Skip to main content

TRFIoT: Trust and Reputation Model for Fog-based IoT

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11068))

Abstract

Where IoT and Cloud Computing are revolutionizing today’s ecosystem, they also cause alarming security and privacy issues. As a continuum of devices and objects are interconnected with each other in order to share data and information. It is really important to evaluate the trustworthiness of these devices/objects, whether they are trustworthy or malicious. In this work, we propose a novel Trust and Reputation (TR) based model to outsource malicious users in a Fog-based IoT (FIoT). In our model, we used a multi-source trust evaluation by taking into account of the reputation of participating nodes. We use the feedback system to make the trust system reliable and trustworthy. We evaluate our model with simulations and the result shows the effectiveness of TRFIoT.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Fog Computing. https://www.webopedia.com/TERM/F/Fog-computing.html

  2. Fog Computing and the Internet of Things Extend the Cloud to Where the Things Are. https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf

  3. The NIST Definition of Fog Computing. https://csrc.nist.gov/csrc/media/publications/sp/800-191/draft/documents/sp800-191-draft.pdf

  4. Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 4662(c), 1 (2017)

    Google Scholar 

  5. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on Internet of Things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4662(c), 1 (2017)

    Article  Google Scholar 

  6. Wang, S., Hu, X., Yu, P.S., Li, Z.: MMRate: inferring multi-aspect diffusion networks with multi-pattern cascades. In: KDD, pp. 1246–1255 (2014)

    Google Scholar 

  7. Wang, S., Xie, S., Zhang, X., Li, Z., Yu P.S., Shu, X.: Future influence ranking of scientific literature. In: SDM, pp. 749–757 (2014)

    Google Scholar 

  8. Chiang, M., Zhang, T.: Fog and IoT an overview of research opportunities. IEEE Internet Things J. 3(6), 854–864 (2016)

    Article  Google Scholar 

  9. Jalali, F., Khodadustan, S., Gray, C., Hinton, K., Suits, F.: Greening IoT with fog a survey. In: IEEE International Conference Edge Computing, pp. 25–31. IEEE (2017)

    Google Scholar 

  10. Wang, S., He, L., Stenneth, L., Yu, P.S., Li, Z., Huang, Z.: Estimating urban traffic congestions with multi-sourced data. In: MDM, pp. 82–91 (2016)

    Google Scholar 

  11. Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: Federated Conference on Computer Science and Information Systems, Warsaw, pp. 1–8 (2014)

    Google Scholar 

  12. Alhamad, M., Dillon, T., Chang, E.: SLA-based trust model for cloud computing. In: 13th International Conference Network-Based Information System, pp. 321–324 (2010)

    Google Scholar 

  13. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. In: Future Generation Computer Systems, vol. 28, no. 3, pp. 583–592 (2012)

    Article  Google Scholar 

  14. Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)

    Article  Google Scholar 

  15. Xiao, H., Sidhu, N., Christianson, B.: Guarantor and reputation based trust model for social Internet of Things. In: International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, pp. 600–605 (2015)

    Google Scholar 

  16. Kokoris-Kogias, E., Voutyras, O., Varvarigou, T.: TRM-SIoT: a scalable hybrid trust and reputation model for the social Internet of Things. In: IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), Berlin, pp. 1–9 (2016)

    Google Scholar 

  17. Fang, W., Zhang, C., Shi, Z., Zhao, Q., Shan, L.: BTRES Beta-based Trust and Reputation Evaluation System for wireless sensor networks. J. Netw. Comput. Appl. 59, 88–94 (2016)

    Article  Google Scholar 

  18. Chen, I.R., Guo, J., Bao, F.: Trust management for SOA-based IoT and its application to service composition. IEEE Trans. Serv. Comput. 9(3), 482–495 (2016)

    Article  Google Scholar 

  19. Xiong L., Liu L., Society I. C.: Peertrust supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16(7), 843–857 (2004)

    Article  Google Scholar 

  20. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proceeding 12th International Conference World Wide Web, no. 03, p. 640 (2003)

    Google Scholar 

  21. McKnight, D.H., Chervany, N.L.: The Meanings of Trust. In: Technical Report MISRC Working Paper Series, pp. 96–04. University of Minnesota, Management Information Systems Research Center (1996)

    Google Scholar 

  22. Gambetta, D.: Can we trust trust?. In: Trust Making and Breaking Cooperative Relations, pp. 213–238 . Basil Blackwell, Oxford (1990)

    Google Scholar 

  23. Audun, J., Roslan, I., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)

    Article  Google Scholar 

  24. Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., Yao, X.: Security and privacy preservation scheme of face identification and resolution model using fog computing in Internet of Things. IEEE Internet Things J. 4, 113 (2017)

    Google Scholar 

  25. Ibrahim, M.H.: Octopus an edge-fog mutual authentication scheme. Int. J. Netw. Secur. 18(6), 1089–1101 (2016)

    Google Scholar 

  26. Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking bringing order to the web. World Wide Web Internet Web Inf. Syst. 54(199966), 117 (1998)

    Google Scholar 

Download references

Acknowledgments

I would like to thank, Professor Zhiqiu Huang and Professor Wang Sen Zhang for their valuable inputs in my research. Without their kind suggestions, it wouldn’t have been possible for me to finish this Work.

This work was supported by National Natural Science Foundation of China (Grant nos. 61602262 and 61602237), Jiangsu Natural Science Foundation of China (Grant no. BK20170809), Tech R&D Program of China (2015AA015303).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yasir Hussain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hussain, Y., Huang, Z. (2018). TRFIoT: Trust and Reputation Model for Fog-based IoT. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11068. Springer, Cham. https://doi.org/10.1007/978-3-030-00021-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00021-9_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00020-2

  • Online ISBN: 978-3-030-00021-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics