Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3442442.3451144acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article
Open access

PDTM: Poisson Distribution-based Trust Model for Web of Things

Published: 03 June 2021 Publication History

Abstract

Web of things (WoT) are inclined to suffer from internal attacks, which are from compromised nodes. Due to resource-constraint of WoT, the traditional security methods cannot be deployed. One of the most appropriate protection mechanisms to resist internal attacks is the trust management system. For the sake of evaluate the performance of WoT reasonably and appropriately, we improve the Beta-based reputation system, and propose a Poisson Distribution-based trust model (PDTM) in this paper. In view of evaluating a sensor node (or terminal) behaviors, its reputation and trust are represented by the Poisson distribution. PDTM is used to look for reliable nodes to transmit data and weaken malicious attacks within WoTs. The simulation results indicate that the PDTM can resist internal attack effectively, in order to strengthen the network security.

References

[1]
C.-H. Chen, F. Song, F.-J. Hwang, L. Wu, A Probability Density Function Generator Based on Neural Networks, Physica A: Statistical Mechanics and its Applications, Vol. 541, pp. 123344, 2019.
[2]
W. Fang, W. Zhang, W. Chen, Y. Liu, C. Tang. TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wireless Networks (2020), 26(5): 3169-3182. https://doi.org/10.1007/s11276-019-02129-w
[3]
C.-H. Chen, A Cell Probe-based Method for Vehicle Speed Estimation, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E103-A, no. 1, pp. 265-267, January 2020.
[4]
W. Fang, M. Xu, C. Zhu, W. Han, W. Zhang, J. J. P. C. Rodrigues, FETMS: Fast and Efficient Trust Management Scheme for Information-Centric Networking in Internet of Things. IEEE Access. 2019, 7(1): 13476-13485.
[5]
W. Fang, W. Zhang, W. Chen, T. Pan, Y. Ni and Y. Yang. Trust-based Attack and Defense in Wireless Sensor Networks: A Survey. Wireless Communications and Mobile Computing. Volume 2020, Article ID 2643546, 20 pages, https://doi.org/10.1155/2020/2643546
[6]
C.-H. Chen, F.-J. Hwang, H.-Y. Kung, Travel Time Prediction System Based on Data Clustering for Waste Collection Vehicles, IEICE Transactions on Information and Systems, vol. E102-D, no. 7, pp.1374-1383, July 2019.
[7]
W. Fang, N. Cui, W. Chen, W. Zhang, Y. Chen. A Trust-based Security System for Data Collecting in Smart City. IEEE Transactions on Industrial Informatics.
[8]
C.-H. Chen, An Arrival Time Prediction Method for Bus System, IEEE Internet of Things Journal, vol. 5, no. 5, pp. 4231-4232, October 2018.
[9]
A. A. Anasane and R. A. Satao, A Survey on Various Multipath Routing Protocols in Wireless Sensor Networks. Procedia Comput. Sci., vol. 79, no. 20, pp. 610–615, 2016.
[10]
C. Zhu, X. Li, V. C. M. Leung, L. T. Yang, E. C.-H. Ngai, and L. Shu, Towards Pricing for Sensor-Cloud. IEEE Trans. Cloud Comput., vol. XX, no. XX, pp. 1–1, 2017.
[11]
C. Zhu, V. C. M. Leung, L. T. Yang, and L. Shu, Collaborative Location-Based Sleep Scheduling for Wireless Sensor Networks Integratedwith Mobile Cloud Computing. IEEE Trans. Comput., vol. 64, no. 7, pp. 1844–1856, 2015.
[12]
C. Zhu, Z. Sheng, V. C. M. Leung, L. Shu, and L. T. Yang, Toward offering more useful data reliably to mobile cloud from wireless sensor network. IEEE Trans. Emerg. Top. Comput., vol. 3, no. 1, pp. 84–94, 2015.
[13]
W. Fang, W. Zhang, Y. Yang, Y. Liu, and W. Chen, A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution. Sci. China (Information Sci., vol. 60, no. 4, p. 40305, 2017.
[14]
H. Xia, Z. P. Jia, and E. H. M. Sha, Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inf. Secur., vol. 8, no. 2, pp. 88–103, 2014.
[15]
C. Zhu, H. Nicanfar, V. C. M. Leung, and L. T. Yang, An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans. Inf. Forensics Secur., vol. 10, no. 1, pp. 118–131, 2015.
[16]
W. Na and L. DongQian, Trust model based on changeable sampling frequency for wireless sensor network. in 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), 2016, pp. 1–4.
[17]
V. Umarani, Enhanced Beta Trust Model in Wireless Sensor Networks. in Int. Conf. Inf. Commun. Embed. Syst, 2016, no. Icices, pp. 1–5.
[18]
N. Labraoui, A Reliable Trust Management Scheme in Wireless Sensor Networks. in IEEE International Symposium on Programming and Systems (ISPS), 2015, pp. 1–6.
[19]
C. Zhu, X. Li, V. C. M. Leung, L. T. Yang, C. H. Ngai, and L. Shu, Towards Pricing for Sensor-Cloud. IEEE Trans. Cloud Comput., vol. PP, no. 99, p. 1, 2017.
[20]
S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, Reputation-based framework for high integrity sensor networks. in ACM Transactions on Sensor Networks, 2008, vol. 4, no. 3, pp. 66–77.
[21]
W. Fang, C. Zhang, Z. Shi, Q. Zhao, L. Shan. BTRES: Beta-based Trust and Reputation Evaluation System for Wireless Sensor Networks. Journal of Network and Computer Applications. vol.59, no.1, 2016, pp: 88-94
[22]
R. Feng, Q. Liu, Q. Liu, and N. Yu, A credible Bayesian-based trust management scheme for wireless sensor networks. Int. J. Distrib. Sens. Networks, 2015,(2015-11-1), vol. 2015, no. 2, p. 10, 2015.
[23]
D. Hongjun, J. Zhiping, and D. Xiaona, An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks. In Proceedings of 2008 International Conference on Embedded Software and Systems. 2008, pp. 27–34.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '21: Companion Proceedings of the Web Conference 2021
April 2021
726 pages
ISBN:9781450383134
DOI:10.1145/3442442
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 June 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Internal attacks
  2. Poisson distribution
  3. Trust model
  4. Web of things (WoT)

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

WWW '21
Sponsor:
WWW '21: The Web Conference 2021
April 19 - 23, 2021
Ljubljana, Slovenia

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 464
    Total Downloads
  • Downloads (Last 12 months)143
  • Downloads (Last 6 weeks)13
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media