Abstract
Recently, Internet of Things (IoT) technology has emerged in many aspects of life, such as transportation, healthcare, and even education. IoT technology incorporates several tasks to achieve the goals for which it was developed through smart services. These services are intelligent activities that allow devices to interact with the physical world to provide suitable services to users anytime and anywhere. However, the remarkable advancement of this technology has increased the number and the mechanisms of attacks. Attackers often take advantage of the IoTs’ heterogeneity to cause trust problems and manipulate the behavior to delude devices’ reliability and the service provided through it. Consequently, trust is one of the security challenges that threatens IoT smart services. Trust management techniques have been widely used to identify untrusted behavior and isolate untrusted objects over the past few years. However, these techniques still have many limitations like ineffectiveness when dealing with a large amount of data and continuously changing behaviors. Therefore, this paper proposes a model for trust management in IoT devices and services based on the simple multi-attribute rating technique (SMART) and long short-term memory (LSTM) algorithm. The SMART is used for calculating the trust value, while LSTM is used for identifying changes in the behavior based on the trust threshold. The effectiveness of the proposed model is evaluated using accuracy, loss rate, precision, recall, and F-measure on different data samples with different sizes. Comparisons with existing deep learning and machine learning models show superior performance with a different number of iterations. With 100 iterations, the proposed model achieved 99.87% and 99.76% of accuracy and F-measure, respectively.
Highlights
The rationale behind the Internet of Things (IoT) paradigm was proposed way back in the 1980s with the idea of ubiquitous computing [1]
In the misbehaving detection sub-stage, the long short-term memory (LSTM) technique is used for classification/prediction tasks, which is known as an excellent technique for identifying changes in behavior
AMs LaPcciusrmacoys,trlyecualsle,dprfeocrisimioang, eanpdroFc-emsseinasgutraeskinsc[r5e4a]s,ea,nlodssArNatNe diseucrseuaaslelys. uCsoendsfeoqruiemnatlgye, tphrioscpesrosipnogs,ecdhamraocdtelrcraencoigdnenittioifny s[5u5s]p, iacniodusfoarcetciavsitinesga[n56d].taIkne tahpisprsotupdriya,tethaectdioantas,isuIochT adsevhiecelps’inagctiivnitireesd, iwrehcitcihngmIeoaTnsftuhnecttyiopneaoliftdyatoa itsrbueshtwavoirotrhayl pzaotnteersnsu.pTohneriedfoernet,iftyhienmg oudne-l tsrhuosuteld benetaitbilees.to deal with behaviors and their changes
Summary
The rationale behind the Internet of Things (IoT) paradigm was proposed way back in the 1980s with the idea of ubiquitous computing [1]. Such so lutionicsnomhqaupvaonneteibnfyetsien,nagnuudsndecedearlttiaoningotwypitftiohmrIoiuzTne’tsrpudsrytonetademcbitecihonanavt,iuosruresp,anpcdhoohrotestdienregocgiteshnieoeniotpy-.mtimaaklintrguspt rmoocedsesl es, iden tify untruAstimededbaeththaevifoorrm, eisroislasutees,utnhitsrupaspteedr porobpjeocstess,aatnrudstrmedaniraegcetmfeunnt mctoiodnelafloitryIotTo truste zonesd[e1v0ic]e. SVaanrdiosuersviacpesptrhoaatcthakeess, lseuvcehragaes f[r1o1m–1m4u],lthi-carviteerbiaeednecidsieovne-mloapkeindgbayndredseeeaprchers a solutions to trust issues These solutions are still unable to fully address tru issues and face numerous challenges, such as a lack of effectiveness when dealing wit large amounts of data and constantly changing behaviors, high energy utilization, diff culty in quantifying uncertainty for untrusted behaviors, choosing the optimal tru Sensors 2022, 22, 634 Sensors 2022, 22, x FOR PEER REVIEW. TThhiiss rreeffeerrss ttoo tthhee ccoommppoonneennttss tthhaatt aarree ccoonnssiiddeerreedd iinn ttrruusstt ccoommppuuttaattiioonn aanndd iitt iinnvvoollvveess ttwwoo mmaajjoorr mmoodduulleess nnaammeellyy:: qquuaalliittyy ooff sseerrvviiccee ((QQooSS)) ttrruusstt aanndd ssoocciiaall ttrruusstt [[88]]. SSoocciiaallrreellaattiioonnsshhiipp ttrruussttiissuusseeddtotoasassessesssthteheIoIToTenetinttyittyo teovaelvuaaltueawtehwethheetrhietrisittriussttrwuostrwthoyrtohrynoort. nBoet-. sBideseisd, esso,csiaolctiraul sttruusttiliuzteisliztreussttrpursot pperrotpieesr,tsieusc,hsuaschhoansehsotyn,ecsetny,trcaelnittyr,ailnittyi,minactiym, pacriy-, vparcivya, cayn,dancdoncnoencntievcittiyv,ittyo, mtoemaseuarseutrreutsrtuvstalvuaelsue[8s][.8]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.