Trust-Based Service Management for Social Internet of Things Systems

被引:250
作者
Chen, Ing-Ray [1 ]
Bao, Fenye [1 ]
Guo, Jia [1 ]
机构
[1] Virginia Tech, Dept Comp Sci, Falls Church, VA 22043 USA
关键词
Trust management; Internet of things; social networking; performance analysis; adaptive control; security; REPUTATION; MODEL;
D O I
10.1109/TDSC.2015.2420552
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A social internet of things (IoT) system can be viewed as a mix of traditional peer-to-peer networks and social networks, where "things" autonomously establish social relationships according to the owners' social networks, and seek trusted "things" that can provide services needed when they come into contact with each other opportunistically. We propose and analyze the design notion of adaptive trust management for social IoT systems in which social relationships evolve dynamically among the owners of IoT devices. We reveal the design tradeoff between trust convergence versus trust fluctuation in our adaptive trust management protocol design. With our adaptive trust management protocol, a social IoT application can adaptively choose the best trust parameter settings in response to changing IoT social conditions such that not only trust assessment is accurate but also the application performance is maximized. We propose a table-lookup method to apply the analysis results dynamically and demonstrate the feasibility of our proposed adaptive trust management scheme with two real-world social IoT service composition applications.
引用
收藏
页码:684 / 696
页数:13
相关论文
共 45 条
  • [31] [李倩倩 Li Qianqian], 2010, [高分子通报, Polymer Bulletin], P1
  • [32] Smart Community: An Internet of Things Application
    Li, Xu
    Lu, Rongxing
    Liang, Xiaohui
    Shen, Xuemin
    Chen, Jiming
    Lin, Xiaodong
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (11) : 68 - 75
  • [33] Liu L, 2012, COMM COM INF SC, V312, P559
  • [34] Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
    Mitchell, Robert
    Chen, Ing-Ray
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2013, 62 (01) : 199 - 210
  • [35] Nitti M., 2014, IEEE T KNOWL DATA MA, V26, P1
  • [36] Trust Management In Privacy - Preserving Information System
    Peng, Kun
    Bao, Feng
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, : 1 - 4
  • [37] Pintus A., 2012, P 21 INT C COMP WORL, P401, DOI DOI 10.1145/2187980.2188059
  • [38] QoS-aware and compromise-resilient key management scheme for heterogeneous wireless Internet of Things
    Ren, Wei
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2011, 21 (04) : 284 - 299
  • [39] Securing the Internet of Things
    Roman, Rodrigo
    Najera, Pablo
    Lopez, Javier
    [J]. COMPUTER, 2011, 44 (09) : 51 - 58
  • [40] A Survey of Trust in Social Networks
    Sherchan, Wanita
    Nepal, Surya
    Paris, Cecile
    [J]. ACM COMPUTING SURVEYS, 2013, 45 (04)