Abstract

Trust and reputation are important terms whether the communication is Humans-to-Human (H2H), Human-Machine-Interaction (HMI) or Machine-to-Machine (M2M). As Cloud computing and the internet of things (IoT) bring new innovations, they also cause various security and privacy issues. As numerous devices are continuously integrating as a core part of IoT, it is necessarily important to consider various security issues such as the trustworthiness of a user or detection of a malicious user. Moreover, fog computing also known as edge computing is revolutionizing the Cloud-based IoT by providing the Cloud services at the edge of the network, which can provide aid in overcoming security, privacy and trust issues. In this work, we propose a context-aware trust evaluation model to evaluate the trustworthiness of a user in a Fog based IoT (FIoT). The proposed approach uses a context-aware multi-source trust and reputation based evaluation system which helps in evaluating the trustworthiness of a user effectively. Further, we use context-aware feedback and feedback crawler system which helps in making trust evaluation unbiased, effective and reliable. Furthermore, we introduce monitor mode for malicious/untrustworthy users, which helps in monitoring the behavior and trustworthiness of a user. The proposed approach uses several tunable factors, which can be tuned based on the system's requirements. The simulations and results indicate that our approach is effective and reliable to evaluate the trustworthiness of a user.

Highlights

  • Trust is an important aspect of communication whether it is Humans-to-Human (H2H), Human-Machine-Interaction (HMI) or Machine-to-Machine (M2M)

  • 1) CONTEXT-AWARE FEEDBACK (GAIN/LOSS) After evaluating the trust of a device/user Fi releases the TLDCidTX to reputed devices/Fog nodes that had collaborated in its trust evaluation

  • Our proposed approach incorporates the context of a connecting device/user for the trust evaluation

Read more

Summary

INTRODUCTION

Trust is an important aspect of communication whether it is Humans-to-Human (H2H), Human-Machine-Interaction (HMI) or Machine-to-Machine (M2M). In FIoT, sensors and other connected devices send data to a nearby Fog node. Y. Hussain et al.: Context-Aware Trust and Reputation Model for Fog-Based IoT the architectural design of FIoT and its future opportunities and challenges. Privacy, and trust [8]–[10], [15], [15], [16] are the most common issues in Cloud-based IoT. FIoT can help in overcoming security, privacy and trust issues [8]–[10], [15], which reside normally in Cloud-based IoT. Many articles [8]–[13] have discussed the need and importance of Fog in Cloud-based IoT. We propose a context-based trust and reputation model for FIoT.

RELATED WORK
ROLE OF CONTEXT IN FIOT
ARCHITECTURE DESIGN
TRUST EVALUATION PROTOCOL
REPUTATION EVALUATION PROTOCOL
SIMULATION AND RESULTS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call