputation Management in SIoT. Electronics. 2022; 11(23):3871. https://doi.org/10.3390/electronics11233871Google ScholarGoogle ScholarCross RefCross Ref
  2. Alghofaili Y, Rassam MA. A Trust Management Model for IoT Devices and Services Based on the Multi-Criteria Decision-Making Approach and Deep Long Short-Term Memory Technique. Sensors. 2022; 22(2):634. https://doi.org/10.3390/s22020634Google ScholarGoogle ScholarCross RefCross Ref
  3. R. Latif, "ConTrust: A Novel Context-Dependent Trust Management Model in Social Internet of Things," in IEEE Access, vol. 10, pp. 46526-46537, 2022, doi: 10.1109/ACCESS.2022.3169788.Google ScholarGoogle ScholarCross RefCross Ref
  4. Al-Rakhami MS, Al-Mashari M. A Blockchain-Based Trust Model for the Internet of Things Supply Chain Management. Sensors. 2021; 21(5):1759. https://doi.org/10.3390/s21051759Google ScholarGoogle ScholarCross RefCross Ref
  5. S. Hameed , "A Scalable Key and Trust Management Solution for IoT Sensors Using SDN and Blockchain Technology," in IEEE Sensors Journal, vol. 21, no. 6, pp. 8716-8733, 15 March15, 2021, doi: 10.1109/JSEN.2021.3052009.Google ScholarGoogle ScholarCross RefCross Ref
  6. Han Liu, Dezhi Han, Dun Li, Behavior analysis and blockchain based trust management in VANETs, Journal of Parallel and Distributed Computing, Volume 151, 2021, Pages 61-69, ISSN 0743-7315, https://doi.org/10.1016/j.jpdc.2021.02.011.Google ScholarGoogle ScholarCross RefCross Ref
  7. Yuhan Bai, Kai Fan, Kuan Zhang, Xiaochun Cheng, Hui Li, Yintang Yang, Blockchain-based trust management for agricultural green supply: A game theoretic approach, Journal of Cleaner Production, Volume 310, 2021, 127407, ISSN 0959-6526, https://doi.org/10.1016/j.jclepro.2021.127407.Google ScholarGoogle ScholarCross RefCross Ref
  8. Saeed, M., Amin, R., Aftab, M., & Ahmed, N. (2022). Trust Management Technique Using Blockchain in Smart Building. Engineering Proceedings, 20(1), 24.Google ScholarGoogle Scholar
  9. Kouicem, D. E., Imine, Y., Bouabdallah, A., & Lakhlef, H. (2020). Decentralized blockchain-based trust management protocol for the Internet of Things. IEEE Transactions on Dependable and Secure Computing, 19(2), 1292-1306.Google ScholarGoogle ScholarCross RefCross Ref
  10. Liu, Y., Zhang, C., Yan, Y., Zhou, X., Tian, Z., & Zhang, J. (2022). A semi-centralized trust management model based on blockchain for data exchange in iot system. IEEE Transactions on Services Computing.Google ScholarGoogle Scholar
  11. S. Dhelim, N. Aung, M. T. Kechadi, H. Ning, L. Chen and A. Lakas, "Trust2Vec: Large-Scale IoT Trust Management System Based on Signed Network Embeddings," in IEEE Internet of Things Journal, vol. 10, no. 1, pp. 553-562, 1 Jan.1, 2023, doi: 10.1109/JIOT.2022.3201772.Google ScholarGoogle ScholarCross RefCross Ref
  12. Luecking, M., Fries, C., Lamberti, R., & Stork, W. (2020, May). Decentralized identity and trust management framework for internet of things. In 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (pp. 1-9). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  13. Nagarajan G, Simpson SV, Venkatachalam K, Alrasheedi AF, Askar SS, Abouhawwash M, P P. A Novel Edge-Based Trust Management System for the Smart City Environment Using Eigenvector Analysis. J Healthc Eng. 2022 May 26;2022:5625897. doi: 10.1155/2022/5625897. PMID: 35663279; PMCID: PMC9162873.Google ScholarGoogle ScholarCross RefCross Ref
  14. Awan KA, Ud Din I, Almogren A, Khattak HA, Rodrigues JJPC. EdgeTrust: A Lightweight Data-Centric Trust Management Approach for IoT-Based Healthcare 4.0. Electronics. 2023; 12(1):140. https://doi.org/10.3390/electronics12010140Google ScholarGoogle ScholarCross RefCross Ref
