Abstract
Cyberprotection in the context of Internet-of-Things (IoT) includes three basic areas: security, privacy and trust. Security and privacy technologies are related to mechanisms such as cryptography or authentication protocols that have been extensively explored and adapted to IoT requirements. However, new risks such as cyber-physical attacks and novel distributed, and pervasive architectures reveal new weaknesses where trust and reputation issues are the main challenges to be addressed. Nevertheless, both, trust and reputation, are intrinsically subjective and distributed, and algorithms guaranteeing a dynamic and efficient management of these properties tend to be computationally heavy and complex. In this context, new trust and reputation services for pervasive IoT deployments are needed. Therefore, in this paper we propose a new distributed architecture for the provision of trust and reputation services in IoT systems. The architecture is based on Blockchain technologies and the composition of different conceptual models (cognitive, computational, neurological, and game-theoretical) using stochastic functions. The resulting probability may be employed by nodes to create their own trustworthy subsystem. In order to validate the performance and usability of the proposal, an experimental validation based on simulation technologies is provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abhishta, A., van Heeswijk, W., Junger, M., Nieuwenhuis, L.J.M., Joosten, R.: Why would we get attacked? An analysis of attacker’s aims behind DDoS attacks. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(2), 3–22 (2020)
Alcarria, R., Bordel, B., Robles, T., Martín, D., Manso-Callejo, M.Á.: A blockchain-based authorization system for trustworthy resource monitoring and trading in smart communities. Sensors 18(10), 3561 (2018)
Alizadeh, M., Andersson, K., Schelen, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020)
Anada, H.: Decentralized multi-authority anonymous authentication for global identities with non-interactive proofs. J. Internet Serv. Inf. Secur. (JISIS) 10(4), 23–37 (2020)
Bordel, B., Alcarria, R.: Assessment of human motivation through analysis of physiological and emotional signals in industry 4.0 scenarios. J. Ambient Intell. Hum. Comput. 1–21 (2017)
Bordel, B., Alcarria, R., De Andres, D.M., You, I.: Securing internet-of-things systems through implicit and explicit reputation models. IEEE Access 6, 47472–47488 (2018)
Bordel, B., Alcarria, R., de Rivera, D.S., Robles, T.: Process execution in cyber-physical systems using cloud and cyber-physical internet services. J. Supercomput. 74(8), 4127–4169 (2018)
Bordel, B., Alcarria, R., Martín, D., Sánchez-de Rivera, D.: An agent-based method for trust graph calculation in resource constrained environments. Integr. Comput.-Aided Eng. 27(1), 37–56 (2020)
Bordel, B., Alcarria, R., Martín, D., Sánchez-Picot, Á.: Trust provision in the internet of things using transversal blockchain networks. Intell. Autom. Soft Comput. 25(1), 155–170 (2019)
Bordel, B., Alcarria, R., Robles, T.: Denial of chain: evaluation and prediction of a novel cyberattack in blockchain-supported systems. Futur. Gener. Comput. Syst. 116, 426–439 (2021)
Bordel, B., Alcarria, R., Robles, T., González, D.: An industry 4.0 solution for the detection of dangerous situations in civil work scenarios. In: Rocha, Á., Ferrás, C., Paredes, M. (eds.) ICITS 2019. AISC, vol. 918, pp. 494–504. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11890-7_48
Bordel, B., Alcarria, R., Robles, T., Iglesias, M.S.: Data authentication and anonymization in IoT scenarios and future 5G networks using chaotic digital watermarking. IEEE Access 9, 22378–22398 (2021)
Bordel, B., Alcarria, R., Robles, T., Sanchez-Picot, A.: Stochastic and information theory techniques to reduce large datasets and detect cyberattacks in ambient intelligence environments. IEEE Access 6, 34896–34910 (2018)
Bordel, B., Alcarria, R., Sánchez-de-Rivera, D.: Detecting malicious components in large-scale internet-of-things systems and architectures. In: Rocha, Á., Correia, A.M., Adeli, H., Reis, L.P., Costanzo, S. (eds.) WorldCIST 2017. AISC, vol. 569, pp. 155–165. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56535-4_16
Bordel, B., Alcarria, R., Sánchez de Rivera, D., Martín, D., Robles, T.: Fast self-configuration in service-oriented smart environments for real-time applications. J. Ambient Intell. Smart Environ. 10(2), 143–167 (2018)
