DOI QR코드

DOI QR Code

Internet of Things (IoT) Framework for Granting Trust among Objects

  • Suryani, Vera (School of Computing, Telkom University) ;
  • Sulistyo, Selo (Dept. of Electrical Engineering and Information Technology, Universitas Gadjah Mada) ;
  • Widyawan, Widyawan (Dept. of Electrical Engineering and Information Technology, Universitas Gadjah Mada)
  • 투고 : 2017.08.18
  • 심사 : 2017.09.24
  • 발행 : 2017.12.31

초록

The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible for both consuming and providing services. Undue access from irresponsible activities becomes an interesting issue to address. Maintenance of data integrity and privacy of objects is important from the perspective of security. Privacy can be achieved through various techniques: password authentication, cryptography, and the use of mathematical models to assess the level of security of other objects. Individual methods like these are less effective in increasing the security aspect. Comprehensive security schemes such as the use of frameworks are considered better, regardless of the framework model used, whether centralized, semi-centralized, or distributed ones. In this paper, we propose a new semi-centralized security framework that aims to improve privacy in IoT using the parameters of trust and reputation. A new algorithm to elect a reputation coordinator, i.e., ConTrust Manager is proposed in this framework. This framework allows each object to determine other objects that are considered trusted before the communication process is implemented. Evaluation of the proposed framework was done through simulation, which shows that the framework can be used as an alternative solution for improving security in the IoT.

키워드

참고문헌

  1. CASAGRAS Partnership, "CASAGRAS final report: RFID and the inclusive model for the internet of things," EU Project No. 216803, 2009.
  2. S. Umamaheswari and G. Radhamani, "Enhanced ANTSEC framework with cluster based cooperative caching in mobile ad hoc networks," Journal of Communications and Networks, vol. 17, no. 1, pp. 40-46, 2015. https://doi.org/10.1109/JCN.2015.000008
  3. E. E. Zakaria, H. S. Hamza, and I. A. Saroit, "An integrated security framework for access control and address auto-configuration for MANETs," in Proceedings of 8th IFIP Wireless and Mobile Networking Conference (WMNC), Munich, Germany, 2015, pp. 253-260.
  4. A. B. Waluyo, D. Taniar, W. Rahayu, and B. Srinivasan, "Trustworthy data delivery in mobile P2P network," Journal of Computer and System Sciences, vol. 86, pp. 33-48, 2017. https://doi.org/10.1016/j.jcss.2016.09.007
  5. B. Zhang, Z. Huang, and Y. Xiang, "A novel multiple-level trust management framework for wireless sensor networks," Computer Networks, vol. 72, pp. 45-61, 2014. https://doi.org/10.1016/j.comnet.2014.06.015
  6. C. Zhu, H. Wang, X. Liu, L. Shu, L. T. Yang, and V. C. M. Leung, "A novel sensory data processing framework to integrate sensor networks with mobile cloud," IEEE Systems Journal, vol. 10, no. 3, pp. 1125-1136, 2016. https://doi.org/10.1109/JSYST.2014.2300535
  7. J. Wu, K. Ota, M. Dong, and C. Li, "A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities," IEEE Access, vol. 4, pp. 416-424, 2016. https://doi.org/10.1109/ACCESS.2016.2517321
  8. A. Sheikhi, M. Rayati, S. Bahrami, A. M. Ranjbar, and S. Sattari, "A cloud computing framework on demand side management game in smart energy hubs," International Journal of Electrical Power & Energy Systems, vol. 64, pp. 1007-1016, 2015. https://doi.org/10.1016/j.ijepes.2014.08.020
  9. U. S. Premarathne, I. Khalil, and M. Atiquzzaman, "Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications," Computer Networks, vol. 88, pp. 161-177, 2015. https://doi.org/10.1016/j.comnet.2015.06.002
  10. D. Conzon, T. Bolognesi, P. Brizzi, A. Lotito, R. Tomasi, and M. A. Spirito, "The VIRTUS middleware: an XMPP based architecture for secure IoT communications," in Proceedings of 21st International Conference on Computer Communications and Networks (ICCCN), Munich, Germany, 2012, pp. 1-6.
  11. R. Neisse, G. Steri, I. N. Fovino, and G. Baldini, "SecKit: a model-based security toolkit for the internet of things," Computers & Security, vol. 54, pp. 60-76, 2015. https://doi.org/10.1016/j.cose.2015.06.002
  12. A. Samani, H. H. Ghenniwa, and A. Wahaishi, "Privacy in internet of things : a model and protection framework," in Procedia Computer Science, vol. 52, pp. 606-613, 2015. https://doi.org/10.1016/j.procs.2015.05.046
  13. V. Suryani, S. Sulistyo, and W. Widyawan, "ConTrust : a trust model to enhance the privacy in internet of things," International Journal of Intelligent Engineering & Systems, vol. 10, no. 3, pp. 30-37, 2017.
  14. K. Kang, Z. B. Pang, and C. Wang, "Security and privacy mechanism for health internet of things," The Journal of China Universities of Posts and Telecommunications, vol. 20(Suppl 2), pp. 64-68, 2013.
  15. X. Xu, N. Bessis, and J. Cao, "An autonomic agent trust model for IoT systems," in Procedia Computer Science, vol. 21, pp. 107-113, 2013. https://doi.org/10.1016/j.procs.2013.09.016
  16. M. Henze, L. Hermerschmidt, D. Kerpen, R. Haubling, B. Rumpe, and K. Wehrle, "A comprehensive approach to privacy in the cloud-based internet of things," Future Generation Computer Systems, vol. 56, pp. 701-718, 2016. https://doi.org/10.1016/j.future.2015.09.016
  17. J. Su, D. Cao, B. Zhao, X. Wang, and I. You, "ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things," Future Generation Computer Systems, vol. 33, pp. 11-18, 2014. https://doi.org/10.1016/j.future.2013.10.016
  18. M. S. Farash, M. Turkanovic, S. Kumari, and M. Holbl, "An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment," Ad Hoc Networks, vol. 36(Part 1), pp. 152-176, 2016. https://doi.org/10.1016/j.adhoc.2015.05.014
  19. Z. Chen and L. Tian, "Privacy-preserving model of IoT based trust evaluation," IEICE Transactions on Information and Systems, vol. E100-D, no. 2, pp. 371-374, 2017. https://doi.org/10.1587/transinf.2016EDL8185
  20. H. Sato, A. Kanai, S. Tanimoto, and T. Kobayashi, "Establishing trust in the emerging era of IoT," in Proceedings of IEEE Symposium on Service-Oriented System Engineering (SOSE), Oxford, UK, 2016, pp. 398-406.
  21. A. S. Tanenbaum, Computer Network. Boston, MA: Pearson Education Inc., 2003.
  22. L. Atzori, A. Iera, and G. Morabito, "SIoT: giving a social structure to the internet of things," IEEE Communications Letters, vol. 15, no. 11, pp. 1193-1195, 2011. https://doi.org/10.1109/LCOMM.2011.090911.111340

피인용 문헌

  1. Driving behaviors analysis based on feature selection and statistical approach: a preliminary study pp.1573-0484, 2018, https://doi.org/10.1007/s11227-018-2618-9