15 research outputs found

    Intelligent trust management methodology for the internet of things (IoT) to enhance cyber security

    Full text link
    University of Technology Sydney. Faculty of Engineering and Information Technology.Nowadays, the Internet of Things (IoT) connects billions of devices (things) using the Internet. The devices could be sensors, actuators etc. The number of IoT devices growing and interacting with each other raises the issues of security and trust. Most of the existing trust and security solutions do not present a comprehensive trust management solution for IoT addressing key trust management issues for the IoT. Many of the current solutions do not consider the scalability of the IoT trust management solution. With the rapid growth of IoT nodes a significant majority of the existing techniques do not address methods (or algorithms) to detect uncompliant behaviour or attacks on the trust management approach by the IoT nodes. The uncompliant behaviour may take the form or bad-mouthing attacks, on-off attacks, contradictory attacks and bad service attacks. In the existing literature there is no trust management approach that is scalable and resilient against attacks by uncompliant IoT nodes. To address the above mentioned gaps in the existing literature body, in this thesis I propose an intelligent trust management platform for IoT (TM-IoT). The TM-IoT solution is centred on trust-based clustering of the IoT nodes. IoT nodes are grouped into clusters and each cluster is managed by a Master Node (MN). MN is a responsible for all the trust management activities within each cluster. The Super Node (SN) oversees and manages the MNs. Intelligent fuzzy-logic based and non-fuzzy logic based algorithms are presented to counter untrustworthy IoT nodes from carrying out attacks such as bad-mouthing attacks, on-off attacks, contradictory attacks and bad service attacks. To validate the proposed solutions in this thesis, simulations were conducted using Contiki network simulator for IoT environment (Cooja), which able to simulate large networks. Using the built prototype, I have evaluated and simulated our proposed solutions for the above-mentioned problems by using Cooja and C++ programming language. The obtained results demonstrate the effectiveness of the TM-IoT and also that of the algorithms in achieving their respective goals

    IoT trust and reputation: a survey and taxonomy

    Full text link
    IoT is one of the fastest-growing technologies and it is estimated that more than a billion devices would be utilized across the globe by the end of 2030. To maximize the capability of these connected entities, trust and reputation among IoT entities is essential. Several trust management models have been proposed in the IoT environment; however, these schemes have not fully addressed the IoT devices features, such as devices role, device type and its dynamic behavior in a smart environment. As a result, traditional trust and reputation models are insufficient to tackle these characteristics and uncertainty risks while connecting nodes to the network. Whilst continuous study has been carried out and various articles suggest promising solutions in constrained environments, research on trust and reputation is still at its infancy. In this paper, we carry out a comprehensive literature review on state-of-the-art research on the trust and reputation of IoT devices and systems. Specifically, we first propose a new structure, namely a new taxonomy, to organize the trust and reputation models based on the ways trust is managed. The proposed taxonomy comprises of traditional trust management-based systems and artificial intelligence-based systems, and combine both the classes which encourage the existing schemes to adapt these emerging concepts. This collaboration between the conventional mathematical and the advanced ML models result in design schemes that are more robust and efficient. Then we drill down to compare and analyse the methods and applications of these systems based on community-accepted performance metrics, e.g. scalability, delay, cooperativeness and efficiency. Finally, built upon the findings of the analysis, we identify and discuss open research issues and challenges, and further speculate and point out future research directions.Comment: 20 pages, 5 Figures, 3 tables, Journal of cloud computin

    IoT trust and reputation: a survey and taxonomy

    Get PDF
    IoT is one of the fastest-growing technologies and it is estimated that more than a billion devices would be utilized across the globe by the end of 2030. To maximize the capability of these connected entities, trust and reputation among IoT entities is essential. Several trust management models have been proposed in the IoT environment; however, these schemes have not fully addressed the IoT devices features, such as devices role, device type and its dynamic behavior in a smart environment. As a result, traditional trust and reputation models are insufficient to tackle these characteristics and uncertainty risks while connecting nodes to the network. Whilst continuous study has been carried out and various articles suggest promising solutions in constrained environments, research on trust and reputation is still at its infancy. In this paper, we carry out a comprehensive literature review on state-of-the-art research on the trust and reputation of IoT devices and systems. Specifically, we first propose a new structure, namely a new taxonomy, to organize the trust and reputation models based on the ways trust is managed. The proposed taxonomy comprises of traditional trust management-based systems and artificial intelligence-based systems, and combine both the classes which encourage the existing schemes to adapt these emerging concepts. This collaboration between the conventional mathematical and the advanced ML models result in design schemes that are more robust and efficient. Then we drill down to compare and analyse the methods and applications of these systems based on community-accepted performance metrics, e.g. scalability, delay, cooperativeness and efficiency. Finally, built upon the findings of the analysis, we identify and discuss open research issues and challenges, and further speculate and point out future research directions.Comment: 20 pages, 5 Figures, 3 tables, Journal of cloud computin

    Monitoring System-Based Flying IoT in Public Health and Sports Using Ant-Enabled Energy-Aware Routing.