  15. Michail Bampatsikos, Ilias Politis, Christos Xenakis, and Stelios C. A. Thomopoulos. 2021. Solving the cold start problem in Trust Management in IoT. In Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES 21). Association for Computing Machinery, New York, NY, USA, Article 128, 1–9. https://doi.org/10.1145/3465481.3469208Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. F. Ahmad, F. Kurugollu, C. A. Kerrache, S. Sezer and L. Liu, "NOTRINO: A NOvel Hybrid TRust Management Scheme for INternet-of-Vehicles," in IEEE Transactions on Vehicular Technology, vol. 70, no. 9, pp. 9244-9257, Sept. 2021, doi: 10.1109/TVT.2021.3049189.Google ScholarGoogle ScholarCross RefCross Ref
  17. Shayesteh, B., Hakami, V., & Akbari, A. (2020). A trust management scheme for IoT-enabled environmental health/accessibility monitoring services. International Journal of Information Security, 19, 93-110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mendoza CVL, Kleinschmidt JH. Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme. International Journal of Distributed Sensor Networks. 2015;11(11). doi:10.1155/2015/859731Google ScholarGoogle ScholarCross RefCross Ref
  19. Ikram Ud Din, Mohsen Guizani, Byung-Seo Kim, Suhaidi Hassan and Muhammad Khurram Khan. 2018. Trust management techniques for the Internet of Things: A survey. IEEE Access, 7, (November 2018), 29763-29787. https://doi.org/10.1109/ACCESS.2018.2880838Google ScholarGoogle ScholarCross RefCross Ref
  20. Carolina V. L. Mendoza and João H. Kleinschmidt. 2015. Mitigating on-off attacks in the internet of things using a distributed trust management scheme. International Journal of Distributed Sensor Networks, 11, 11, (November 2015). https://doi.org/10.1155%2F2015%2F859731Google ScholarGoogle Scholar
  21. Fenye Bao and Ing-Ray Chen. 2012. Dynamic trust management for internet of things applications. In Proceedings of the 2012 international workshop on Selfaware internet of things (Self-IoT ’12). Association for Computing Machinery, New York, NY, USA, 1–6. DOI:https://doi.org/10.1145/2378023.237802Google ScholarGoogle ScholarCross RefCross Ref
  22. Bhushan, Bharat, "Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions." Wireless Networks 27 (2021): 55-90.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Liang, Wenbing, and Nan Ji. "Privacy challenges of IoT-based blockchain: a systematic review." Cluster Computing 25.3 (2022): 2203-2221.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Wei, Lijun, "Trust management for Internet of Things: A comprehensive study." IEEE Internet of Things Journal 9.10 (2022): 7664-7679Google ScholarGoogle ScholarCross RefCross Ref
  25. T. L. Saaty, "The Analytic Hierarchy Process", RWS Publications, Pittsburgh, PA, 1990.Google ScholarGoogle Scholar
  26. Analytical Hierarchy Process, Priority Vector https://people.revoledu.com/kardi/tutorial/AHP/Priority%20Vector.htm Accessed on 22-06-2023Google ScholarGoogle Scholar
  27. Hyperledger Fabric, https://www.hyperledger.org/use/fabric , Accessed on 22-06-2023Google ScholarGoogle Scholar
  28. Octave, https://octave.org/ , Accessed on 22-06-2023Google ScholarGoogle Scholar
  29. Tzeng, G.H.; Huang, J.J. Multiple Attribute Decision Making: Methods and Applications; CRC Press: Boca Raton, FL, USA, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  30. Malik, Sidra, "Trustchain: Trust management in blockchain and iot supported supply chains." 2019 IEEE International Conference on Blockchain (Blockchain). IEEE, 2019.Google ScholarGoogle Scholar
  31. Raspberry, Raspberry pi 4 model b, https://www.raspberrypi.com/products/raspberry-pi-4-model-b/ , Accessed on 22-06-2023Google ScholarGoogle Scholar

Index Terms

  1. Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
      August 2023
      1440 pages
      ISBN:9798400707728
      DOI:10.1145/3600160

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 August 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate228of451submissions,51%
    • Article Metrics

      • Downloads (Last 12 months)62
      • Downloads (Last 6 weeks)7

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format