{"title":"Enhanced trust management for building trustworthy social internet of things network","authors":"Swati Sucharita Roy, B. Sahu, Shatarupa Dash","doi":"10.1049/ntw2.12111","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) and wireless communication technologies are evolving rapidly and changing the way we live and work. IoT devices may need to share personal information over the public network taking the help of nearby devices. Thus, the trustworthiness of nearby devices shall play an essential role in providing security and privacy assurance. The authors proposed an autonomous decentralised trust management model for selecting a trustworthy device for a requested service transaction. The proposed scheme uses the Social Internet of Things for trust management. The proposed model uses social relationships to find the level of trust among related devices, estimate the overall trust of the unknown devices, periodically update the observed trust values, and isolate the malicious nodes in the network. The evaluated trust values are updated in the network frequently so that other devices can utilise the information later. The periodic update can increase performance and detect trust‐related malicious attacks. The simulation result shows that the performance of the proposed model is better as compared to existing trust management models. The proposed model can detect malicious objects at an early stage and can handle malicious attacks by isolating malicious devices.","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.3000,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/ntw2.12111","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Internet of Things (IoT) and wireless communication technologies are evolving rapidly and changing the way we live and work. IoT devices may need to share personal information over the public network taking the help of nearby devices. Thus, the trustworthiness of nearby devices shall play an essential role in providing security and privacy assurance. The authors proposed an autonomous decentralised trust management model for selecting a trustworthy device for a requested service transaction. The proposed scheme uses the Social Internet of Things for trust management. The proposed model uses social relationships to find the level of trust among related devices, estimate the overall trust of the unknown devices, periodically update the observed trust values, and isolate the malicious nodes in the network. The evaluated trust values are updated in the network frequently so that other devices can utilise the information later. The periodic update can increase performance and detect trust‐related malicious attacks. The simulation result shows that the performance of the proposed model is better as compared to existing trust management models. The proposed model can detect malicious objects at an early stage and can handle malicious attacks by isolating malicious devices.
IET NetworksCOMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
5.00
自引率
0.00%
发文量
41
审稿时长
33 weeks
期刊介绍:
IET Networks covers the fundamental developments and advancing methodologies to achieve higher performance, optimized and dependable future networks. IET Networks is particularly interested in new ideas and superior solutions to the known and arising technological development bottlenecks at all levels of networking such as topologies, protocols, routing, relaying and resource-allocation for more efficient and more reliable provision of network services. Topics include, but are not limited to: Network Architecture, Design and Planning, Network Protocol, Software, Analysis, Simulation and Experiment, Network Technologies, Applications and Services, Network Security, Operation and Management.