A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 7 Issue 5
Sep.  2020

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 11.8, Top 4% (SCI Q1)
    CiteScore: 17.6, Top 3% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
Giancarlo Fortino, Fabrizio Messina, Domenico Rosaci and Giuseppe M. L. Sarnè, "ResIoT: An IoT Social Framework Resilient to Malicious Activities," IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1263-1278, Sept. 2020. doi: 10.1109/JAS.2020.1003330
Citation: Giancarlo Fortino, Fabrizio Messina, Domenico Rosaci and Giuseppe M. L. Sarnè, "ResIoT: An IoT Social Framework Resilient to Malicious Activities," IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1263-1278, Sept. 2020. doi: 10.1109/JAS.2020.1003330

ResIoT: An IoT Social Framework Resilient to Malicious Activities

doi: 10.1109/JAS.2020.1003330
Funds:  This work was partially supported by the University of Catania, Piano per la Ricerca 2016-2018 - Linea di intervento 1 (Chance), prot. 2019-UNCTCLE-0343614, and the Italian MIUR, PRIN 2017 Project ”Fluidware” (CUP H24I17000070001)
More Information
  • The purpose of the next internet of things (IoT) is that of making available myriad of services to people by high sensing intelligent devices capable of reasoning and real time acting. The convergence of IoT and multi-agent systems (MAS) provides the opportunity to benefit from the social attitude of agents in order to perform machine-to-machine (M2M) coopera-tion among smart entities. However, the selection of reliable partners for cooperation represents a hard task in a mobile and federated context, especially because the trustworthiness of devices is largely unreferenced. The issues discussed above can be synthesized by recalling the well known concept of social resilience in IoT systems, i.e., the capability of an IoT network to resist to possible attacks by malicious agent that potentially could infect large areas of the network, spamming unreliable infor-mation and/or assuming unfair behaviors. In this sense, social resilience is devoted to face malicious activities of software agents in their social interactions, and do not deal with the correct working of the sensors and other information devices. In this setting, the use of a reputation model can be a practicable and effective solution to form local communities of agents on the basis of their social capabilities. In this paper, we propose a framework for agents operating in an IoT environment, called ResIoT, where the formation of communities for collaborative purposes is performed on the basis of agent reputation. In order to validate our approach, we performed an experimental campaign by means of a simulated framework, which allowed us to verify that, by our approach, devices have not any economic convenience to performs misleading behaviors. Moreover, further experimental results have shown that our approach is able to detect the nature of the active agents in the systems (i.e., honest and malicious), with an accuracy of not less than 11% compared to the best competitor tested and highlighting a high resilience with respect to some malicious activities.

     

