Abstract
A large number of interconnected smart devices or objects interact with the physical environment known as the Internet of Things (IoT). These networks efficiently perform complex tasks with a high level of intelligence without human intervention and require run-time processing and computation. Edge computing is introduced where devices are placed at the edge between the data source and the cloud. These devices can provide more powerful computational and storage capabilities to IoT users. With various benefits, one of the significant requirements is secure and trustworthy data communication. Various trust management schemes are introduced to guarantee the trustworthiness and isolation of the malicious nodes and give preference to the most trustworthy ones. The existing schemes selected trustworthy nodes again and again from the path without considering the load factor which leads them to be more vulnerable for the Denial of Services (DoS) attacks. In this paper, we propose a Link-based Penalized Trust Management scheme to provide trust management and consider load factors for the selection of most trustworthy nodes and provide a preemptive measure to secure the network from DoS attacks based on its link's association. Simulation results indicate the better performance of the proposed scheme as compared with existing schemes.




















Similar content being viewed by others
References
Qureshi, K. N., Naveed, A., Kashif, Y., & Jeon, G. (2021). Internet of Things for education: A smart and secure system for schools monitoring and alerting. Computers & Electrical Engineering, 93, 107275.
Sethi, P., & Sarangi, S. R. (2017). Internet of things: architectures, protocols, and applications. Journal of Electrical and Computer Engineering, 2017, 25.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645–1660.
Sun, X., & Ansari, N. (2016). EdgeIoT: Mobile edge computing for the internet of things. IEEE Communications Magazine, 54(12), 22–29.
Sharma, V., You, I., Andersson, K., Palmieri, F., Rehmani, M. H., & Lim, J. (2020). Security, privacy and trust for smart mobile-Internet of things (M-IoT): A survey. IEEE Access, 8, 167123–167163.
S. Singh, R. Sulthana, T. Shewale, V. Chamola, A. Benslimane, and B. Sikdar, Machine learning assisted security and privacy provisioning for edge computing: A survey, IEEE Internet of Things Journal, 2021.
G. S. S. Chalapathi, V. Chamola, A. Vaish, and R. Buyya, Industrial internet of things (iiot) applications of edge and fog computing: A review and future directions, Fog/Edge Computing For Security, Privacy, and Applications, 293–325, 2021.
Xiao, Y., Jia, Y., Liu, C., Cheng, X., Yu, J., & Lv, W. (2019). Edge computing security: State of the art and challenges. Proceedings of the IEEE, 107(8), 1608–1631.
Qureshi, K. N., Rana, S. S., Ahmed, A., & Jeon, G. (2020). A novel and secure attacks detection framework for smart cities industrial internet of things. Sustainable Cities and Society, 61, 102343.
C. Ioannou and V. Vassiliou, Classifying security attacks in IoT networks using supervised learning, In 2019 15th International conference on distributed computing in sensor systems (DCOSS), 2019, pp. 652–658: IEEE.
K. N. Qureshi, M. A. S. Sandila, I. T. Javed, T. Margaria, and L. Aslam, Authentication scheme for unmanned aerial vehicles based internet of vehicles networks, Egyptian Informatics Journal, 2021/07/29/ 2021.
K. N. Qureshi and A. Iftikhar, 6 Contemplating Security, Security and Organization within IoT and Smart Cities, 93, 2020.
Labraoui, N., Gueroui, M., & Sekhri, L. (2016). A risk-aware reputation-based trust management in wireless sensor networks. Wireless Personal Communications, 87(3), 1037–1055.
Li, W., Song, H., & Zeng, F. (2017). Policy-based secure and trustworthy sensing for internet of things in smart cities. IEEE Internet of Things Journal, 5(2), 716–723.
O. AlFarraj, A. AlZubi, and A. Tolba, "Trust-based neighbor selection using activation function for secure routing in wireless sensor networks, Journal of Ambient Intelligence and Humanized Computing, 1–11, 2018.
D. Zhang, C. Gong, K. Jiang, X. Zhang, and T. Zhang, A kind of new method of intelligent trust engineering metrics (ITEM) for application of mobile ad hoc network, Engineering Computations, 2019.
