Skip to main content

Effective Centralized Trust Management Model for Internet of Things

  • Conference paper
  • First Online:
Intelligent Data Engineering and Automated Learning – IDEAL 2018 (IDEAL 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11314))

  • 2329 Accesses

Abstract

The emergence of the Internet of Things (IoT) is a result of convergence between multiple technologies, like Internet, wireless communication, embedded systems, microelectronic systems and nanotechnology. In 2016, 5.5 million objects are connected every day in the world. A number that could quickly reach billions by 2020 [1]. Gartner predicts that 26 billion objects will be installed in 2020. The market for connected objects could range from a few tens of billions to up to several thousand billion units. Among the vital components of IoT, we find wireless sensor networks (WSNs). Wireless sensor networks as a vital component of the IoT, allow the representation of dynamic characteristics of the real world in the virtual world of the Internet. Nevertheless, the opening of these types of network to the Internet presents a serious problem stand point security. For that, the implementation of intrusion detection mechanisms is essential to limit the internal and external attacks that threaten the smooth running of the network. In this paper, we propose an efficient trust management model which seeks deeply through the nodes to detect attacks that threaten wireless sensor networks. Our model includes a geographical localization system used to identify the nodes location. Although, it includes a set of rules detection attacks based on different parameter analysis. Furthermore, we propose a mathematical model for trust establishment and its update on the network. During the simulations we observe an improvement of the efficiency of the implemented geo-location model and also a reasonable energy consumption. Similarly, we have been able to evince the efficiency of our model in terms of attacks detection rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Insecurity of connected objects: “how to combine IoT and security”. Net Journal. Accessed 4 May 2016

    Google Scholar 

  2. Steinberg, J.: Contributor on cybersecurity and entrepreneurship, “these devices may be spying on you”. Net Journal, 27 January 2014

    Google Scholar 

  3. Kaune, R., Hörst, J., Koch, W.: Accuracy analysis for TDOA localization in sensor networks. In: Information Fusion. IEEE (2011)

    Google Scholar 

  4. Jøsang, A., Ismail, R.: The beta reputation system. In: The 15th Bled Electronic Commerce Conference, Bled, Slovenia (2002)

    Google Scholar 

  5. Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based frame work for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on Security of Adhoc and Sensor Networks (2004)

    Google Scholar 

  6. Han, G., Jiang, J., Shu, L., Niu, J., Chao, H.C.: Management and applications of trust in wireless sensor networks: a survey. J. Comput. Syst. Sci. (2013)

    Google Scholar 

  7. Rodrigo, R., Carmen, F., Javier, L., Hwa, C.: Trust and reputation systems for wireless sensor networks. Secur. Priv. Mob. Wirel. Netw. (2009)

    Google Scholar 

  8. Yao, Z., Kimand, D., Doh, Y.: PLUS: parameterized and localized trust management scheme for sensor networks security. In: International Conference on Mobile Adhoc and Sensor Systems. IEEE (2008)

    Google Scholar 

  9. Sedjelmaci, H., Senouci, S.M., Feham, M.: An efficient intrusion detection framework in cluster-based wireless sensor networks. Secur. Commun. J. 6(10), 1211–1224 (2013)

    Google Scholar 

  10. Sedjelmaci, H., Senouci, S.M.: Efficient and lightweight intrusion detection based on nodes behaviors in wireless sensor networks. In: Global Information Infrastructure Symposium. IEEE (2013)

    Google Scholar 

  11. Maddar, H., Kammoun, W., Cheikhrouhou, O., Youssef, H.: Lightweight trust model with high longevity for wireless sensor networks. In: International Conference on Information Systems Security and Privacy. Springer, Heidelberg (2016)

    Google Scholar 

  12. Maddar, H., Kammoun, W., Youssef, H.: Trust intrusion detection system based on location for wireless sensor network. In: Madureira, A.M., Abraham, A., Gamboa, D., Novais, P. (eds.) ISDA 2016. AISC, vol. 557, pp. 831–840. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-53480-0_82

    Chapter  Google Scholar 

  13. Sajjada, S.M., Boukb, S.H., Yousaf, M.: Neighbor node trust based intrusion detection system for WSN. In: 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN. Elsevier (2015)

    Google Scholar 

  14. Alsaedia, N., Hashima, F., et al.: Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS). Comput. Commun. J. 110, 75–82 (2017)

    Article  Google Scholar 

  15. Jin, X., Liang, J., et al.: Multi-agent trust-based intrusion detection scheme for wireless sensor networks. Comput. Electr. Eng. 59, 262–273 (2017)

    Article  Google Scholar 

  16. Tandel, R.I.: Leach protocol in wireless sensor network: a survey. (IJCSIT) Int. J. Comput. Sci. Inf. Technol. 7(4), 1894–1896 (2016)

    Google Scholar 

  17. Maddar, H., Kammoun, W., Youssef, H.: Cloudlets architecture for wireless sensor network. In: Madureira, A.M., Abraham, A., Gamboa, D., Novais, P. (eds.) ISDA 2016. AISC, vol. 557, pp. 852–862. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-53480-0_84

    Chapter  Google Scholar 

  18. Stetsko, A., Folkman, L., Matyayas, V.: Neighbor-based intrusion detection for wireless sensor networks. In: International Conference on Wireless and Mobile Communications, Los Alamitos, CA, USA, pp. 420–425 (2010)

    Google Scholar 

  19. Liu, F., Cheng, X., Chen, D.: Insider attacker detection in wireless sensor networks. In: Proceedings of IEEE INFOCOM, pp. 1937–1945 (2007)

    Google Scholar 

  20. Li, G., He, J., Fu, Y.: A group-based intrusion detection scheme in wireless sensor networks. In: Proceedings of GPS - Workshops, pp. 286–291. IEEE (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Hela Maddar , Wafa Kammoun or Habib Youssef .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maddar, H., Kammoun, W., Youssef, H. (2018). Effective Centralized Trust Management Model for Internet of Things. In: Yin, H., Camacho, D., Novais, P., Tallón-Ballesteros, A. (eds) Intelligent Data Engineering and Automated Learning – IDEAL 2018. IDEAL 2018. Lecture Notes in Computer Science(), vol 11314. Springer, Cham. https://doi.org/10.1007/978-3-030-03493-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03493-1_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03492-4

  • Online ISBN: 978-3-030-03493-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics