15 research outputs found

    Formal Analysis of Trust and Reputation for Service Composition in IoT

    Get PDF
    The exponential growth in the number of smart devices connected to the Internet of Things (IoT) that are associated with various IoT-based smart applications and services, raises interoperability challenges. Service-oriented architecture for IoT (SOA-IoT) solutions has been introduced to deal with these interoperability challenges by integrating web services into sensor networks via IoToptimized gateways to fill the gap between devices, networks, and access terminals. The main aim of service composition is to transform user requirements into a composite service execution. Different methods have been used to perform service composition, which has been classified as trust-based and non-trust-based. The existing studies in this field have reported that trust-based approaches outperform non-trust-based ones. Trust-based service composition approaches use the trust and reputation system as a brain to select appropriate service providers (SPs) for the service composition plan. The trust and reputation system computes each candidate SP’s trust value and selects the SP with the highest trust value for the service composition plan. The trust system computes the trust value from the self-observation of the service requestor (SR) and other service consumers’ (SCs) recommendations. Several experimental solutions have been proposed to deal with trust-based service composition in the IoT; however, a formal method for trust-based service composition in the IoT is lacking. In this study, we used the formal method for representing the components of trustbased service management in the IoT, by using higher-order logic (HOL) and verifying the different behaviors in the trust system and the trust value computation processes. Our findings showed that the presence of malicious nodes performing trust attacks leads to biased trust value computation, which results in inappropriate SP selection during the service composition. The formal analysis has given us a clear insight and complete understanding, which will assist in the development of a robust trust system

    Adaptive power control aware depth routing in underwater sensor networks

    Get PDF
    Underwater acoustic sensor network (UASN) refers to a procedure that promotes a broad spectrum of aquatic applications. UASNs can be practically applied in seismic checking, ocean mine identification, resource exploration, pollution checking, and disaster avoidance. UASN confronts many difficulties and issues, such as low bandwidth, node movements, propagation delay, 3D arrangement, energy limitation, and high-cost production and arrangement costs caused by antagonistic underwater situations. Underwater wireless sensor networks (UWSNs) are considered a major issue being encountered in energy management because of the limited battery power of their nodes. Moreover, the harsh underwater environment requires vendors to design and deploy energy-hungry devices to fulfil the communication requirements and maintain an acceptable quality of service. Moreover, increased transmission power levels result in higher channel interference, thereby increasing packet loss. Considering the facts mentioned above, this research presents a controlled transmission power-based sparsity-aware energy-efficient clustering in UWSNs. The contributions of this technique is threefold. First, it uses the adaptive power control mechanism to utilize the sensor nodes’ battery and reduce channel interference effectively. Second, thresholds are defined to ensure successful communication. Third, clustering can be implemented in dense areas to decrease the repetitive transmission that ultimately affects the energy consumption of nodes and interference significantly. Additionally, mobile sinks are deployed to gather information locally to achieve the previously mentioned benefits. The suggested protocol is meticulously examined through extensive simulations and is validated through comparison with other advanced UWSN strategies. Findings show that the suggested protocol outperforms other procedures in terms of network lifetime and packet delivery ratio

    Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges

    No full text
    Recent years have witnessed tremendous growth in the number of smart devices, wireless technologies, and sensors. In the foreseeable future, it is expected that trillions of devices will be connected to the Internet. Thus, to accommodate such a voluminous number of devices, scalable, flexible, interoperable, energy-efficient, and secure network architectures are required. This article aims to explore IoT architectures. In this context, first, we investigate, highlight, and report premier research advances made in IoT architecture recently. Then we categorize and classify IoT architectures and devise a taxonomy based on important parameters such as applications, enabling technologies, business objectives, architectural requirements, network topologies, and IoT platform architecture types. We identify and outline the key requirements for future IoT architecture. A few prominent case studies on IoT are discovered and presented. Finally, we enumerate and outline future research challenges

    Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things

    No full text
    Nowadays, trust and reputation models are used to build a wide range of trust-based security mechanisms and trust-based service management applications on the Internet of Things (IoT). Considering trust as a single unit can result in missing important and significant factors. We split trust into its building-blocks, then we sort and assign weight to these building-blocks (trust metrics) on the basis of its priorities for the transaction context of a particular goal. To perform these processes, we consider trust as a multi-criteria decision-making problem, where a set of trust worthiness metrics represent the decision criteria. We introduce Entropy-based fuzzy analytic hierarchy process (EFAHP) as a trust model for selecting a trustworthy service provider, since the sense of decision making regarding multi-metrics trust is structural. EFAHP gives 1) fuzziness, which fits the vagueness, uncertainty, and subjectivity of trust attributes; 2) AHP, which is a systematic way for making decisions in complex multi-criteria decision making; and 3) entropy concept, which is utilized to calculate the aggregate weights for each service provider. We present a numerical illustration in trust-based Service Oriented Architecture in the IoT (SOA-IoT) to demonstrate the service provider selection using the EFAHP Model in assessing and aggregating the trust scores

    Intersection-based Distance and Traffic-Aware Routing (IDTAR) protocol for smart vehicular communication

    No full text
    The Vehicular Ad-hoc Networks (VANET) raises as an emerging technology for smart transport as observed in the recent decade. However, there are some hurdles affect the applications of VANET, the advancement of VANET needed to cope up with the requirement of smart transport in smart cities. The routing is the important factor for having effective communication between smart vehicles, which need to be addressed smartly. Many factors affect the communication between the vehicles such as topology fragmentation which results in the phenomenon of Local-Maximum-Problem that lead to packet delivery failure. The traditional routing schemes failed to address the problem of the trade-off between Packet-Delivery-Ratio and the high cost, in term of End-to-End-Delay, of packet recovery from the failures that occurs frequently because of Local-Maximum-Problem. Therefore, this article works out to analyses the performance of existing position-based routing protocols for Inter-vehicle ad-hoc network and introduced Intersection-based Distance and Traffic-Aware Routing (IDTAR) protocol. IDTAR aims to provide optimal performance in environments of smart transport in smart cities. The experiments evaluate IDTAR against famous position-based routing protocols such as GyTAR, A-STAR-SR and GSR considering several densities of vehicles. Simulation result shows that IDTAR protocol has a fewer End-to-End-Delay and high packet delivery ratio in smart cities circumstances. This concludes that IDTAR can be adaptive for smart transport in smart cities communication with some consideration in terms of its security, compatibility and reliability

    Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open Research Challenges

    Get PDF
    Internet of things (IoT) is a contemporary technology, which links a tremendous number of devices with each other to ease the life via many useful services such as information exchange, monitoring, and control. IoT comprises different types of entities such as sensors and RFID tags, which mostly deployed in unattended, sensitive, and hostile territories. Due to rapid scalability and high heterogeneity, traditional security approaches fails to provide adequate security mechanisms for the current IoT infrastructure. The possibility of insecure and unattended deployment make some of IoT's entities subject to be captured physically by the attackers. As a result, the victim device can be exploited as a gateway to compromise the entire network. Furthermore, an entity may not work correctly because of resources constraints or instability of network's link. Recently, trust and reputation (TR) extended in IoT to monitor the behaviors deviation of IoT entities. Many TR models introduced, to incorporate the trust concepts in IoT as a new security paradigm. In this study, we provide thematic taxonomy for trust in IoT, considering several issues such as understanding of trust entity roles, trust properties, trust applications, levels of trust management, trust metrics, trust computation schemes and attacks on TR. Finally, the survey presents advances and open research challenges in the IoT's trust

    Blockchain for IoT Applications: Taxonomy, Platforms, Recent Advances, Challenges and Future Research Directions

