DOI QR코드

DOI QR Code

M2M 애플리케이션 서비스를 위한 하이브리드형 신뢰 평가 모델

Hybrid Trust Computational Model for M2M Application Services

  • 김유경 (숙명여자대학교 기초공학부)
  • 투고 : 2020.11.04
  • 심사 : 2020.12.21
  • 발행 : 2020.12.31

초록

IoT 환경의 최종 사용자 도메인에서 점점 더 많은 수의 지능형 M2M(Machine-to-Machine Communication) 장치가 애플리케이션 서비스를 생성하고 공유하기 위한 자원을 제공한다. 따라서 기존의 중앙집중식 서비스 제공자의 역할을 P2P 환경의 최종 사용자에게 이전하여 신뢰를 관리하는 것은 매우 유용할 수 있다. 그러나 최종 사용자가 독립적으로 서비스를 제공하거나 소비하는 비중앙집중식 M2M 컴퓨팅 환경에서는 상호간의 신뢰 구축이 가장 중요한 요인이 된다. 오작동하는 서비스를 구축하려는 악의적인 사용자들이 IoT와 같은 M2M 컴퓨팅 환경에서 보안문제를 야기할 수 있기 때문이다. 본 논문에서는 M2M 애플리케이션 서비스의 신뢰 평가를 위한 통합적인 분석과 접근방식을 제공하고, M2M 커뮤니티의 사용자들 사이의 신뢰도를 보장할 수 있는 최적화된 신뢰 평가 모델을 제시한다.

In the end-user domain of an IoT environment, there are more and more intelligent M2M devices that provide resources to create and share application services. Therefore, it can be very useful to manage trust by transferring the role of the existing centralized service provider to end users in a P2P environment. However, in a decentralized M2M computing environment where end users independently provide or consume services, mutual trust building is the most important factor. This is because malicious users trying to build malfunctioning services can cause security problems in M2M computing environments such as IoT. In this paper, we provide an integrated analysis and approach for trust evaluation of M2M application services, and an optimized trust evaluation model that can guarantee reliability among users of the M2M community.

키워드

참고문헌

  1. N. B. Truong, U. Jayasinghe, T.-W. Um, and G. M. Lee, "A Survey on Trust Computation in the Internet of Things", 한국통신학회지(정보와 통신), 제 33권 제 2호, pp. 10-27, Jan. 2016. https://www.koreascience.or.kr/article/JAKO201608949924661.pdf
  2. Mayer, R. C., Davis, J. H. & Schoorman, F. D. (1995). "An Integrative Model of Organizational Trust", The Academy of Management Review, 20(3): 709-734. DOI:https://doi.org/10.2307/258792
  3. Truong, N. B., H. Lee, B. Askwith and G. Lee, "Toward a Trust Evaluation Mechanism in the Social Internet of Things", Sensors (Basel), Vol.17, No.6 (2017), Article 1346. DOI: https://doi.org/10.3390/s17061346
  4. J. Li, R. Li, and J. Kato, "Future trust management framework for mobile ad hoc networks", IEEE Communication Magazine, Vol.46, No.4, pp.108-114, April 2008. DOI:https://doi.org/10.1109/MCOM.2008.4481349
  5. D. Chen, G. Chang, D. Sun, J. Li, J. Jia, and X. Wang, "TRM-IoT: A trust management model based on fuzzy reputation for internet of things", Computer Science and Information System, Vol. 8, No. 4, pp. 1207-1228, 2011. DOI:https://doi.org/10.2298/CSIS110303056C
  6. J. Guo and I. Chen, "A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems", Proc. of IEEE International Conference on Services Computing (SCC 2015), pp. 324-331, 2015. DOI:https://doi.org/10.1109/SCC.2015.52
  7. F. Bao, I. R. Chen, and J. Guo, "Scalable, adaptive and survivable trust management for community of interest based internet of things systems", Proc. of 11th International Symposium on Autonomous Decentralized Systems (ISADS 2013), pp. 1-7, 2013. DOI: https://doi.org/10.1109/ISADS.2013.6513398
  8. M. Nitti, R. Girau, L. Atzori, A. Iera, and G. Morabito, "A subjective model for trustworthiness evaluation in the social internet of things", Proc. of IEEE International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC 2012), Sydney, Australia, 2012. DOI: https://doi.org/10.1109/PIMRC.2012.6362662
  9. K. Aberer, and Z. Despotovic, "Managing trust in a peer-2-peer information system", Proc. of International Conference on Information and knowledge management, Atlanta, Georgia, USA, 2001, pp. 310-317. https://doi.org/10.1145/502585.502638
  10. P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman, "Reputation Systems", Communications of the ACM, vol. 43, no. 12, pp. 45-48, 2000. DOI: https://doi.org/10.1145/355112.355122
  11. M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, "Experience with the KeyNote Trust Management System", Proc. in International Conference on Trust Management, Heraklion, Crete, Greece, 2003, pp. 284-300. DOI: https://doi.org/10.1007/3-540-44875-6_21
  12. L. Xiong, and L. Liu, "A Reputation-based Trust Model for Peer-to-Peer E-Commerce Communities", in IEEE International Conference on E-Commerce Technology (CEC), Newport Beach, 2003, pp. 275-284. DOI: https://doi.org/10.1109/COEC.2003.1210262
  13. Y. Liu, W. Xue, K. Li, Z. Chi, G. Min, and W. Qu, "DHTrust: A Robust and Distributed Reputation System for Trusted Peer-to-Peer Networks", Proc. in IEEE Global Telecommunications Conference (GLOBECOM), Miami, FL, USA, 2010, pp. 1-6. DOI: https://doi.org/10.1109/GLOCOM. 2010.5683742
  14. T. Roosta, M. Meingast, and S. Sastry, "Distributed Reputation System for Tracking Applications in Sensor Networks", Proc. in International Conference on Mobile and Ubiquitous Systems: Networking & Services, San Jose, CA, USA, 2006, pp. 1-8. DOI:https://doi.org/10.1109/MOBIQ.2006.340449
  15. J. Golbeck, Computing and Applying Trust in Web-based Social Networks, Ph.D. Thesis, University of Maryland, 2005. http://drum.lib.umd.edu/bitstream/1903/2384/1/umi-umd-2244.pdf