  • loading
  • 1 Note as in the most common scenarios there are many more consumers than producers, although other scenarios where consumers and providers have a similar numerosity exist. However, this later scenario is the most suitable for testing the resilience of a reputation system for the presence of more actors and, consequently, of more cheaters active into the system.
  • [1]
    K. Ashton, “That ‘internet of things’ thing,” RFID Journal, vol. 7, no. 7, pp. 97–114, 2009.
    [2]
    G. Fortino, W. Russo, C. Savaglio, W. M. Shen, and M. C. Zhou, “Agent-oriented cooperative smart objects: From IoT system design to implementation,” IEEE Trans. Syst.,Man,Cybern.:Syst., vol. 48, no. 11, pp. 1939–1956, Nov. 2018. doi: 10.1109/TSMC.2017.2780618
    [3]
    M. Barcelo, A. Correa, J. Llorca, A. M. Tulino, J. L. Vicario, and A. Morell, “IoT-cloud service optimization in next generation smart environments,” IEEE J. Sel. Areas Commun., vol. 34, no. 12, pp. 4077–4090, Dec. 2016. doi: 10.1109/JSAC.2016.2621398
    [4]
    G. Fortino, F. Messina, D. Rosaci, and G. M. L. Sarné, “Using trust and local reputation for group formation in the cloud of things,” Future Gen. Comput. Syst., vol. 89, pp. 804–815, Dec. 2018. doi: 10.1016/j.future.2018.07.021
    [5]
    G. Kortuem, F. Kawsar, V. Sundramoorthy, and D. Fitton, “Smart objects as building blocks for the internet of things,” IEEE Internet Comput., vol. 14, no. 1, pp. 44–51, Jan.–Feb. 2010. doi: 10.1109/MIC.2009.143
    [6]
    Y. Kim, S. Lee, and I. Chong, “Orchestration in distributed web-of-objects for creation of user-centered IoT service capability,” Wirel. Pers. Commun., vol. 78, no. 4, pp. 1965–1980, Oct. 2014. doi: 10.1007/s11277-014-2056-9
    [7]
    Z. Y. Wen, R. Y. Yang, P. Garraghan, T. Lin, J. Xu, and M. Rovatsos, “Fog orchestration for internet of things services,” IEEE Internet Comput., vol. 21, no. 2, pp. 16–24, Mar.–Apr. 2017. doi: 10.1109/MIC.2017.36
    [8]
    G. Fortino, R. Gravina, W. Russo, and C. Savaglio, “Modeling and simulating internet-of-things systems: A hybrid agent-oriented approach,” Comput. Sci. Eng., vol. 19, no. 5, pp. 68–76, Sept. 2017. doi: 10.1109/MCSE.2017.3421541
    [9]
    D. Calvaresi, M. Marinoni, A. Sturm, M. Schumacher, and G. Buttazzo, “The challenge of real-time multi-agent systems for enabling IoT and CPS,” in Proc. Int. Conf. Web Intelligence, Leipzig, Germany, 2017, pp. 356–364.
    [10]
    M. Hamzei and N. J. Navimipour, “Toward efficient service composition techniques in the internet of things,” IEEE Internet Things J., vol. 5, no. 5, pp. 3774–3787, Oct. 2018. doi: 10.1109/JIOT.2018.2861742
    [11]
    B. Anggorojati, P. N. Mahalle, N. R. Prasad, and R. Prasad, “Capability-based access control delegation model on the federated IoT network,” in Proc. 15th Int. Symp. Wireless Personal Multimedia Communications, Taipei, China, 2012, pp. 604–608.
    [12]
    L. Cui, F. P. Tso, and W. J. Jia, “Federated service chaining: Architecture and challenges,” IEEE Commun. Mag., vol. 58, no. 3, pp. 47–53, Mar. 2020. doi: 10.1109/MCOM.001.1900627
    [13]
    T. Leppänen, J. Riekki, M. R. Liu, E. Harjula, and T. Ojala, “Mobile agents-based smart objects for the internet of things,” in Internet of Things Based on Smart Objects, G. Fortino and P. Trunfio, Eds. Cham, Switzerland: Springer, 2014, pp. 29–48.
    [14]
    H. B. Zhu and M. C. Zhou, “Role-based collaboration and its kernel mechanisms,” IEEE Trans. Syst.,Man,Cybern.,Part C (Appl. Rev.), vol. 36, no. 4, pp. 578–589, Jul. 2006. doi: 10.1109/TSMCC.2006.875726
    [15]
    P. De Meo, F. Messina, M. N. Postorino, D. Rosaci, and G. M. L. Sarné, “A reputation framework to share resources into IoT-based environments,” in Proc. IEEE 14th Int. Conf. Networking, Sensing and Control, Calabria, Italy, 2017, pp. 513–518.
    [16]
    M. S. Roopa, S. Pattar, R. Buyya, K. R. Venugopal, S. S. Iyengar, and L. M. Patnaik, “Social internet of things (SIoT): Foundations, thrust areas, systematic review and future directions,” Comput. Commun., vol. 139, pp. 32–57, May 2019. doi: 10.1016/j.comcom.2019.03.009
