Trust Computational Model for IoT using Machine Learning

Page: [167 - 178] Pages: 12

  • * (Excluding Mailing and Handling)

Abstract

Aims and Backgrounds: The Internet of Things has evolved over the years to a greater extent, where objects communicate with each other over a network. Heterogenous communication between the nodes leads to a large amount of information sharing, and sensitive information could be shared over the network. It is important to maintain privacy and security during information sharing to protect devices from communicating with malicious nodes.

Objectives and Methodology: The concept of trust was introduced to prevent nodes from communicating with malicious nodes. A trust computation model for the IoT based on machine learning concepts was designed, which evaluates trust based on the Trust Marks. There are three trust marks, out of which two are evaluated. The three trust marks are knowledge, experience, and reputation. Knowledge trust marks are evaluated separately based on their trust property mathematical formulations, and then based on these properties, machine learning-based algorithms are applied to train the model to classify the objects as trustworthy and untrustworthy.

Results: The effectiveness of the Knowledge Trust Mark is measured by a simulation and confusion matrix. The accuracy of the trained model is shown by the accuracy score. The trust computational model for IoT using machine learning shows higher accuracy in classifying the objects as trustworthy and untrustworthy.

Conclusion: The experience trust mark is evaluated based on its properties, and the behaviour of the experience is shown over time graphically.

Graphical Abstract

[1]
Liu L, Shafiq M, Sonawane VR, Murthy MYB, Reddy PCS, Reddy KMNC. Spectrum trading and sharing in unmanned aerial vehicles based on distributed blockchain consortium system. Comput Electr Eng 2022; 103: 108255.
[http://dx.doi.org/10.1016/j.compeleceng.2022.108255]
[2]
Yadala S, Shaker RPC. An autonomous adaptive enhancement method based on learning to optimize heterogeneous network selection. Int J Sensors Wirel Commun Control 2023; 13(7)
[3]
Dhanalakshmi R, Bhavani NPG, Raju SS, et al. Onboard pointing error detection and estimation of observation satellite data using extended kalman filter. Comput Intell Neurosci 2022; 2022: 4340897.
[http://dx.doi.org/10.1155/2022/4340897] [PMID: 36248921]
[4]
Sujihelen L, Boddu R, Murugaveni S, et al. Node replication attack detection in distributed wireless sensor networks. Wirel Commun Mob Comput 2022; 2022: 7252791.
[http://dx.doi.org/10.1155/2022/7252791]
[5]
Singhal A, Varshney S, Mohanaprakash TA, et al. Minimization of latency using multitask scheduling in industrial autonomous systems. Wirel Commun Mob Comput 2022; 2022: 1671829.
[http://dx.doi.org/10.1155/2022/1671829]
[6]
Balamurugan D, Aravinth SS, Reddy PCS, Rupani A, Manikandan A. Multiview objects recognition using deep learning-based wrap-CNN with voting scheme. Neural Process Lett 2022; 54(3): 1495-521.
[http://dx.doi.org/10.1007/s11063-021-10679-4]
[7]
Shaker Reddy PC, Sureshbabu A. An enhanced multiple linear regression model for seasonal rainfall prediction. Int J Sensors Wirel Commun Control 2020; 10(4): 473-83.
[http://dx.doi.org/10.2174/2210327910666191218124350]
[8]
Sucharitha Y, Vijayalata Y, Prasad VK. Predicting election results from twitter using machine learning algorithms. Recent Adv Computer Sci Communicat 2021; 14(1): 246-56.
[9]
Reddy PC, Sucharitha Y, Narayana GS. Development of rainfall forecasting model using machine learning with singular spectrum analysis. IIUM Eng J 2022; 23(1): 172-86.
[http://dx.doi.org/10.31436/iiumej.v23i1.1822]
[10]
Reddy S, Chandra P. IoT-enabled energy-efficient multipath power control for underwater sensor networks. Int J Sensors Wirel Commun Control 2022; 12(6) .
[11]
Zhao K, Pan L. A machine learning based trust evaluation framework for online social networks. TRUSTCOM '14: Proceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. 69-74.
[http://dx.doi.org/10.1109/TrustCom.2014.13]
[12]
Nitti M, Girau R, Atzori L. Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 2014; 26(5): 1253-66.
[http://dx.doi.org/10.1109/TKDE.2013.105]
[13]
Jayasinghe U, Truong NB, Lee GM, Um T-W. RpR: A trust computation model for social internet of things. Smart World Congress Int IEEE Conf Ubiquitous Intell Comput. 930-7. http://dx.doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoPSmartWorld.2016.0146
[14]
Rehman AU, Jiang A, Rehman A, Paul A. Weighted based trustworthiness ranking in social internet of things by using soft set theory. 2019 IEEE 5th International Conference on Computer and Communications (ICCC). Chengdu, China. 2019; pp. 1644-8.
[http://dx.doi.org/10.1109/ICCC47050.2019.9064242]
[15]
Khalil A, Mbarek N, Togni O. Fuzzy Logic based security trust evaluation for IoT environments. 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA). Abu Dhabi, United Arab Emirates. 2019; pp. 1-8.
[http://dx.doi.org/10.1109/AICCSA47632.2019.9035294]
[16]
Kamran Ahmad A, Uddin I, Almogren A, et al. RobustTrust - A pro-privacy robust distributed trust management mechanism for internet of things. IEEE Access 2019; 7: 62095-106.
[17]
Sadique KM, Rahmani R, Johannesson P. Trust in Internet of Things: An architecture for the future IoT network. International Conference on Innovation in Engineering and Technology. Dhaka, Bangladesh. 2018; pp. 1-5.
[http://dx.doi.org/10.1109/CIET.2018.8660784]
[18]
Albalawi U, Joshi S. Secure and Trusted Telemedicine in Internet of Things IoT. 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). Singapore. 2018; pp. 30-4.
[19]
Sagar S, Mahmood A, Quan Z, et al. Trust computational heuristic for social internet of things: A machine learning based approach. ICC 2020 - 2020 IEEE International Conference on Communications (ICC). Dublin, Ireland. 2018; pp. 1-6.
[20]
Anuoluwapo A, Cheng H, Shi Q. CTRUST: A dynamic trust model for collaborative applications in the internet of things. IEEE Internet of Things Journal 2019; 6(3): 5432-45.
[21]
Truong NB, Tai-Won Um, Zhou B, et al. From personal experience to global reputation for trust evaluation in the social internet of things. GLOBECOM 2017 - 2017 IEEE Global Communications Conference. Singapore. 2017; pp. 1-7.
[22]
Ashok K, Boddu R, Syed SA, Sonawane VR, Dabhade RG, Reddy PCS. GAN Base feedback analysis system for industrial IOT networks. Automatika (Zagreb) 2022; 1-9.
[23]
Sabitha R, Shukla AP, Mehbodniya A, Shakkeera L, Reddy PCS. A fuzzy trust evaluation of cloud collaboration outlier detection in wireless sensor networks. Ad Hoc Sens Wirel Netw 2022; 53.
[24]
Reddy P, Sureshbabu A. An adaptive model for forecasting seasonal rainfall using predictive analytics. International Journal of Intelligent Engineering and Systems 2019; 12(5): 22-32.
[http://dx.doi.org/10.22266/ijies2019.1031.03]
[25]
Anna-Kaisa P, Christophe D. CRAWDAD dataset thlab/sigcomm2009. 2012.https://crawdad.org/thlab/sigcomm2009/20120715