Skip to main content

Distributed Trust and Reputation Services in Pervasive Internet-of-Things Deployments

  • Conference paper
  • First Online:
Mobile Internet Security (MobiSec 2021)

Abstract

Cyberprotection in the context of Internet-of-Things (IoT) includes three basic areas: security, privacy and trust. Security and privacy technologies are related to mechanisms such as cryptography or authentication protocols that have been extensively explored and adapted to IoT requirements. However, new risks such as cyber-physical attacks and novel distributed, and pervasive architectures reveal new weaknesses where trust and reputation issues are the main challenges to be addressed. Nevertheless, both, trust and reputation, are intrinsically subjective and distributed, and algorithms guaranteeing a dynamic and efficient management of these properties tend to be computationally heavy and complex. In this context, new trust and reputation services for pervasive IoT deployments are needed. Therefore, in this paper we propose a new distributed architecture for the provision of trust and reputation services in IoT systems. The architecture is based on Blockchain technologies and the composition of different conceptual models (cognitive, computational, neurological, and game-theoretical) using stochastic functions. The resulting probability may be employed by nodes to create their own trustworthy subsystem. In order to validate the performance and usability of the proposal, an experimental validation based on simulation technologies is provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abhishta, A., van Heeswijk, W., Junger, M., Nieuwenhuis, L.J.M., Joosten, R.: Why would we get attacked? An analysis of attacker’s aims behind DDoS attacks. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(2), 3–22 (2020)

    Google Scholar 

  2. Alcarria, R., Bordel, B., Robles, T., Martín, D., Manso-Callejo, M.Á.: A blockchain-based authorization system for trustworthy resource monitoring and trading in smart communities. Sensors 18(10), 3561 (2018)

    Article  Google Scholar 

  3. Alizadeh, M., Andersson, K., Schelen, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020)

    Google Scholar 

  4. Anada, H.: Decentralized multi-authority anonymous authentication for global identities with non-interactive proofs. J. Internet Serv. Inf. Secur. (JISIS) 10(4), 23–37 (2020)

    Google Scholar 

  5. Bordel, B., Alcarria, R.: Assessment of human motivation through analysis of physiological and emotional signals in industry 4.0 scenarios. J. Ambient Intell. Hum. Comput. 1–21 (2017)

    Google Scholar 

  6. Bordel, B., Alcarria, R., De Andres, D.M., You, I.: Securing internet-of-things systems through implicit and explicit reputation models. IEEE Access 6, 47472–47488 (2018)

    Article  Google Scholar 

  7. Bordel, B., Alcarria, R., de Rivera, D.S., Robles, T.: Process execution in cyber-physical systems using cloud and cyber-physical internet services. J. Supercomput. 74(8), 4127–4169 (2018)

    Article  Google Scholar 

  8. Bordel, B., Alcarria, R., Martín, D., Sánchez-de Rivera, D.: An agent-based method for trust graph calculation in resource constrained environments. Integr. Comput.-Aided Eng. 27(1), 37–56 (2020)

    Article  Google Scholar 

  9. Bordel, B., Alcarria, R., Martín, D., Sánchez-Picot, Á.: Trust provision in the internet of things using transversal blockchain networks. Intell. Autom. Soft Comput. 25(1), 155–170 (2019)

    Google Scholar 

  10. Bordel, B., Alcarria, R., Robles, T.: Denial of chain: evaluation and prediction of a novel cyberattack in blockchain-supported systems. Futur. Gener. Comput. Syst. 116, 426–439 (2021)

    Article  Google Scholar 

  11. Bordel, B., Alcarria, R., Robles, T., González, D.: An industry 4.0 solution for the detection of dangerous situations in civil work scenarios. In: Rocha, Á., Ferrás, C., Paredes, M. (eds.) ICITS 2019. AISC, vol. 918, pp. 494–504. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11890-7_48

    Chapter  Google Scholar 

  12. Bordel, B., Alcarria, R., Robles, T., Iglesias, M.S.: Data authentication and anonymization in IoT scenarios and future 5G networks using chaotic digital watermarking. IEEE Access 9, 22378–22398 (2021)

    Article  Google Scholar 

  13. Bordel, B., Alcarria, R., Robles, T., Sanchez-Picot, A.: Stochastic and information theory techniques to reduce large datasets and detect cyberattacks in ambient intelligence environments. IEEE Access 6, 34896–34910 (2018)

    Article  Google Scholar 

  14. Bordel, B., Alcarria, R., Sánchez-de-Rivera, D.: Detecting malicious components in large-scale internet-of-things systems and architectures. In: Rocha, Á., Correia, A.M., Adeli, H., Reis, L.P., Costanzo, S. (eds.) WorldCIST 2017. AISC, vol. 569, pp. 155–165. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56535-4_16

    Chapter  Google Scholar 

  15. Bordel, B., Alcarria, R., Sánchez de Rivera, D., Martín, D., Robles, T.: Fast self-configuration in service-oriented smart environments for real-time applications. J. Ambient Intell. Smart Environ. 10(2), 143–167 (2018)