    [17]
    W. J. Li, J. Y. Wu, Q. F. Zhang, K. Y. Hu, and J. Li, “Trust-driven and QoS demand clustering analysis based cloud workflow scheduling strategies,” Cluster Comput., vol. 17, no. 3, pp. 1013–1030, Sept. 2014. doi: 10.1007/s10586-013-0340-1
    [18]
    M. Trnka, J. Svacina, T. Cerny, E. Song, J. M. Hong, and M. Bures, “Securing internet of things devices using the network context,” IEEE Trans. Ind. Inform., vol. 16, no. 6, pp. 4017–4027, Jun. 2020. doi: 10.1109/TII.2019.2954100
    [19]
    H. H. Chang and S. S. Chuang, “Social capital and individual motivations on knowledge sharing: Participant involvement as a moderator,” Inf. Manag., vol. 48, no. 1, pp. 9–18, Jan. 2011. doi: 10.1016/j.im.2010.11.001
    [20]
    C. M. Chiu, M. H. Hsu, and E. T. G. Wang, “Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories,” Decis. Support Syst., vol. 42, no. 3, pp. 1872–1888, Dec. 2006. doi: 10.1016/j.dss.2006.04.001
    [21]
    J. Doodson, J. Gavin, and R. Joiner, “Getting acquainted with groups and individuals: Information seeking, social uncertainty and social network sites,” in Proc. 7th Int. AAAI Conf. Weblogs and Social Media, Boston, USA, 2013.
    [22]
    J. M. Leimeister, P. Sidiras, and H. Krcmar, “Success factors of virtual communities from the perspective of members and operators: An empirical study,” in Proc. 37th Annu. Hawaii Int. Conf. System Sciences, Big Island, USA, 2004, pp. 10.
    [23]
    H. B. Zhu, “Avoiding conflicts by group role assignment,” IEEE Trans. Syst.,Man,Cybern.:Syst., vol. 46, no. 4, pp. 535–547, Apr. 2016. doi: 10.1109/TSMC.2015.2438690
    [24]
    L. Fotia, F. Messina, D. Rosaci, and G. M. L. Sarnè, “Using local trust for forming cohesive social structures in virtual communities,” Comput. J., vol. 60, no. 11, pp. 1717–1727, Nov. 2017. doi: 10.1093/comjnl/bxx072
    [25]
    R. Roman, J. Y. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Comput. Netw., vol. 57, no. 10, pp. 2266–2279, Jul. 2013. doi: 10.1016/j.comnet.2012.12.018
    [26]
    K. Benson, “Enabling resilience in the internet of things,” in Proc. IEEE Int. Conf. Pervasive Computing and Communication Workshops, St. Louis, USA, 2015, pp. 230–232.
    [27]
    M. Srivatsa, L. Xiong, and L. Liu, “Trustguard: Countering vulnerabilities in reputation management for decentralized overlay networks,” in Proc. 14th Int. Conf. World Wide Web, Chiba, Japan, 2005, pp. 422–431.
    [28]
    Y. F. Ruan and A. Durresi, “A survey of trust management systems for online social communities–trust modeling, trust inference and attacks,” Knowl.-Based Syst., vol. 106, pp. 150–163, Aug. 2016. doi: 10.1016/j.knosys.2016.05.042
    [29]
    M. Daudi, J. B. Hauge, and K. D. Thoben, “A trust framework for agent’s interactions in collaborative logistics,” in Dynamics in Logistics, M. Freitag, H. Kotzab, and J. Pannek, Eds. Cham, Switzerland: Springer, 2017, pp. 53–63.
    [30]
    M. Aazam, I. Khan, A. A. Alsaffar, and E. N. Huh, “Cloud of things: Integrating internet of things and cloud computing and the issues involved,” in Proc. 11th Int. Bhurban Conf. Applied Sciences & Technology, Islamabad, Pakistan, 2014, pp. 414–419.
    [31]
    M. G. V. Kumar and U. S. Ragupathy, “A survey on current key issues and status in cryptography,” in Proc. Int. Conf. Wireless Communications, Signal Processing and Networking, Chennai, India, 2016, pp. 205–210.
    [32]
    J. Fogel and E. Nehmad, “Internet social network communities: Risk taking, trust, and privacy concerns,” Comput. Hum. Behav., vol. 25, no. 1, pp. 153–160, Jan. 2009. doi: 10.1016/j.chb.2008.08.006
    [33]
    L. Xiong and L. Liu, “PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities,” IEEE Trans. Knowl. Data Eng., vol. 16, no. 7, pp. 843–857, Jul. 2004. doi: 10.1109/TKDE.2004.1318566
    [34]
    D. Rosaci, G. M. L. Sarnè, and S. Garruzzo, “Integrating trust measures in multiagent systems,” Int. J. Intell. Syst., vol. 27, no. 1, pp. 1–15, Jan. 2012. doi: 10.1002/int.20513
    [35]