Bordel, B., Alcarria, R., Sánchez-de-Rivera, D., Robles, T.: Protecting industry 4.0 systems against the malicious effects of cyber-physical attacks. In: Ochoa, S.F., Singh, P., Bravo, J. (eds.) UCAmI 2017. LNCS, vol. 10586, pp. 161–171. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67585-5_17
Haroon, A., Akram, S., Shah, M.A., Wahid, A.: E-lithe: a lightweight secure DTLS for IoT. In: IEEE Vehicular Technology Conference, vol. 2017-September, pp. 1–5, February 2018
Huang, Z., Su, X., Zhang, Y., Shi, C., Zhang, H., Xie, L.: A decentralized solution for IoT data trusted exchange based-on blockchain. In: 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017, vol. 2018-January, pp. 1180–1184, March 2018
Ju, C., Wang, J., Xu, C.: A novel application recommendation method combining social relationship and trust relationship for future internet of things. Multimed. Tools Appl. 78(21), 29867–29880 (2018)
Kasturi, G., Jain, A., Singh, J.: Detection and classification of radio frequency jamming attacks using machine learning. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 49–62 (2020)
Kim, E., Keum, C.: Trustworthy gateway system providing IoT trust domain of smart home. In: International Conference on Ubiquitous and Future Networks, ICUFN, pp. 551–553, July 2017
König, L., Unger, S., Kieseberg, P., Tjoa, S.: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 110–127 (2020)
Liu, N., Yu, M., Zang, W., Sandhu, R.: Cost and effectiveness of TrustZone defense and side-channel attack on arm platform. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 1–15 (2020)
Murayama, Y., Hauser, C., Hikage, N., Chakraborty, B.: The sense of security and trust. In: Handbook of Research on Social and Organizational Liabilities in Information Security, pp. 493–502 (2008)
U. S. Premarathne: MAG-SIoT: a multiplicative attributes graph model based trust computation method for social Internet of Things. In: 2017 IEEE International Conference on Industrial and Information Systems, ICIIS 2017 - Proceedings, vol. 2018-January, pp. 1–6, February 2018
Raza, S., Shafagh, H., Hewage, K., Hummen, R., Voigt, T.: Lithe: lightweight secure CoAP for the internet of things. IEEE Sens. J. 13(10), 3711–3720 (2013)
Robles, T., Bordel, B., Alcarria, R., Martín, D.: Mobile wireless sensor networks: modeling and analysis of three-dimensional scenarios and neighbor discovery in mobile data collection. Ad-Hoc Sens. Wirel. Netw. 35(1–2), 67–104 (2017)
Robles, T., Bordel, B., Alcarria, R., Sánchez-de Rivera, D.: Enabling trustworthy personal data protection in eHealth and well-being services through privacy-by-design. 16(5) (2020). https://doi.org/10.1177/1550147720912110
Sánchez, B.B., Sánchez-Picot, Á., De Rivera, D.S.: Using 5G technologies in the internet of things handovers, problems and challenges. In: Proceedings - 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015, pp. 364–369, September 2015
Son, J., Choi, W., Choi, S.-M.: Trust information network in social internet of things using trust-aware recommender systems. 16(4) (2020). https://doi.org/10.1177/1550147720908773
Talreja, R., Sathish, S., Nenwani, K., Saxena, K.: Trust and behavior based system to prevent collision in IoT enabled VANET. In: International Conference on Signal Processing, Communication, Power and Embedded System, SCOPES 2016 - Proceedings, pp. 1588–1591, June 2017
Ud Din, I., Guizani, M., Kim, B.S., Hassan, S., Khan, M.K.: Trust management techniques for the internet of things: a survey. IEEE Access 7, 29763–29787 (2019)
Wortmann, F., Flüchter, K.: Internet of things. Bus. Inf. Syst. Eng. 57(3), 221–224 (2015)
Acknowledgments
The research leading to these results has received funding from the Ministry of Science, Innovation and Universities through the COGNOS project (PID2019-105484RB-I00).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bordel, B., Alcarria, R. (2022). Distributed Trust and Reputation Services in Pervasive Internet-of-Things Deployments. In: You, I., Kim, H., Youn, TY., Palmieri, F., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2021. Communications in Computer and Information Science, vol 1544. Springer, Singapore. https://doi.org/10.1007/978-981-16-9576-6_2
Download citation
DOI: https://doi.org/10.1007/978-981-16-9576-6_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-9575-9
Online ISBN: 978-981-16-9576-6
eBook Packages: Computer ScienceComputer Science (R0)