    No full text
    The Internet of Things (IoT) has become a popular computing technology paradigm. It is increasingly being utilized to facilitate human life processes through a variety of applications, including smart healthcare, smart grids, smart finance, and smart cities. Scalability, interoperability, security, and privacy, as well as trustworthiness, are all issues that IoT applications face. Blockchain solutions have recently been created to help overcome these difficulties. The purpose of this paper is to provide a survey and tutorial on the use of blockchain in IoT systems. The importance of blockchain technology in terms of features and benefits for constituents of IoT applications is discussed. We propose a blockchain taxonomy for IoT applications based on the most significant factors. In addition, we examine the most widely used blockchain platforms for IoT applications. Furthermore, we discuss how blockchain technology can be used to broaden the spectrum of IoT applications. Besides, we discuss the recent advances and solutions offered for IoT environments. Finally, we discuss the challenges and future research directions of the use of blockchain for the IoT

    CloudProcMon: A Non-Intrusive Cloud Monitoring Framework

    No full text
    Cloud computing has seen massive growth in this decade. With the rapid development of cloud networks, cloud monitoring has become essential for running cloud systems smoothly. Cloud monitoring collects monitoring metrics from the cloud's physical and virtual infrastructures. In terms of data collection, cloud monitoring can be intrusive or non-intrusive. Monitoring data collection non-intrusively from the host operating system (OS) is a challenging task. The aim of this paper was to collect monitoring data from the host OS non-intrusively and to link those data with the cloud controller for use in monitoring. Monitoring data were collected from Procfs of the host OS and that information was linked with the monitoring dashboard on the cloud controller node. The results show that the proposed solution is an efficient, lightweight, and scalable cloud monitoring framework that produces negligible overhead

    Blockchain for IoT Applications: Taxonomy, Platforms, Recent Advances, Challenges and Future Research Directions

    No full text
    The Internet of Things (IoT) has become a popular computing technology paradigm. It is increasingly being utilized to facilitate human life processes through a variety of applications, including smart healthcare, smart grids, smart finance, and smart cities. Scalability, interoperability, security, and privacy, as well as trustworthiness, are all issues that IoT applications face. Blockchain solutions have recently been created to help overcome these difficulties. The purpose of this paper is to provide a survey and tutorial on the use of blockchain in IoT systems. The importance of blockchain technology in terms of features and benefits for constituents of IoT applications is discussed. We propose a blockchain taxonomy for IoT applications based on the most significant factors. In addition, we examine the most widely used blockchain platforms for IoT applications. Furthermore, we discuss how blockchain technology can be used to broaden the spectrum of IoT applications. Besides, we discuss the recent advances and solutions offered for IoT environments. Finally, we discuss the challenges and future research directions of the use of blockchain for the IoT

    Systematic Literature Review on IoT-Based Botnet Attack

    Get PDF
    The adoption of the Internet of Things (IoT) technology is expanding exponentially because of its capability to provide a better service. This technology has been successfully implemented on various devices. The growth of IoT devices is massive at present. However, security is becoming a major challenge with this growth. Attacks, such as IoT-based botnet attacks, are becoming frequent and have become popular amongst attackers.IoT has a resource constraint and heterogeneous environments, such as low computational power and memory. Hence, these constraints create problems in implementing a security solution in IoT devices. Therefore, various kind of attacks are possible due to this vulnerability, with IoT-based botnet attack being one of the most popular.In this study, we conducted a comprehensive systematic literature review on IoT-based botnet attacks. Existing state of the art in the area of study was presented and discussed in detail. A systematic methodology was adopted to ensure the coverage of all important studies. This methodology was detailed and repeatable. The review outlined the existing proposed contributions, datasets utilised, network forensic methods utilised and research focus of the primary selected studies. The demographic characteristics of primary studies were also outlined.The result of this review revealed that research in this domain is gaining momentum, particularly in the last 3 years (2018-2020). Nine key contributions were also identified, with Evaluation, System, and Model being the most conducted
    corecore