    T. D. Huynh, N. R. Jennings, and N. R. Shadbolt, “An integrated trust and reputation model for open multi-agent systems,” Auton. Agent Multi Agent Syst., vol. 13, no. 2, pp. 119–154, 2006. doi: 10.1007/s10458-005-6825-4
    [36]
    D. Houser and J. Wooders, “Reputation in auctions: Theory, and evidence from eBay,” J. Econ. Manag. Strategy, vol. 15, no. 2, pp. 353–369, Apr. 2006. doi: 10.1111/j.1530-9134.2006.00103.x
    [37]
    G. Zacharia, A. Moukas, and P. Maes, “Collaborative reputation mechanisms for electronic marketplaces,” Decis. Support Syst., vol. 29, no. 4, pp. 371–388, Dec. 2000. doi: 10.1016/S0167-9236(00)00084-1
    [38]
    L. Tseng, Y. J. Wu, H. C. Pan, M. Aloqaily, and A. Boukerche, “Reliable broadcast in networks with trusted nodes,” in Proc. IEEE Global Communications Conf., Waikoloa, USA, 2019, pp. 1–6.
    [39]
    X. Li, Q. X. Wang, X. Lan, X. S. Chen, N. Zhang, and D. J. Chen, “Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach,” IEEE Access, vol. 7, pp. 9368–9383, Jan. 2019. doi: 10.1109/ACCESS.2018.2890432
    [40]
    M. Indiramma and K. R. Anandakumar, “TCM: A trust computation model for collaborative decision making in multi-agent system,” Int. J. Comput. Sci. Netw. Secur., vol. 8, no. 11, pp. 69–75, Nov. 2008.
    [41]
    J. Sabater and C. Sierra, “Regret: Reputation in gregarious societies,” in Proc. 5th Int. Conf. Autonomous Agents, Quebec, Canada, 2001, pp. 194–195.
    [42]
    S. A. Ghasempouri and B. T. Ladani, “Modeling trust and reputation systems in hostile environments,” Future Gen. Comput. Syst., vol. 99, pp. 571–592, Oct. 2019. doi: 10.1016/j.future.2019.05.017
    [43]
    S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in internet of things: The road ahead,” Comput. Netw., vol. 76, pp. 146–164, Jan. 2015. doi: 10.1016/j.comnet.2014.11.008
    [44]
    J. Guo, I. R. Chen, and J. J. P. Tsai, “A survey of trust computation models for service management in internet of things systems,” Comput. Commun., vol. 97, pp. 1–14, Jan. 2017. doi: 10.1016/j.comcom.2016.10.012
    [45]
    M. Aloqaily, S. Otoum, I. Al Ridhawi, and Y. Jararweh, “An intrusion detection system for connected vehicles in smart cities,” Ad Hoc Netw., vol. 90, pp. 101842, Jul. 2019. doi: 10.1016/j.adhoc.2019.02.001
    [46]
    F. Y. Bao and I. R. Chen, “Dynamic trust management for internet of things applications,” in Proc. Int. Workshop on Self-Aware Internet of Things, San Jose, USA, 2012, pp. 1–6.
    [47]
    I. R. Chen, F. Y. Bao, and J. Guo, “Trust-based service management for social internet of things systems,” IEEE Trans. Dependable Secure Comput., vol. 13, no. 6, pp. 684–696, Nov.–Dec. 2016. doi: 10.1109/TDSC.2015.2420552
    [48]
    C. Vallati, E. Mingozzi, G. Tanganelli, N. Buonaccorsi, N. Valdambrini, N. Zonidis, B. Martínez, A. Mamelli, D. Sommacampagna, B. Anggorojati, S. Kyriazakos, N. Prasad, F. J. Nieto, and O. B. Rodriguez, “BETaaS: A platform for development and execution of machine-to-machine applications in the internet of things,” Wirel. Pers. Commun., vol. 87, no. 3, pp. 1071–1091, Apr. 2016. doi: 10.1007/s11277-015-2639-0
    [49]
    Y. B. Saied, A. Olivereau, D. Zeghlache, and M. Laurent, “Trust management system design for the internet of things: A context-aware and multi-service approach,” Comput. Secur., vol. 39, pp. 351–365, Nov. 2013. doi: 10.1016/j.cose.2013.09.001
    [50]
    E. M. Schooler, D. Zage, J. Sedayao, H. Moustafa, A. Brown, and M. Ambrosin, “An architectural vision for a data-centric IoT: Rethinking things, trust and clouds,” in Proc. IEEE 37th Int. Conf. Distributed Computing Systems, Atlanta, USA, 2017, pp. 1717–1728.
    [51]
    M. D. Alshehri, F. K. Hussain, and O. K. Hussain, “Clustering-driven intelligent trust management methodology for the internet of things (CITM-IoT),” Mobile Netw. Appl., vol. 23, no. 3, pp. 419–431, Jun. 2018. doi: 10.1007/s11036-018-1017-z
    [52]
    J. P. G. Sterbenz, “Smart city and IoT resilience, survivability, and disruption tolerance: Challenges, modelling, and a survey of research opportunities,” in Proc. 9th Int. Workshop Resilient Networks Design and Modeling, Alghero, Italy, 2017, pp. 1–6.