Yuan, J., & Li, X. (2018). A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. Ieee Access, 6, 23626–23638.
Nie, S. (2019). A novel trust model of dynamic optimization based on entropy method in wireless sensor networks. Cluster Computing, 22(5), 11153–11162.
Anwar, R. W., Zainal, A., Outay, F., Yasar, A., & Iqbal, S. (2019). BTEM: Belief based trust evaluation mechanism for wireless sensor networks. Future Generation Computer Systems, 96, 605–616.
Zawaideh, F., & Salamah, M. (2019). An efficient weighted trust-based malicious node detection scheme for wireless sensor networks. International Journal of Communication Systems, 32(3), e3878.
A. Sharma, E. S. Pilli, and A. P. Mazumdar, "RRAR: Robust recommendation aggregation using retraining in Internet of Things, In 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 2019, pp. 76–80: IEEE.
Li, H.-J., Wang, Q., Liu, S., & Hu, J. (2020). Exploring the trust management mechanism in self-organizing complex network based on game theory. Physica A: Statistical Mechanics and its Applications, 542, 123514.
Wu, X., Huang, J., Ling, J., & Shu, L. (2019). BLTM: Beta and LQI based trust model for wireless sensor networks. IEEE Access, 7, 43679–43690.
Adewuyi, A. A., Cheng, H., Shi, Q., Cao, J., MacDermott, Á., & Wang, X. (2019). CTRUST: A dynamic trust model for collaborative applications in the internet of Things. IEEE Internet of Things Journal, 6(3), 5432–5445.
Wang, E. K., Chen, C.-M., Zhao, D., Ip, W. H., & Yung, K. L. (2020). A dynamic trust model in internet of things. Soft Computing, 24(8), 5773–5782.
Wang, T., Qiu, L., Sangaiah, A. K., Liu, A., Bhuiyan, M. Z. A., & Ma, Y. (2020). Edge-computing-based trustworthy data collection model in the internet of things. IEEE Internet of Things Journal, 7(5), 4218–4227.
P. Wang, G. Wen, X. Yu, W. Yu, Y. J. I. T. o. S. Wan, Man, and C. Systems, Synchronization of resilient complex networks under attacks, 2019.
Qureshi, K. N., Iftikhar, A., Bhatti, S. N., Piccialli, F., Giampaolo, F., & Jeon, G. (2020). Trust management and evaluation for edge intelligence in the Internet of Things. Engineering Applications of Artificial Intelligence, 94, 103756.
Milani, A. S., & Navimipour, N. J. (2016). Load balancing mechanisms and techniques in the cloud environments: Systematic literature review and future trends. Journal of Network and Computer Applications, 71, 86–98.
Zhong, X., Zhang, L., & Wei, Y. (2019). Dynamic load-balancing vertical control for a large-scale software-defined Internet of Things. IEEE Access, 7, 140769–140780.
C. Tsai and M. Moh, Load balancing in 5G cloud radio access networks supporting IoT communications for smart communities, In 2017 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2017, pp. 259–264: IEEE.
Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(3), 1–37.
A. Josang and R. Ismail, The beta reputation system, In Proceedings of the 15th bled electronic commerce conference, 2002, vol. 5, pp. 2502–2511.
Jinhui, X., Yang, T., Feiyue, Y., Leina, P., Juan, X., & Yao, H. (2018). Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Procedia computer science, 131, 1188–1195.
Sood, K., Yu, S., Xiang, Y., & Cheng, H. (2016). A general QoS aware flow-balancing and resource management scheme in distributed software-defined networks. IEEE Access, 4, 7176–7185.
J. Liu, J. Li, G. Shou, Y. Hu, Z. Guo, and W. Dai, SDN based load balancing mechanism for elephant flow in data center networks, In: 2014 International Symposium on Wireless Personal Multimedia Communications (WPMC), 2014, pp. 486-490
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ahmed, A., Qureshi, K.N., Anwar, M. et al. Link-based penalized trust management scheme for preemptive measures to secure the edge-based internet of things networks. Wireless Netw 30, 4237–4259 (2024). https://doi.org/10.1007/s11276-022-02948-4
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-022-02948-4