| Literature DB >> 31022920 |
Farag Azzedin1, Mustafa Ghaleb2.
Abstract
The advent of Internet-of-Things (IoT) is creating an ecosystem of smart applications and services enabled by a multitude of sensors. The real value of these IoT smart applications comes from analyzing the information provided by these sensors. Information fusion improves information completeness/quality and, hence, enhances estimation about the state of things. Lack of trust and therefore, malicious activities renders the information fusion process and hence, IoT smart applications unreliable. Behavior-related issues associated with the data sources, such as trustworthiness, honesty, and accuracy, must be addressed before fully utilizing these smart applications. In this article, we argue that behavior trust modeling is indispensable to the success of information fusion and, hence, to smart applications. Unfortunately, the area is still in its infancy and needs further research to enhance information fusion. The aim of this article is to raise the awareness and the need of behavior trust modelling and its effect on information fusion. Moreover, this survey describes IoT architectures for modelling trust as well as classification of current IoT trust models. Finally, we discuss future directions towards trustworthy reliable fusion techniques.Entities:
Keywords: Internet-of-Things; information fusion; reputation; trust; wireless sensor networks
Year: 2019 PMID: 31022920 PMCID: PMC6515103 DOI: 10.3390/s19081929
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1A General architecture of Internet-of-Things.
Trust-related attack types with their descriptions.
| Attack Type | Description |
|---|---|
| Self-promotion attack (SPA) | A dishonest node provides good recommendations for itself to promote its importance in order to be selected as a service provider. Then, it exploits its reputation to provide malicious service. An example of this attack occurs when a dishonest node positively fabricates fake feedback about itself or adjusts its own reputation during data dissemination. |
| Bad-mouthing attack (BMA) | A dishonest node can ruin the trust level of well-behaved nodes by giving bad recommendations about them. Consequently, their reputation is negatively affected and the chance of these well-behaved nodes to be selected for service is reduced. |
| Ballot-stuffing attack (BSA) | A dishonest node can boost the trust levels of other untrustworthy or dishonest nodes by giving good recommendations. As such, boosting their reputation. |
| Opportunistic service attack (OSA) | An untrustworthy node with a bad reputation may provide good service at a certain time to improve its reputation. |
| Collusion attack (CA) | This attack occurs when one or more nodes conspire together to defraud the trust level of one or more nodes. |
| On-off attack (OOA) | An untrustworthy node can randomly perform trustworthy service to hide its untrustworthy behavior. |
| Whitewashing attack (WWA) | An untrustworthy node can disappear and rejoin the application to wash away its bad reputation. |
| Discriminatory attack (DA) | An untrustworthy node can discriminate against specific nodes. |
Classification of trust-based information fusion approaches.
| Ref. | Trust Integration | Target Node | Discounting of Reports | Fusion Operator/Method | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Selection | Fusion Process | Source | Aggregator | Cumulative | Averaging | Consensus | Others | |||
| [ | √ | √ | √ | |||||||
| [ | √ | √ | √ | |||||||
| [ | √ | √ | √ | √ | ||||||
| [ | √ | √ | √ | |||||||
| [ | √ | √ | √ | √ | ||||||
| [ | √ | √ | √ | |||||||
| [ | √ | √ | √ | |||||||
| [ | √ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | ||||||
| [ | √ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | ||||||
Summary of existing IoT architectures for modelling trust.
| Architecture Type | ||||
|---|---|---|---|---|
| Centralized | Distributed | Hybrid | ||
| Things | [ | [ | ||
| IoT Layer | Fog | [ | [ | [ |
| Cloud | [ | |||
| Not Specified | [ | |||
Figure 2Taxonomy of Internet-of-Things Trust Models.
Classification of IoT trust models based on trust design dimensions.
| Ref. | Trust Components | Trust Attributes (Involvement) | Trust Discovery | Trust Advertisement | Trust Attributes (Quantity) | |||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Direct | Rep. | Node (QoS) | Node (Social) | Network (QoS) | Dis. | Cen. | Time | On-Demand | Event | Single | Multiple | |
| [ | √ | √ | √ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | √ | √ | √ | √ | ||||
| [ | √ | √ | √ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | √ | √ | √ | √ | ||||
| [ | √ | √ | √ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | √ | √ | ||||||
| [ | √ | √ | √ | √ | √ | |||||||
| [ | √ | √ | √ | √ | √ | |||||||
| [ | √ | √ | √ | √ | √ | √ | √ | √ | ||||
| [ | √ | √ | √ | √ | √ | |||||||
| [ | √ | √ | √ | √ | √ | √ | ||||||
| [ | √ | √ | √ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | √ | |||||||
| [ | √ | √ | √ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | √ | √ | ||||||
| [ | √ | √ | √ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | √ | √ | ||||||
| [ | √ | √ | √ | √ | √ | |||||||
| [ | √ | √ | √ | √ | √ | |||||||
Ref. = Reference, Rep. = Reputation, Dis.= Distributed, Cen. = Centralized.
Classification of existing IoT trust models based on resistance to attack types.
| Ref. | Trust-Related Attack | ||||||
|---|---|---|---|---|---|---|---|
| SPA | BMA | BST | OSA | OOA | WWA | DA | |
| [ | √ | √ | √ | ||||
| [ | √ | √ | √ | √ | √ | ||
| [ | √ | √ | √ | √ | |||
| [ | √ | √ | √ | √ | |||
| [ | √ | ||||||
| [ | √ | ||||||
| [ | √ | √ | √ | √ | |||
| [ | √ | √ | √ | ||||
| [ | √ | ||||||
| [ | √ | ||||||
| [ | √ | √ | √ | √ | |||
| [ | √ | √ | √ | ||||
| [ | √ | ||||||
| [ | √ | √ | √ | ||||
| [ | √ | √ | √ | √ | √ | ||
| [ | √ | √ | √ | √ | |||
Performance simulation tools and metrics used in the existing IoT trust models.
| Ref. | Simulation Tool | Simulation Metrics | |||||||
|---|---|---|---|---|---|---|---|---|---|
| NS2 | NS3 | Cooja | Matlab | Others | Accuracy | Convergence | Resiliency | Others | |
| [ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | √ | ||||
| [ | √ | √ | √ | √ | |||||
| [ | √ | √ | |||||||
| [ | √ | √ | √ | ||||||
| [ | √ | √ | |||||||
| [ | √ | √ | |||||||
| [ | √ | √ | |||||||
| [ | √ | √ | |||||||
| [ | √ | √ | |||||||
| [ | √ | √ | |||||||
| [ | √ | √ | √ | √ | |||||
| [ | √ | √ | √ | √ | |||||
| [ | √ | √ | |||||||
| [ | √ | √ | √ | ||||||
| [ | √ | √ | √ | ||||||
| [ | √ | √ | |||||||
| [ | √ | √ | |||||||
Classification of existing trust models based on aggregation methods.
| Aggregation Method | |||||
|---|---|---|---|---|---|
| Bayesian | Fuzzy | Static | Dynamic | Utility | |
| Systems | Logic | Weighted Sum | Weighted Sum | Theory | |
|
| [ | [ | [ | [ | [ |