Skip to main content

A Trusted Measurement Model for Mobile Internet

  • Conference paper
  • First Online:
Trusted Computing and Information Security (CTCIS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 960))

Included in the following conference series:

  • 537 Accesses

Abstract

With the explosive development of the mobile Internet, the security threats faced by the mobile Internet have grown rapidly in recent years. Since the normal operation of the mobile Internet depends on the trust between nodes, the existing trusted measurement model cannot fully and dynamically evaluate mobile Internet computing nodes, and the trust transmission has a great deal of energy consumption. Aiming at above problems, this paper proposes a trusted measurement model combining static measurement and node behavior measurement. The model is based on the computing environment measurement of the mobile Internet computing node, and is also based on node behavior measurement, combining direct and recommended trust values to complete the measurement of nodes. It can more objectively reflect the trust degree of nodes, effectively detecting malicious nodes, and ensuring the normal operation of mobile Internet services. The simulation experiment results show that this method can effectively balance the subjectivity and objectivity of trust assessment, and can quickly avoid malicious nodes and reduce the energy consumption of the trust transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. CiscoVNI Mobile: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2013–2018 (2014)

    Google Scholar 

  2. Chen, F.: Research on quality of experience oriented resource management in Mobile Internet. Dissertation for Ph.D. Degree. University of Science and Technology of China, Hefei (2013)

    Google Scholar 

  3. Meeker, M.: 2014 Internet Trends (2014)

    Google Scholar 

  4. Ericsson.: Ericsson Traffic and Market Data Reports (2013)

    Google Scholar 

  5. Zhu, H., Du, S., Gao, Z., et al.: A probabilistic misbehavior detectionscheme towards efficient trust establishment in delay-tolerant networks. IEEE Trans. Parallel Distrib. Syst. 99, 1–6 (2013)

    Google Scholar 

  6. Li, X.Y., Zhou, F., Du, J., et al.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensics Secur. (2012)

    Google Scholar 

  7. Chang, M.J., et al.: Trust-based intrusion detection in wireless sensor networks. In: 2011 IEEE International Conference on Communications (ICC), Kyoto, Japan, 6 Jan 2011

    Google Scholar 

  8. He, D., Chen, C., Chan, S., et al.: A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans. Inf Technol. Biomed. 16(6), 1164–1175 (2012)

    Article  Google Scholar 

  9. Sun, B., Shan, X.M., Wu, K., et al.: Anomaly detection based secure in-network aggregation for wireless sensor networks. IEEE Syst. J. 7(1), 13–25 (2013)

    Article  Google Scholar 

  10. Xiao, D.Q., Feng, J.Z., Zhou, Q., et al.: Gauss reputation framework for sensor networks. J. Commun. 29(3), 47–53 (2008)

    Google Scholar 

  11. Crosby, G.V., Hester, L., Pission, N.: Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks. Int. J. Netw. Secur. 12(2), 107–117 (2011)

    Google Scholar 

  12. Zhang, J., Shankaran, R., Orgun, M.A., et al.: A dynamic trust establishment and management framework for wireless sensor networks. In: 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), Hong Kong, China, pp. 484–491 (2010)

    Google Scholar 

  13. Lin, C., Tian, L.Q., Wang, Y.Z.: Research on user behavior trust in trustworthy network. J. Comput. Res. Dev. 45(12), 2033–2043 (2008)

    Google Scholar 

  14. Hu, X.D., Yu, P.Q., Wei, Q.F.: Detection of selective forwarding attacks in the Internet of Things. J. Chongqing Univ. Posts Telecommun. 24(2), 148–152 (2012)

    Google Scholar 

  15. Zhan, G., Shi, W., Deng, J.: Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans. Dependable Secur. Comput. 9(2), 184–197 (2012)

    Article  Google Scholar 

  16. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM Press (2003)

    Google Scholar 

  17. Golbeck, J.: Computing and Applying Trust in Web-Based Social NetWorks. University of Maryland, Maryland (2005)

    Google Scholar 

  18. Avesani, P., Massa, P., Tiella, R.: A trust-enhanced recommender system application: Moleskiing. In: Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 1589–1593 (2005)

