Abstract
With the explosive development of the mobile Internet, the security threats faced by the mobile Internet have grown rapidly in recent years. Since the normal operation of the mobile Internet depends on the trust between nodes, the existing trusted measurement model cannot fully and dynamically evaluate mobile Internet computing nodes, and the trust transmission has a great deal of energy consumption. Aiming at above problems, this paper proposes a trusted measurement model combining static measurement and node behavior measurement. The model is based on the computing environment measurement of the mobile Internet computing node, and is also based on node behavior measurement, combining direct and recommended trust values to complete the measurement of nodes. It can more objectively reflect the trust degree of nodes, effectively detecting malicious nodes, and ensuring the normal operation of mobile Internet services. The simulation experiment results show that this method can effectively balance the subjectivity and objectivity of trust assessment, and can quickly avoid malicious nodes and reduce the energy consumption of the trust transmission.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
CiscoVNI Mobile: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2013–2018 (2014)
Chen, F.: Research on quality of experience oriented resource management in Mobile Internet. Dissertation for Ph.D. Degree. University of Science and Technology of China, Hefei (2013)
Meeker, M.: 2014 Internet Trends (2014)
Ericsson.: Ericsson Traffic and Market Data Reports (2013)
Zhu, H., Du, S., Gao, Z., et al.: A probabilistic misbehavior detectionscheme towards efficient trust establishment in delay-tolerant networks. IEEE Trans. Parallel Distrib. Syst. 99, 1–6 (2013)
Li, X.Y., Zhou, F., Du, J., et al.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensics Secur. (2012)
Chang, M.J., et al.: Trust-based intrusion detection in wireless sensor networks. In: 2011 IEEE International Conference on Communications (ICC), Kyoto, Japan, 6 Jan 2011
He, D., Chen, C., Chan, S., et al.: A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans. Inf Technol. Biomed. 16(6), 1164–1175 (2012)
Sun, B., Shan, X.M., Wu, K., et al.: Anomaly detection based secure in-network aggregation for wireless sensor networks. IEEE Syst. J. 7(1), 13–25 (2013)
Xiao, D.Q., Feng, J.Z., Zhou, Q., et al.: Gauss reputation framework for sensor networks. J. Commun. 29(3), 47–53 (2008)
Crosby, G.V., Hester, L., Pission, N.: Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks. Int. J. Netw. Secur. 12(2), 107–117 (2011)
Zhang, J., Shankaran, R., Orgun, M.A., et al.: A dynamic trust establishment and management framework for wireless sensor networks. In: 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), Hong Kong, China, pp. 484–491 (2010)
Lin, C., Tian, L.Q., Wang, Y.Z.: Research on user behavior trust in trustworthy network. J. Comput. Res. Dev. 45(12), 2033–2043 (2008)
Hu, X.D., Yu, P.Q., Wei, Q.F.: Detection of selective forwarding attacks in the Internet of Things. J. Chongqing Univ. Posts Telecommun. 24(2), 148–152 (2012)
Zhan, G., Shi, W., Deng, J.: Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans. Dependable Secur. Comput. 9(2), 184–197 (2012)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM Press (2003)
Golbeck, J.: Computing and Applying Trust in Web-Based Social NetWorks. University of Maryland, Maryland (2005)
Avesani, P., Massa, P., Tiella, R.: A trust-enhanced recommender system application: Moleskiing. In: Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 1589–1593 (2005)
Massa, P., Avesani, P.: Trust-aware recommender systems. In: Proceedings of the 2007 ACM Conference on Recommender Systems, Minneapolis, pp. 17–24 (2007)
Jamali, M., Ester, M.: Trustwalker: a random walk model for combining trust-based and item-based recommendation. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, pp. 397–406 (2009)
Walter, F.E., Battiston, S., Schweitzer, F.: A model of a trust-based recommendation system on a social network. Auton. Agents Multi-Agent Syst. 16(1), 57–74 (2008)
Bedi, P., Kaur, H., Marwaha, S.: Trust based recommender system for the semantic Web. In: Proceedings of the IJCAI 2007 (2007)
Ma, H., Yang, H., Lyu, M.R., King, I.: SoRec: social recommendation using probabilistic matrix factorization. In: Proceedings of the International Conference on Information and Knowledge Management, pp. 931–940. ACM Press (2008)
Ma, H., King, I., Lyu, M.R.: Learning to recommend with social trust ensemble. In: Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 203–210. ACM Press (2009)
Rghioui, A., L’aarje, A., Elouaai, F., Bouhorma, M.: The Internet of Things for healthcare monitoring: security review and proposed solution. In: Proceedings of the 2014 Third IEEE International Colloquium in Information Science and Technology (CIST), pp. 384–389 (2014)
Sarvabhatla, M., Giri, M., Vorugunti, C.S.: Cryptanalysis of a biometric-based user authentication mechanism for heterogeneous wireless sensor networks. In: Proceedings of the 2014 Seventh International Conference on Contemporary Computing (IC3), pp. 312–317 (2014)
Ntalianis, K., Tsapatsoulis, N.: Remote authentication via biometrics: a robust video-object steganographic mechanism over wireless networks. IEEE Trans. Emerg. Top. Comput. 4, 156–174 (2016)
Ren, Y., Bonkerche, A.: Performance analysis of trust-based node evaluation mechanisms in wireless and mobile ad hoc networks. In: Proceedings of the 2009 IEEE International Conference on Communications (ICC 2009), pp. 5535–5539 (2009)
Cai, S.B., Han, Q.L., Gao, Z.G., Yang, D.S., Zhao, J.: Research on cloud trust model for malicious node detection in wireless sensor network. J. Electron. 40(11), 2232–2238 (2012)
Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. (TOSN), 15–19 (2016)
Kamhoua, C., Pissinou, N., Maldd, K.: Game theoretic modeling and evolution of trust in autonomous multi-hop networks: application to network security and privacy. In: Proceedings of the 2011 IEEE International Conference on Communications (ICC 2011), pp. 1–6 (2011)
Jamali, M., Ester, M.: A matrix factorization technique with trust propagation for recommendation in social networks. In: Proceedings of the 4th ACM Conference on Recommender Systems, pp. 135–142 (2010)
Wang, D., Ma, J., Lian, T., Guo, L.: Recommendation based on weighted social trusts and item relationships. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, pp. 254–259. ACM Press (2014)
Acknowledgments
This work was supported by the National Natural Science Foundation of China The key trusted running technologies for the sensing nodes in Internet of things: 61501007, The research of the trusted and security environment for high energy physics scientific computing system: 11675199. General Project of science and technology project of Beijing Municipal Education Commission: KM201610005023.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, Y., Song, J., Lou, J. (2019). A Trusted Measurement Model for Mobile Internet. In: Zhang, H., Zhao, B., Yan, F. (eds) Trusted Computing and Information Security. CTCIS 2018. Communications in Computer and Information Science, vol 960. Springer, Singapore. https://doi.org/10.1007/978-981-13-5913-2_14
Download citation
DOI: https://doi.org/10.1007/978-981-13-5913-2_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5912-5
Online ISBN: 978-981-13-5913-2
eBook Packages: Computer ScienceComputer Science (R0)