TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things
- College of Information Science and Engineering, Northeastern University
110004 Shenyang, China
chend.2008@gmail.com - Computing Center, Northeastern University
110004 Shenyang, China
chang@neu.edu.cn
Abstract
Since a large scale Wireless Sensor Network (WSN) is to be completely integrated into Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is necessary to consider various security challenges that come with IoT/CPS, such as the detection of malicious attacks. Sensors or sensor embedded things may establish direct communication between each other using 6LoWPAN protocol. A trust and reputation model is recognized as an important approach to defend a large distributed sensor networks in IoT/CPS against malicious node attacks, since trust establishment mechanisms can stimulate collaboration among distributed computing and communication entities, facilitate the detection of untrustworthy entities, and assist decision-making process of various protocols. In this paper, based on in-depth understanding of trust establishment process and quantitative comparison among trust establishment methods, we present a trust and reputation model TRM-IoT to enforce the cooperation between things in a network of IoT/CPS based on their behaviors. The accuracy, robustness and lightness of the proposed model is validated through a wide set of simulations.
Key words
Internet of Things, Cyber Physical System, Wireless Sensor Network, Trust, Reputation, Fuzzy Sets
Digital Object Identifier (DOI)
https://doi.org/10.2298/CSIS110303056C
Publication information
Volume 8, Issue 4 (October 2011)
Cyber-Physical Networks and Software
Year of Publication: 2011
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium
Full text
Available in PDF
Portable Document Format
How to cite
Chen, D., Chang, G., Sun, D., Li, J., Jia, J., Wang, X.: TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things. Computer Science and Information Systems, Vol. 8, No. 4, 1207-1228. (2011), https://doi.org/10.2298/CSIS110303056C