EdgeTrust - A Lightweight Data-centric Trust Management Approach for Green Internet of Edge Things

Author(s):  
Kamran Ahmad Awan ◽  
Ikram Ud Din ◽  
Ahmad Almogren ◽  
Hasan Ali Khattak ◽  
Joel J.P.C. Rodrigues

Abstract Internet of Things (IoT) is bringing revolution into today’s world where devices in our surroundings become smart and perform daily-life activities and operations with more precision. The architecture of IoT is heterogeneous as it provides autonomy to nodes that they can communicate among other nodes and can also exchange information at any period. Due to the heterogeneous environment, IoT faces numerous security and privacy challenges, and one of the most significant challenges is the identification of malicious and compromised nodes. In this article, we have proposed a Machine Learning-based trust management approach for edge nodes. The proposed approach is a lightweight process to evaluate trust because edge nodes cannot perform complex computations. To evaluate trust, the proposed mechanism utilizes the knowledge and experience component of trust where knowledge is further based on several parameters. To eliminate the triumphant execution of good and bad-mouthing attacks, the proposed approach utilizes edge clouds, i.e., local data centers, to collect recommendations to evaluate indirect and aggregated trust. The trustworthiness of nodes is ranked between a certain limit where only those that satisfy the threshold value can participate in the network. To validate the performance of a proposed approach we have performed an extensive simulation in comparison with the existing approaches and the result shows the effectiveness of the proposed approach against several potential attacks.

Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6174 ◽  
Author(s):  
Kamran Ahmad Awan ◽  
Ikram Ud Din ◽  
Ahmad Almogren ◽  
Hisham Almajed

Internet of Things (IoT) provides a diverse platform to automate things where smart agriculture is one of the most promising concepts in the field of Internet of Agriculture Things (IoAT). Due to the requirements of more processing power for computations and predictions, the concept of Cloud-based smart agriculture is proposed for autonomic systems. This is where digital innovation and technology helps to improve the quality of life in the area of urbanization expansion. For the integration of cloud in smart agriculture, the system is shown to have security and privacy challenges, and most significantly, the identification of malicious and compromised nodes along with a secure transmission of information between sensors, cloud, and base station (BS). The identification of malicious and compromised node among soil sensors communicating with the BS is a notable challenge in the BS to cloud communications. The trust management mechanism is proposed as one of the solutions providing a lightweight approach to identify these nodes. In this article, we have proposed a novel trust management mechanism to identify malicious and compromised nodes by utilizing trust parameters. The trust mechanism is an event-driven process that computes trust based on the pre-defined time interval and utilizes the previous trust degree to develop an absolute trust degree. The system also maintains the trust degree of a BS and cloud service providers using distinct approaches. We have also performed extensive simulations to evaluate the performance of the proposed mechanism against several potential attacks. In addition, this research helps to create friendlier environments and efficient agricultural productions for the migration of people to the cities.


2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1787
Author(s):  
Ezedin Barka ◽  
Sofiane Dahmane ◽  
Chaker Abdelaziz Kerrache ◽  
Mohamad Khayat ◽  
Farag Sallabi

Healthcare professionals and scholars have emphasized the need for IoT-based remote health monitoring services to track the health of the elderly. Such systems produce a large amount of data, necessitating the security and privacy of that data. On the other hand, Software Defined Networking (SDN) integration could be seen as a good solution to guarantee both flexibility and efficiency of the network which is even more important in the case of healthcare monitoring. Furthermore, Blockchain has recently been proposed as a game-changing tool that can be integrated into the Internet of Things (IoT) to have the optimal level of security and privacy. However, incorporating Blockchain into IoT networks, which rely heavily on patients’ health sensors, is extremely difficult. In this paper, a secure Healthcare Monitoring System (HMS) is proposed with a focus on trust management issues. The architecture seeks to protect multiple healthcare monitoring system components and preserves patient privacy by developing a security interface where separate security modules can be integrated to run side by side to ensure reliable HMS. The security framework architecture we propose takes advantage of the blockchain technology as a secure and timely information back-end. STHM is a proposal that uses Software-Defined Networking (SDN) as the communication medium that allows users to access SDN’s different functional and security technologies and services. Simulation results show that the use of Blockchain for the SDN-based healthcare monitoring can ensure the desired flexibility and security for a very lightweight additional overhead.


2018 ◽  
Vol 2018 ◽  
pp. 1-17 ◽  
Author(s):  
Sheeraz Ahmed ◽  
Mujeeb Ur Rehman ◽  
Atif Ishtiaq ◽  
Sarmadullah Khan ◽  
Armughan Ali ◽  
...  