    Full text link
    In recent decades, the Internet of flying networks has made significant progress. Several aerial vehicles communicate with one another to form flying ad hoc networks. Unmanned aerial vehicles perform a wide range of tasks that make life easier for humans. However, due to the high frequency of mobile flying vehicles, network problems such as packet loss, latency, and perhaps disrupted channel links arise, affecting data delivery. The use of UAV-enabled IoT in sports has changed the dynamics of tracking and working on player safety. WBAN can be merged with aerial vehicles to collect data regarding health and transfer it to a base station. Furthermore, the unbalanced energy usage of flying things will result in earlier mission failure and a rapid decline in network lifespan. This study describes the use of each UAV's residual energy level to ensure a high level of safety using an ant-based routing technique called AntHocNet. In health care, the use of IoT-assisted aerial vehicles would increase operational performance, surveillance, and automation optimization to provide a smart application of flying IoT. Apart from that, aerial vehicles can be used in remote communication for treatment, medical equipment distribution, and telementoring. While comparing routing algorithms, simulation findings indicate that the proposed ant-based routing protocol is optimal

    Analysis of Feedback Evaluation for Trust Management Models in the Internet of Things

    Get PDF
    The Internet of Things (IoT) is transforming the world into an ecosystem of objects that communicate with each other to enrich our lives. The devices’ collaboration allows the creation of complex applications, where each object can provide one or more services needed for global benefit. The information moves to nodes in a peer-to-peer network, in which the concept of trustworthiness is essential. Trust and Reputation Models (TRMs) are developed with the goal of guaranteeing that actions taken by entities in a system reflect their trustworthiness values and to prevent these values from being manipulated by malicious entities. The cornerstone of any TRM is the ability to generate a coherent evaluation of the information received. Indeed, the feedback generated by the consumers of the services has a vital role as the source of any trust model. In this paper, we focus on the generation of the feedback and propose different metrics to evaluate it. Moreover, we illustrate a new collusive attack that influences the evaluation of the received services. Simulations with a real IoT dataset show the importance of feedback generation and the impact of the new proposed attack

    Privacy, security and usability for IoT-enabled weight loss apps

    Full text link
    © 2020 Science and Information Organization. Obesity is considered as the main health issue worldwide. The obesity rate within Saudi's citizens is rising alarmingly. The Internet of Things (IoT)-enabled mobile apps can assist obese Saudi users in losing weight via collecting sensitive personal information and then providing accurate and personalized weight loss advice. These data can be collected using embedded IoT devices in a smartphone. However, these IoT-enabled apps should be usable and able to provide data security and user privacy protection. This paper aims to continue our usability study for two Arabic weight loss IoT-enabled apps by performing a qualitative analysis for them. It discusses users' and health professionals' feedbacks, concerns and suggestions. Based on the analysis, a comprehensive usability guideline for developing a new Arabic weight loss IoT-enabled app for obese Saudi users is provided

    Security requirement management for cloud-assisted and internet of things⇔enabled smart city

    Full text link
    The world is rapidly changing with the advance of information technology. The expansion of the Internet of Things (IoT) is a huge step in the development of the smart city. The IoT consists of connected devices that transfer information. The IoT architecture permits on-demand services to a public pool of resources. Cloud computing plays a vital role in developing IoT-enabled smart applications. The integration of cloud computing enhances the offering of distributed resources in the smart city. Improper management of security requirements of cloud-assisted IoT systems can bring about risks to availability, security, performance, confidentiality, and privacy. The key reason for cloud- and IoT-enabled smart city application failure is improper security practices at the early stages of development. This article proposes a framework to collect security requirements during the initial development phase of cloud-assisted IoT-enabled smart city applications. Its three-layered architecture includes privacy preserved stakeholder analysis (PPSA), security requirement modeling and validation (SRMV), and secure cloud-assistance (SCA). A case study highlights the applicability and effectiveness of the proposed framework. A hybrid survey enables the identification and evaluation of significant challenges

