Skip to main content
Log in

A dynamic trust model in internet of things

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Indicating trust or distrust of a node is a key issue in the trust management of IoT. However, there are some challenges for the management with anonymous nodes, inaccurate communication, etc. Due to huge number of nodes in IoT, one of the possible solutions is predicting trust and distrust values. In this paper, we propose a dynamic trust model based on direct and indirect trust computation, and the most important part of a model, trust prediction. The prediction method mainly depends on the combination of exponential smoothing and a Markov chain. We employ exponential smoothing to predict trustiness and a Markov chain to fix the deviation of the prediction. To test our scheme, we create a simulation to evaluate its performance and effectiveness. The simulation results are encouraging.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Ben Saied Y, Olivereau A, Zeghlache D et al (2013) Trust management system design for the internet of things: a context-aware and multi-service approach. Comput Secur 39:351–365

    Article  Google Scholar 

  • Beth T, Borcherding M, Klein B (1994) Valuation of trust in open networks. In: Proceedings of the European symposium on research in computer security (ESORICS) 1994, Brighton, UK, LNCS 875, pp 3–18

  • Caverlee J et al (2010) SocialTrust++: building community-based trust in Social Information Systems. In: 2010 6th international conference on collaborative computing: networking, applications and worksharing (CollaborateCom), Chicago, USA

  • Caverlee J, Liu L, Webb S (2008) Socialtrust: tamper-resilient trust establishment in online communities. In: Proceedings of the 8th ACM/IEEE-CS joint conference on digital libraries. ACM, pp 104–114

  • Chen CM, Xiang B et al (2019) A secure authentication protocol for internet of vehicles. IEEE Access

  • Chen D, Chang G, Sun D et al (2011) TRM-IoT: a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(4):1207–1228

    Article  Google Scholar 

  • Chen CM, Wang KH et al (2019) Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J Ambient Intell Hum Comput 10(8):3133–3142

    Article  Google Scholar 

  • Hu JL, Wu QY, Zhou B, Liu JH (2009) Robust feedback credibility-based distributed P2P trust model. J Softw 20(10):2885–2898

    Article  Google Scholar 

  • Jøsang A, Haller J (2007) Dirichlet reputation systems. In: The second international conference on availability, reliability and security, ARES 2007. IEEE, pp 112–119

  • Kalkan K, Zeadally S (2017) Securing internet of things (IoT) with software defined networking (SDN). IEEE Commun Mag 2017:1–7

    Google Scholar 

  • Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web (WWW’03). ACM, New York, USA, pp 640–651

  • Li X, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857

    Article  Google Scholar 

  • Li F, Wu J, Srinivasan A (2009) Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets. In: INFOCOM 2009, IEEE. IEEE

  • Liu Y, Wang K (2010) Trust control in heterogeneous networks for internet of things. In: 2010 International conference on computer application and system modeling (ICCASM 2010)

  • Mahalle PN, Thakre PA, Prasad NR et al. (2013) A fuzzy approach to trust based access control in internet of things. In: Wireless communications, n a context-aware and multi-service trust management system vehicular technology, information theory and aerospace & electronic systems (VITAE). IEEE, pp 1–5

  • Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26:1253–1266

    Article  Google Scholar 

  • Tewari A, Gupta BB (2018) Security, privacy and trust of different layers in internet-of-things (iots) framework. Future Gener Comput Systems 1:1. https://doi.org/10.1016/j.future.2018.04.027

    Article  Google Scholar 

  • Tian CQ, Zou SH, Tian HR, Wang WD, Cheng SD (2007) A new trust model based on reputation and risk evaluation for P2P networks. J Electron Inf Technol 29(7)

  • Tiburski RT et al (2019) Lightweight security architecture based on embedded virtualization and trust mechanisms for IoT edge devices. IEEE Commun Mag 57(2):67–73

    Article  Google Scholar 

  • Venkatraman M, Yu B, Singh MP (2000) Trust and reputation management in a small-world network. In: Proceedings of the fourth international conference on multiagent systems, 2000. IEEE, pp 449–450

  • Wang EK, Li Y, Ye YM, Yiu S-M, Hui LCK (2018) A dynamic trust framework for opportunistic mobile social networks. IEEE Trans Netw Serv Manag 15(1):319–329

    Article  Google Scholar 

  • Weizhi M (2018) intrusion detection in the era of IoT: building trust via traffic filtering and sampling. Computer 51(7):36–43

    Article  Google Scholar 

  • Yahalom R, Klein B, Beth T (1994) Trust-based navigation in distributed systems. Comput Syst 7(1):45–73

    Google Scholar 

  • Yu B, Singh MP (2000) A social mechanism of reputation management in electronic communities. In: Cooperative information agents IV—the future of information agents in cyberspace. Springer, Berlin, Heidelberg, pp 154–165

  • Zhou R, Hwang K (2007) PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18:460–473

    Article  Google Scholar 

  • Zhou L, Kondapalli SH, Aono K, Chakrabartty S (2019) Desynchronization of self-powered FN tunneling timers for trust verification of IoT supply-chain. IEEE Internet Things J 6:6537–6547

    Article  Google Scholar 

Download references

Funding

This study was supported in part by National Natural Science Foundation of China (No. 61572157), and Guangdong Province Natural Science Foundation (No. 2016A030313660 and 2017A030313365), and Shenzhen Municipal Science and Technology Innovation Project (JCYJ20160608161351559, KQJSCX70726103044992, JCYJ20170811155158682). The work is also partially supported by a grant from the Department of Industrial and Systems Engineering, the Hong Kong Polytechnic University, China (H-ZG3K).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chien-Ming Chen.

Ethics declarations

Conflict of interest

All authors of this paper declare that he/she has no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by B. B. Gupta.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, E.K., Chen, CM., Zhao, D. et al. A dynamic trust model in internet of things. Soft Comput 24, 5773–5782 (2020). https://doi.org/10.1007/s00500-019-04319-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-019-04319-2

Keywords

Navigation