VANET is an application and subclass of MANETs, a quickly maturing, promising, and emerging technology these days. VANETs establish communication among vehicles (V2V) and roadside infrastructure (V2I). As vehicles move with high speed, hence environment and topology change with time. There is no optimum routing protocol which ensures full-pledge on-time delivery of data to destination nodes, and an absolutely optimum scheme design for flawless packet exchange is still a challenging task. In VANETs, accurate and on-time delivery of fundamental safety alert messages (FSAMs) is highly important to withstand against maliciously inserted security threats affectively. In this paper, we have presented a new security-aware routing technique called VANSec. The presented scheme is more immune and resistive against different kinds of attacks and thwarts malicious node penetration attempts to the entire network. It is basically based on trust management approach. The aim of the scheme is to identify malicious data and false nodes. The simulation results of VANSec are compared with already existing techniques called trust and LT in terms of trust computation error (TCE), end-to-end delay (EED), average link duration (ALD), and normalized routing overhead (NRO). In terms of TCE, VANSec is 11.6% and 7.3% efficient than LT and trust, respectively, while from EED comparison we found VANSec to be 57.6% more efficient than trust and 5.2% more efficient than LT. Similarly, in terms of ALD, VANSec provides 29.7% and 7.8% more stable link duration than trust and LT do, respectively, and in terms of NRO, VANSec protocol has 27.5% and 14% lesser load than that of trust and LT, respectively.


Author(s):  
Manoranjini J. ◽  
Anbuchelian S.

The rapid massive growth of IoT and the explosive increase in the data used and created in the edge networks led to several complications in the cloud technology. Edge computing is an emerging technology which is ensuring itself as a promising technology. The authors mainly focus on the security and privacy issues and their solutions. There are a lot of important features which make edge computing the most promising technology. In this chapter, they emphasize the security and privacy issues. They also discuss various architectures that enable us to ensure safe technologies and also provide an analysis on various designs that enable strong security models. Next, they make a detailed study on different cryptographic techniques and trust management systems. This study helps us to identify the pros and cons that led us to promising implementations of edge computing in the current scenario. At the end of the chapter, the authors discuss on various open research areas which could be the thrust areas for the next era.


2013 ◽  
Vol 401-403 ◽  
pp. 1792-1795 ◽  
Author(s):  
Tao Liu ◽  
Ya Wen Guan ◽  
Yi Qun Yan ◽  
Li Liu ◽  
Qi Chao Deng

Aimed to the security and privacy issues which restrict the construction and development of the Internet of Things, a WSN-oriented key agreement protocol in the Internet of Things ( IOT) has been proposed . Trust management was introduced the security mechanism of IOT, the use of bilinear pairing technology, the identity-based key agreement was realized. Using the protocol not only can effectively prevent attacks from outside the network and can recognize the abnormal nodes which were captured or lapsed efficacy. Thus it can reduce communication with abnormal nodes to improve network security, extending the lifetime of the network. The distributed self-organizing key negotiation process without credible third-party management can enhance the survivability of IOT, and the network has a good scalability.


2020 ◽  
Vol 137 ◽  
pp. 1-16 ◽  
Author(s):  
Mohammed Al-khafajiy ◽  
Thar Baker ◽  
Muhammad Asim ◽  
Zehua Guo ◽  
Rajiv Ranjan ◽  
...  

2015 ◽  
Vol 23 (3) ◽  
pp. 383-390 ◽  
Author(s):  
Sofie Martien ◽  
Christophe Delecluse ◽  
Jan Seghers ◽  
Filip Boen

The primary purpose of this study was to assess the validity of two motion sensors in measuring steps in institutionalized older adults during daily life activities. Sixty-eight nursing home residents (85.8 ± 5.6 years) were equipped with a hip-worn and ankle-worn piezoelectric pedometer (New Lifestyles 2000) and with an arm-mounted multisensor (SenseWear Mini). An investigator with a hand counter tallied the actual steps. The results revealed that the multisensor and hip- and ankle-worn pedometer significantly underestimated step counts (89.6 ± 17.2%, 72.9 ± 25.8%, and 20.8 ± 24.6%, respectively). Walking speed accounted for 41.6% of the variance in percent error of the ankle-worn pedometer. The threshold value for accurate step counting was set at 2.35 km/hr, providing percent error scores within ± 5%. The ankle-worn piezoelectric pedometer can be useful for accurate quantification of walking steps in the old and old-old (> 85 years) walking faster than 2.35 km/hr.


2014 ◽  
Vol 11 (1) ◽  
pp. 19-34
Author(s):  
Mark C. Duncan ◽  
Kenneth M. Hopkinson ◽  
Eric D. Trias ◽  
Jeffrey W. Humphries

Sign in / Sign up

Export Citation Format

Share Document