    A Centralized Cluster-Based Hierarchical Approach for Green Communication in a Smart Healthcare System

    Full text link
    The emergence of the Internet of Things (IoT) has revolutionized our digital and virtual worlds of connected devices. IoT is a key enabler for a wide range of applications in today's world. For example, in smart healthcare systems, the sensor-embedded devices monitor various vital signs of the patients. These devices operate on small batteries, and their energy need to be utilized efficiently. The need for green IoT to preserve the energy of these devices has never been more critical than today. The existing smart healthcare approaches adopt a heuristic approach for energy conservation by minimizing the duty-cycling of the underlying devices. However, they face numerous challenges in terms of excessive overhead, idle listening, overhearing, and collision. To circumvent these challenges, we have proposed a cluster-based hierarchical approach for monitoring the patients in an energy-efficient manner, i.e., green communication. The proposed approach organizes the monitoring devices into clusters of equal sizes. Within each cluster, a cluster head is designated to gather data from its member devices and broadcast to a centralized base station. Our proposed approach models the energy consumption of each device in various states, i.e., idle, sleep, awake, and active, and also performs the transitions between these states. We adopted an analytical approach for modeling the role of each device and its energy consumption in various states. Extensive simulations were conducted to validate our analytical approach by comparing it against the existing schemes. The experimental results of our approach enhance the network lifetime with a reduced energy consumption during various states. Moreover, it delivers a better quality of data for decision making on the patient's vital signs

    Bio-inspired computation for big data fusion, storage, processing, learning and visualization: state of the art and future directions

    Get PDF
    This overview gravitates on research achievements that have recently emerged from the confluence between Big Data technologies and bio-inspired computation. A manifold of reasons can be identified for the profitable synergy between these two paradigms, all rooted on the adaptability, intelligence and robustness that biologically inspired principles can provide to technologies aimed to manage, retrieve, fuse and process Big Data efficiently. We delve into this research field by first analyzing in depth the existing literature, with a focus on advances reported in the last few years. This prior literature analysis is complemented by an identification of the new trends and open challenges in Big Data that remain unsolved to date, and that can be effectively addressed by bio-inspired algorithms. As a second contribution, this work elaborates on how bio-inspired algorithms need to be adapted for their use in a Big Data context, in which data fusion becomes crucial as a previous step to allow processing and mining several and potentially heterogeneous data sources. This analysis allows exploring and comparing the scope and efficiency of existing approaches across different problems and domains, with the purpose of identifying new potential applications and research niches. Finally, this survey highlights open issues that remain unsolved to date in this research avenue, alongside a prescription of recommendations for future research.This work has received funding support from the Basque Government (Eusko Jaurlaritza) through the Consolidated Research Group MATHMODE (IT1294-19), EMAITEK and ELK ARTEK programs. D. Camacho also acknowledges support from the Spanish Ministry of Science and Education under PID2020-117263GB-100 grant (FightDIS), the Comunidad Autonoma de Madrid under S2018/TCS-4566 grant (CYNAMON), and the CHIST ERA 2017 BDSI PACMEL Project (PCI2019-103623, Spain)

    Sensor-Cloud Architecture: A Taxonomy of Security Issues in Cloud-Assisted Sensor Networks

    Full text link
    The orchestration of cloud computing with wireless sensor network (WSN), termed as sensor-cloud, has recently gained remarkable attention from both academia and industry. It enhances the processing and storage capabilities of the resources-constrained sensor networks in various applications such as healthcare, habitat monitoring, battlefield surveillance, disaster management, etc. The diverse nature of sensor network applications processing and storage limitations on the sensor networks, which can be overcome through integrating them with the cloud paradigm. Sensor-cloud offers numerous benefits such as flexibility, scalability, collaboration, automation, virtualization with enhanced processing and storage capabilities. However, these networks suffer from limited bandwidth, resource optimization, reliability, load balancing, latency, and security threats. Therefore, it is essential to secure the sensor-cloud architecture from various security attacks to preserve its integrity. The main components of the sensor-cloud architecture which can be attacked are: (i) the sensor nodes; (ii) the communication medium; and (iii) the remote cloud architecture. Although security issues of these components are extensively studied in the existing literature; however, a detailed analysis of various security attacks on the sensor-cloud architecture is still required. The main objective of this research is to present state-of-the-art literature in the context of security issues of the sensor-cloud architecture along with their preventive measures. Moreover, several taxonomies of the security attacks from the sensor-cloud's architectural perspective and their innovative solutions are also provided
    corecore