    Article  Google Scholar 

  16. Bordel, B., Alcarria, R., Sánchez-de-Rivera, D., Robles, T.: Protecting industry 4.0 systems against the malicious effects of cyber-physical attacks. In: Ochoa, S.F., Singh, P., Bravo, J. (eds.) UCAmI 2017. LNCS, vol. 10586, pp. 161–171. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67585-5_17

    Chapter  Google Scholar 

  17. Haroon, A., Akram, S., Shah, M.A., Wahid, A.: E-lithe: a lightweight secure DTLS for IoT. In: IEEE Vehicular Technology Conference, vol. 2017-September, pp. 1–5, February 2018

    Google Scholar 

  18. Huang, Z., Su, X., Zhang, Y., Shi, C., Zhang, H., Xie, L.: A decentralized solution for IoT data trusted exchange based-on blockchain. In: 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017, vol. 2018-January, pp. 1180–1184, March 2018

    Google Scholar 

  19. Ju, C., Wang, J., Xu, C.: A novel application recommendation method combining social relationship and trust relationship for future internet of things. Multimed. Tools Appl. 78(21), 29867–29880 (2018)

    Article  Google Scholar 

  20. Kasturi, G., Jain, A., Singh, J.: Detection and classification of radio frequency jamming attacks using machine learning. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 49–62 (2020)

    Google Scholar 

  21. Kim, E., Keum, C.: Trustworthy gateway system providing IoT trust domain of smart home. In: International Conference on Ubiquitous and Future Networks, ICUFN, pp. 551–553, July 2017

    Google Scholar 

  22. König, L., Unger, S., Kieseberg, P., Tjoa, S.: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 110–127 (2020)

    Google Scholar 

  23. Liu, N., Yu, M., Zang, W., Sandhu, R.: Cost and effectiveness of TrustZone defense and side-channel attack on arm platform. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 1–15 (2020)

    Google Scholar 

  24. Murayama, Y., Hauser, C., Hikage, N., Chakraborty, B.: The sense of security and trust. In: Handbook of Research on Social and Organizational Liabilities in Information Security, pp. 493–502 (2008)

    Google Scholar 

  25. U. S. Premarathne: MAG-SIoT: a multiplicative attributes graph model based trust computation method for social Internet of Things. In: 2017 IEEE International Conference on Industrial and Information Systems, ICIIS 2017 - Proceedings, vol. 2018-January, pp. 1–6, February 2018

    Google Scholar 

  26. Raza, S., Shafagh, H., Hewage, K., Hummen, R., Voigt, T.: Lithe: lightweight secure CoAP for the internet of things. IEEE Sens. J. 13(10), 3711–3720 (2013)

    Article  Google Scholar 

  27. Robles, T., Bordel, B., Alcarria, R., Martín, D.: Mobile wireless sensor networks: modeling and analysis of three-dimensional scenarios and neighbor discovery in mobile data collection. Ad-Hoc Sens. Wirel. Netw. 35(1–2), 67–104 (2017)

    Google Scholar 

  28. Robles, T., Bordel, B., Alcarria, R., Sánchez-de Rivera, D.: Enabling trustworthy personal data protection in eHealth and well-being services through privacy-by-design. 16(5) (2020). https://doi.org/10.1177/1550147720912110

  29. Sánchez, B.B., Sánchez-Picot, Á., De Rivera, D.S.: Using 5G technologies in the internet of things handovers, problems and challenges. In: Proceedings - 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015, pp. 364–369, September 2015

    Google Scholar 

  30. Son, J., Choi, W., Choi, S.-M.: Trust information network in social internet of things using trust-aware recommender systems. 16(4) (2020). https://doi.org/10.1177/1550147720908773

  31. Talreja, R., Sathish, S., Nenwani, K., Saxena, K.: Trust and behavior based system to prevent collision in IoT enabled VANET. In: International Conference on Signal Processing, Communication, Power and Embedded System, SCOPES 2016 - Proceedings, pp. 1588–1591, June 2017

    Google Scholar 

  32. Ud Din, I., Guizani, M., Kim, B.S., Hassan, S., Khan, M.K.: Trust management techniques for the internet of things: a survey. IEEE Access 7, 29763–29787 (2019)

    Article  Google Scholar 

  33. Wortmann, F., Flüchter, K.: Internet of things. Bus. Inf. Syst. Eng. 57(3), 221–224 (2015)

    Article  Google Scholar 

Download references

Acknowledgments

The research leading to these results has received funding from the Ministry of Science, Innovation and Universities through the COGNOS project (PID2019-105484RB-I00).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramón Alcarria .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bordel, B., Alcarria, R. (2022). Distributed Trust and Reputation Services in Pervasive Internet-of-Things Deployments. In: You, I., Kim, H., Youn, TY., Palmieri, F., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2021. Communications in Computer and Information Science, vol 1544. Springer, Singapore. https://doi.org/10.1007/978-981-16-9576-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-9576-6_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-9575-9

  • Online ISBN: 978-981-16-9576-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics