| Literature DB >> 35663279 |
G Nagarajan1, Serin V Simpson2, K Venkatachalam3, Adel Fahad Alrasheedi4, S S Askar4, Mohamed Abouhawwash5,6, Parthasarathi P7.
Abstract
The proposed Edge-based Trust Management System (E-TMS) uses an Eigenvector-based approach for eliminating the security threats present in the Internet of Things (IoT) enabled smart city environment. In most existing trust management systems, the trust aggregation process completely depends on the direct trust ratings obtained from both legitimate and malicious neighboring IoT devices. E-TMS possesses an edge-assisted two-level trust computation approach for ensuring the malicious free trust evaluation of IoT devices. The E-TMS aims at removing the false contribution on aggregated trust data. It utilizes the properties of the Eigenvector for identifying compromised IoT devices. The Eigenvector Analysis also helps to avoid false detection. The analysis involves a comparison of all the contributed trust data about every single connected device. A spectral matrix will be generated corresponding to the contributions and the received trust will be scaled based on the obtained spectral values. The absolute sum of obtained values will contain only true contributions. The accurate identification of false data will remove the effect of malicious contributions from the final trust value of a connected IoT device. Since the final trust value calculated by the edge node contains only the trustworthy data, the prediction about the malicious nodes will be accurate. Eventually, the performance of E-TMS has been validated. Throughput and network resilience are higher than the existing system.Entities:
Mesh:
Year: 2022 PMID: 35663279 PMCID: PMC9162873 DOI: 10.1155/2022/5625897
Source DB: PubMed Journal: J Healthc Eng ISSN: 2040-2295 Impact factor: 3.822
Figure 1System architecture.
Event-based score allotment: direct trust.
| Events | Score |
|---|---|
| Correct forwarding of the offered packet | +1 |
| Dropping an offered packet | −1 |
| Reception of updated DCL packet from “ | +1 |
| Reception of old DCL broadcast form “ | −1 |
| Timely reply for a hello packet | +1 |
| Route request for a node listed in DCL | −1 |
Event-based score allotment: indirect trust.
| Events | Score |
|---|---|
| Leaving a cluster without notifying the edge node | −1 |
| Leaving the cluster in a proper way | +1 |
| Violation of node joining procedure | −1 |
| Approved node joining | +1 |
| Residual energy | −1 or +1 |
| Based on acknowledgment | −1 or +1 |
Simulation parameters.
| Parameters | Scenario 1 | Scenario 2 | |
|---|---|---|---|
| Physical layer | S. propagation | Two-ray ground | |
| Antenna model | Omniantenna | ||
|
| |||
| Mac layer | Mac protocol | 802.11 | |
| Link bandwidth | 1 MB | ||
|
| |||
| Simulation | Size of network field | 1000 m × 1000 m | 1000 m × 1000 m |
| Rate (Mbs) | 0.1 | 0.1 | |
| Packet size (B) | 1000 | 1000 | |
| Traffic type | CBR | CBR | |
| Duration (s) | 600 | 600 | |
| Speed (m/s) | 25 | 25 | |
| Number of nodes | 25/50/75/100/125 | 100 | |
| Load | 500 Kb | 1000–6000 Kb | |
|
| |||
| Queue | Type | DropTail/PriQueue | |
| Size | 50 | ||
|
| |||
| NS2 version | 2.35 | ||
| Processor | Intel processor 3 GH | ||
| Operating system | Ubuntu 16.04 LTS | ||
Figure 2Average throughput (scenario 1).
Figure 3Average throughput (scenario 2).
Figure 4Network resilience (scenario 1).
Figure 5Network resilience (scenario 2).
Figure 6Packet delivery ratio (scenario 1).
Figure 7Packet delivery ratio (scenario 2).
Analysis of proposed work.
| Work name | Significance | Methodology for identifying the malicious trustdata contributions | Methodology | Significance/limitations |
|---|---|---|---|---|
| E-TMS | (i) Eigenvector-based approach for eliminating the malicious contributions | Present | (i) Malicious free aggregated trust value evaluation | (i) Two-level trustevaluation approach |
| SAODV [ | (i) Resistant toward routing attacks | Nil | (i) Enhancement of path determination | (i) Introduced only to secure AODV |
| SLICER-TMU [ | (i) Prevention of identity-based attacks | Nil | (i) Secure authentication mechanism | (i) Vulnerable to malicious trust contributions |
| SAL-SAODV [ | (i) Power-aware approach | Nil | (i) Architectural enhancement | (i) Fog-based approach |
| DBNIDS [ | (i) Malicious attack detection | Nil | (i) Deep belief neural network-based approach | (i) Method accepts trust data contributions from both malicious as well as legitimate nodes |