    [53]
    I. Al Ridhawi, S. Otoum, M. Aloqaily, Y. Jararweh, and T. Baker, “Providing secure and reliable communication for next generation networks in smart cities,” Sustain. Cities Soc., vol. 56, pp. 102080, May 2020. doi: 10.1016/j.scs.2020.102080
    [54]
    H. Q. Li, Q. G. Lu, and T. W. Huang, “Convergence analysis of a distributed optimization algorithm with a general unbalanced directed communication network,” IEEE Trans. Netw. Sci. Eng., vol. 6, no. 3, pp. 237–248, Jul. 2019. doi: 10.1109/TNSE.2018.2848288
    [55]
    H. Sándor, B. Genge, and G. Sebestyén-Pál, “Resilience in the internet of things: The software defined networking approach,” in Proc. IEEE Int. Conf. Intelligent Computer Communication and Processing, Cluj-Napoca, Romania, 2015, pp. 545–552.
    [56]
    X. P. Liang, J. Zhao, S. Shetty, and D. Y. Li, “Towards data assurance and resilience in IoT using blockchain,” in Proc. IEEE Military Communications Conf., Baltimore, USA, 2017, pp. 261–266.
    [57]
    P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi, and K. K. R. Choo, “A systematic literature review of blockchain cyber security,” Digit. Commun. Netw., vol. 6, no. 2, pp. 147–156, May 2020. doi: 10.1016/j.dcan.2019.01.005
    [58]
    L. Tseng, L. Wong, S. Otoum, M. Aloqaily, and J. B. Othman, “Blockchain for managing heterogeneous internet of things: A perspective architecture,” IEEE Netw., vol. 34, no. 1, pp. 16–23, Jan.–Feb. 2020. doi: 10.1109/MNET.001.1900103
    [59]
    Z. A. Khan, J. Ullrich, A. G. Voyiatzis, and P. Herrmann, “A trust-based resilient routing mechanism for the internet of things,” in Proc. 12th Int. Conf. Availability, Reliability and Security, Reggio Calabria, Italy, 2017, pp. 1–6
    [60]
    H. Q. Li, Q. G. Lu, and T. W. Huang, “Distributed projection subgradient algorithm over time-varying general unbalanced directed graphs,” IEEE Trans. Autom. Control, vol. 64, no. 3, pp. 1309–1316, Mar. 2019. doi: 10.1109/TAC.2018.2849616
    [61]
    L. Liu, M. Loper, Y. Ozkaya, A. Yasar, and E. Yigitoglu, “Machine to machine trust in the IoT era. ” in Proc. 18th Int. Conf. Trust in Agent Societies, Singapore, 2016, pp. 18–29.
    [62]
    M. Feldman, C. Papadimitriou, J. Chuang, and I. Stoica, “Free-riding and whitewashing in peer-to-peer systems,” IEEE J. Sel. Areas Commun., vol. 24, no. 5, pp. 1010–1019, May 2006. doi: 10.1109/JSAC.2006.872882
    [63]
    A. J. Bidgoly and B. T. Ladani, “Benchmarking reputation systems: A quantitative verification approach,” Comput. Hum. Behav., vol. 57, pp. 274–291, Apr. 2016. doi: 10.1016/j.chb.2015.12.024
    [64]
    P. Y. Zhang, S. Shu, and M. C. Zhou, “An online fault detection model and strategies based on SVM-grid in clouds,” IEEE/CAA J. Autom. Sinica, vol. 5, no. 2, pp. 445–456, Mar. 2018. doi: 10.1109/JAS.2017.7510817
    [65]
    J. J. Wang and T. Kumbasar, “Parameter optimization of interval type-2 fuzzy neural networks based on PSO and BBBC methods,” IEEE/CAA J. Autom. Sinica, vol. 6, no. 1, pp. 247–257, Jan. 2019. doi: 10.1109/JAS.2019.1911348
    [66]
    S. C. Gao, M. C. Zhou, Y. R. Wang, J. J. Cheng, H. Yachi, and J. H. Wang, “Dendritic neuron model with effective learning algorithms for classification, approximation, and prediction,” IEEE Trans. Neural Netw. Learn. Syst., vol. 30, no. 2, pp. 601–614, Feb. 2019. doi: 10.1109/TNNLS.2018.2846646

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(8)  / Tables(4)

    Article Metrics

    Article views (1449) PDF downloads(61) Cited by()

    Highlights

    • This work focuses on the social resilience of agents behaviors in IOT systems.
    • A framework for agents operating in an IOT environment, called ResIOT, is proposed.
    • The framework is capable to drive the formation of communities to avoid misleading agents behaviors.
    • The experimental campaign prove that agents have not convenience to performs misleading behaviors in the communities.
    • The presented approach is able to detect the malicious agents in the system, with good accuracy.

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return