    Google Scholar 

  19. Massa, P., Avesani, P.: Trust-aware recommender systems. In: Proceedings of the 2007 ACM Conference on Recommender Systems, Minneapolis, pp. 17–24 (2007)

    Google Scholar 

  20. Jamali, M., Ester, M.: Trustwalker: a random walk model for combining trust-based and item-based recommendation. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, pp. 397–406 (2009)

    Google Scholar 

  21. Walter, F.E., Battiston, S., Schweitzer, F.: A model of a trust-based recommendation system on a social network. Auton. Agents Multi-Agent Syst. 16(1), 57–74 (2008)

    Article  Google Scholar 

  22. Bedi, P., Kaur, H., Marwaha, S.: Trust based recommender system for the semantic Web. In: Proceedings of the IJCAI 2007 (2007)

    Google Scholar 

  23. Ma, H., Yang, H., Lyu, M.R., King, I.: SoRec: social recommendation using probabilistic matrix factorization. In: Proceedings of the International Conference on Information and Knowledge Management, pp. 931–940. ACM Press (2008)

    Google Scholar 

  24. Ma, H., King, I., Lyu, M.R.: Learning to recommend with social trust ensemble. In: Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 203–210. ACM Press (2009)

    Google Scholar 

  25. Rghioui, A., L’aarje, A., Elouaai, F., Bouhorma, M.: The Internet of Things for healthcare monitoring: security review and proposed solution. In: Proceedings of the 2014 Third IEEE International Colloquium in Information Science and Technology (CIST), pp. 384–389 (2014)

    Google Scholar 

  26. Sarvabhatla, M., Giri, M., Vorugunti, C.S.: Cryptanalysis of a biometric-based user authentication mechanism for heterogeneous wireless sensor networks. In: Proceedings of the 2014 Seventh International Conference on Contemporary Computing (IC3), pp. 312–317 (2014)

    Google Scholar 

  27. Ntalianis, K., Tsapatsoulis, N.: Remote authentication via biometrics: a robust video-object steganographic mechanism over wireless networks. IEEE Trans. Emerg. Top. Comput. 4, 156–174 (2016)

    Article  Google Scholar 

  28. Ren, Y., Bonkerche, A.: Performance analysis of trust-based node evaluation mechanisms in wireless and mobile ad hoc networks. In: Proceedings of the 2009 IEEE International Conference on Communications (ICC 2009), pp. 5535–5539 (2009)

    Google Scholar 

  29. Cai, S.B., Han, Q.L., Gao, Z.G., Yang, D.S., Zhao, J.: Research on cloud trust model for malicious node detection in wireless sensor network. J. Electron. 40(11), 2232–2238 (2012)

    Google Scholar 

  30. Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. (TOSN), 15–19 (2016)

    Google Scholar 

  31. Kamhoua, C., Pissinou, N., Maldd, K.: Game theoretic modeling and evolution of trust in autonomous multi-hop networks: application to network security and privacy. In: Proceedings of the 2011 IEEE International Conference on Communications (ICC 2011), pp. 1–6 (2011)

    Google Scholar 

  32. Jamali, M., Ester, M.: A matrix factorization technique with trust propagation for recommendation in social networks. In: Proceedings of the 4th ACM Conference on Recommender Systems, pp. 135–142 (2010)

    Google Scholar 

  33. Wang, D., Ma, J., Lian, T., Guo, L.: Recommendation based on weighted social trusts and item relationships. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, pp. 254–259. ACM Press (2014)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China The key trusted running technologies for the sensing nodes in Internet of things: 61501007, The research of the trusted and security environment for high energy physics scientific computing system: 11675199. General Project of science and technology project of Beijing Municipal Education Commission: KM201610005023.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiantao Song .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Y., Song, J., Lou, J. (2019). A Trusted Measurement Model for Mobile Internet. In: Zhang, H., Zhao, B., Yan, F. (eds) Trusted Computing and Information Security. CTCIS 2018. Communications in Computer and Information Science, vol 960. Springer, Singapore. https://doi.org/10.1007/978-981-13-5913-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5913-2_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5912-5

  • Online ISBN: 978-981-13-5913-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics