Skip to main content
Log in

Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) applications are growing immensely. However, malicious IoT devices are major concerns that threaten the security of IoT applications. This paper proposes an intelligent reputation system for IoT devices using edge computing and cloud computing infrastructures. The proposed system can be used to mitigate the effect of malicious and malfunction IoT devices. Therefore, the proposed system can be used to enhance the effectiveness of IoT based systems such as smart cities, and reduce the risk of malicious IoT devices especially in sensitive systems, such as military applications, that leverage IoT devices. To achieve this goal, the paper proposes a new identification method for uniquely and globally identifying IoT devices wherever they move. Moreover, the paper proposes a new approach for computing the reputation of IoT devices, and calculating correct values based on these reputations. The results show that the proposed approach achieves very good results in detecting malicious IoT devices and computing very close values to the true values.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Venkatraman, B., Aloqaily, M., Reisslein, M.: An SDN architecture for time sensitive industrial IoT. J. Comput. Netw. 186, 107739 (2021)

    Article  Google Scholar 

  2. Ridhawi, I. Al., Aloqaily, M., Boukerche, A., Jararweh Y.: Enabling intelligent IoCV services at the edge for 5G networks and beyond. IEEE Trans. Intell. Transp. Syst. (2021)

  3. Khanna, A., Kaur, S.: Internet of Things (IoT), applications and challenges: a comprehensive review. J. Wirel. Pers. Commun. 114, 1687–1762 (2020)

    Article  Google Scholar 

  4. Hart, J., Martinez, K.: Toward an environmental Internet of Things. J. Earth Space Sci. 2(5), 194–200 (2015)

    Article  Google Scholar 

  5. Jararweh, Y., Otoum, S., Ridhawi, I.Al.: Trustworthy and sustainable smart city services at the edge. J. Sust. Cities Soc. 62, 102394 (2020)

    Article  Google Scholar 

  6. Midtown Congestion Management System. https://www1.nyc.gov/html/dot/html/pr2012/pr12_25.shtml

  7. Andrade, E., Nogueira, B., Farias, I., Araújo, D.: Performance and availability trade-offs in fog-cloud IoT environments. J. Netw. Syst. Manag. 29, 2 (2021)

    Article  Google Scholar 

  8. Hashemi, S., Shams, F.: Fuzzy, dynamic and trust based routing protocol for IoT. J. Netw. Syst. Manag. 28, 1248–1278 (2020)

    Article  Google Scholar 

  9. Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the social Internet of Things. IEEE Trans. Knowl. Data Eng. 26(5), 1253–1266 (2014)

    Article  Google Scholar 

  10. Yan, Z., Ding, W., Niemi, V., Vasilakos, A.V.: Two schemes of privacy preserving trust evaluation. J. Future Gener. Comput. Syst. 62, 175–189 (2016)

    Article  Google Scholar 

  11. Michalas, A., Komninos, N.: The lord of the sense: a privacy preserving reputation system for participatory sensing applications. In: Proceedings of the 2014 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6 (2014)

  12. Hasan, O., Brunie, L., Bertino, E., Shang, N.: A decentralized privacy preserving reputation protocol for the malicious adversarial model. IEEE Trans. Inf. Forensics Secur. 8(6), 949–962 (2013)

    Article  Google Scholar 

  13. Hasan, O., Brunie, L., Bertino, E.: Preserving privacy of feedback providers in decentralized reputation systems. J. Comput. Secur. 31(7), 816–826 (2012)

    Article  Google Scholar 

  14. Asiri S., Miri, A.: An IoT trust and reputation model based on recommender systems. In: Proceedings of the 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, pp. 561–568 (2016)

  15. Mendoza, C.V.L., Kleinschmidt, J.H.: A distributed trust management mechanism for the Internet of Things using a multi-service approach. J. Wirel. Pers. Commun. 103(3), 2501–2513 (2018)

    Article  Google Scholar 

  16. Hussain, Y., Zhiqiu, H., Akbar, M., Alsanad, A., Alsanad, A.A., Nawaz, A., Khan, I., Khan, Z.: Context-aware trust and reputation model for fog-based IoT. J. IEEE Access 8, 31622–31632 (2020)

    Article  Google Scholar 

  17. Chen, J., Tian, Z., Cui, X., Yin, L., Wang, X.: Trust architecture and reputation evaluation for Internet of Things. J. Ambient Intell. Humaniz. Comput. 10(8), 3099–3107 (2019)

    Article  Google Scholar 

  18. Debe, M., Salah, K., Rehman, M.H.U., Svetinovic, D.: IoT public fog nodes reputation system: a decentralized solution using Ethereum blockchain. J. IEEE Access 7, 178082–178093 (2019)

    Article  Google Scholar 

  19. Fortino, G., Messina, F., Rosaci, D., Sarne, G.M.L.: Using blockchain in a reputation-based model for grouping agents in the Internet of Things. IEEE Trans. Eng. Manag. 1231–1243 (2020)

  20. Fortino, G., Messina, F., Rosaci, D., Sarnń, G.L.: Using trust and local reputation for group formation in the Cloud of Things. J. Future Gener. Comput. Syst. 89, 804–815 (2018)

    Article  Google Scholar 

  21. Zhang, P., Kong, Y., Zhou, M.: A domain partition-based trust model for unreliable clouds. J. IEEE Trans. Inf. Forensics Secur. 13(9), 2167–2178 (2018)

    Article  Google Scholar 

  22. Allahdadi, A., Ricardo, M.: Anomaly detection and modeling in 802.11 wireless networks. J. Netw. Syst. Manag. 27(1), 3–38 (2019)

    Article  Google Scholar 

  23. Djedjig, N., Tandjaoui, D., Medjek, F., Romdhani, I.: Trust-aware and cooperative routing protocol for IoT security. J. Inf. Secur. Appl. 52 (2020)

  24. Thulasiraman, P., Wang Y.: A lightweight trust-based security architecture for RPL in mobile IoT networks. In: Proceedings of the 16th IEEE Annual Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA (2019)

  25. Murali, S., Jamalipour, A.: A lightweight intrusion detection for Sybil attack under mobile RPL in the Internet of Things. J. IEEE Internet Things 7(1), 379–388 (2020)

    Article  Google Scholar 

  26. Alliance for Internet of Things Innovation AIOTI. https://aioti.eu/

  27. Cooja Simulator. http://anrg.usc.edu/contiki/index.php/Cooja_Simulator

Download references

Acknowledgements

This work was supported in part by Jordan University of Science and Technology, Research Award #20190150.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qussai Yaseen.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yaseen, Q., Jararweh, Y. Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System. J Netw Syst Manage 29, 45 (2021). https://doi.org/10.1007/s10922-021-09611-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10922-021-09611-x

Keywords

Navigation