Abstract
The growth and adoption of the Internet of Things (IoT) is increasing day by day. The large number of IoT devices increases the risk of security threats such as (but not limited to) viruses or cyber-attacks. One possible approach to achieve IoT security is to enable a trustworthy IoT environment in IoT wherein the interactions are based on the trust value of the communicating nodes. Trust management and trust assessment has been extensively studied in distributed networks in general and the IoT in particular, but there are still outstanding pressing issues such as bad-mouthing of trust values which prevent them from being used in practical IoT applications. Furthermore, there is no research in ensuring that the developed IoT trust solutions are scalable across billions of IoT nodes. To address the above-mentioned issues, we propose a methodology for scalable trust management solution in the IoT. The methodology addresses practical and pressing issues related to IoT trust management such as trust-based IoT clustering, intelligent methods for countering bad-mouthing attacks on trust systems, issues of memory-efficient trust computation and trust-based migration of IoT nodes from one cluster to another. Experimental results demonstrate the effectiveness of the proposed approaches.









Similar content being viewed by others
References
Alshehri MD, Hussain FK (2015) A comparative analysis of scalable and context-aware trust management approaches for internet of things. In: International conference on neural information processing. Springer, Berlin, pp 596–605
Bao F, Chen R, Guo J (2013) Scalable, adaptive and survivable trust management for community of interest based internet of things systems. In: 2013 IEEE 11th international symposium on autonomous decentralized systems (ISADS). IEEE, pp 1–7
Bellavista P, Zanni A (2016) Towards better scalability for IoT-cloud interactions via combined exploitation of MQTT and CoAP. In: 2016 IEEE 2nd international forum on research and technologies for society and industry leveraging a better tomorrow (RTSI). IEEE, pp 1–6
Gharbieh M, ElSawy H, Bader A, Alouini M-S (2017) Spatiotemporal stochastic modeling of IoT enabled cellular networks: Scalability and stability analysis. IEEE Transactions on Communications
Chen R, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9(3):482–495
Han S, NDN-Based Woo H (2016) Pub/sub system for scalable IoT cloud. In: Cloud computing technology and science (CloudCom). IEEE
Jabeur N, Yasar AU-H, Shakshuki E, Haddad H (2017) Toward a bio-inspired adaptive spatial clustering approach for IoT applications. Future Generation Computer Systems
Jiang H, Shen F, Chen S, Li K-C, Jeong Y-S (2015) A secure and scalable storage system for aggregate data in IoT. Futur Gener Comput Syst 49:133–141
Khan ZA, Herrmann PA (2017) Trust based distributed intrusion detection mechanism for internet of things. In: 2017 IEEE 31st international conference on advanced information networking and applications (AINA). IEEE, pp 1169–1176
Kokoris-Kogias E, Voutyras O, Varvarigou T (2016) TRM-SIoT: A scalable hybrid trust & reputation model for the social internet of things. In: 2016 IEEE 21st international conference on emerging technologies and factory automation (ETFA). IEEE, pp 1–9
Li F, Vögler M, Claeßens M, Dustdar S (2013) Efficient and scalable IoT service delivery on cloud. In: 2013 IEEE 6th international conference on cloud computing (CLOUD). IEEE, pp 740– 747
Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134
Ahmed A, Bakar KA, Channa MI, Khan AW (2016) A secure routing protocol with trust and energy awareness for wireless sensor network. Mobile Netw Appl 21(2):272–285
Ma T, Liu Y, Zhang Z-J (2015) An energy-efficient reliable trust-based data aggregation protocol for wireless sensor networks. Int J Control Autom 8(3):305–318
Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164
Varghese R, Chithralekha T, Kharkongor C (2016) Self-organized cluster based energy efficient meta trust model for internet of things. In: 2016 IEEE international conference on engineering and technology (ICETECH). IEEE, pp 382–389
Tayeb S, Latifi S, Kim Y (2017) A survey on IoT communication and computation frameworks: An industrial perspective. In: 2017 IEEE 7th annual computing and communication workshop and conference (CCWC). IEEE, pp 1–6
Williams R, McMahon E, Samtani S, Patton M, Chen H (2017) Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach. In: 2017 IEEE international conference on intelligence and security informatics (ISI). IEEE, pp 179–181
Vögler M, Schleicher JM, Inzinger C, Dustdar S (2016) A scalable framework for provisioning large-scale IoT deployments. ACM Trans Internet Technol 16(2):11
Wolf T, Nagurney A (2016) A layered protocol architecture for scalable innovation and identification of network economic synergies in the internet of things. In: 2016 IEEE 1st international conference on internet-of-things design and implementation (IoTDI). IEEE, pp 141–151
Yu Y, Jia Z, Tao W, Xue B, Lee C (2017) An efficient trust evaluation scheme for node behavior detection in the internet of things. Wirel Pers Commun 93(2):571–587
Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ (2017) IoT middleware: A survey on issues and enabling technologies. IEEE Internet Things J 4(1):1–20
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Alshehri, M.D., Hussain, F.K. & Hussain, O.K. Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT). Mobile Netw Appl 23, 419–431 (2018). https://doi.org/10.1007/s11036-018-1017-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-018-1017-z