Skip to main content

Secure Big Data Transmission with Trust Management for the Internet of Things (IoT)

  • Chapter
  • First Online:
Combating Security Challenges in the Age of Big Data

Abstract

Big data and Internet of Things (IoT) are the highly sought-after frameworks these days because IoT connects abundant amount of data which cannot be labeled and stored in the typical database system. Generating intelligent decisions from enormously increasing data in a real-time system is of major concern. Although big data seems to change our lives, it tries to make a burden in the computing environment due to the proliferation of data. In such a context, the efficient collection, processing, analyzing and secure storage are identified to be some of the crucial steps. The continuous flow of incoming data to the big data is the first and major challenge and this concern may play a key role in designing a viable and secure big data. In addition, the security issues can be even worse when the stored data include highly sensitive and confidential information. Therefore, if strong security measures are not applied in big data storage, it will cause some vital consequences. Trust management can be considered as a critical factor which operates seamlessly behind the scenes in IoT big data era to provide a reliable communication between devices. This chapter aims to disclose the trust management techniques prevailing in IoT with a special focus on big data technologies, and will outline the new developments and approaches that are applicable in these areas.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134

    Article  Google Scholar 

  2. Ahmed E et al (2017) The role of big data analytics in internet of things. Comput Netw 129:459–471

    Article  Google Scholar 

  3. Yuan J, Li X (2018) A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. IEEE Access 6(c):23626–23638

    Article  Google Scholar 

  4. Bashir AQ, Rizwan M, Gill (2016) Towards an IoT big data analytics framework : smart buildings systems. In: High performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS), pp 1325–1332

    Google Scholar 

  5. Ahmad A, Member S, Rathore MM, Member S, Paul A, Member S (2016) Defining human behaviors using big data analytics in social internet of things. In: Advanced information networking and applications (AINA), 2016 IEEE 30th international conference on

    Google Scholar 

  6. Ilapakurti A, Kedari S (2016) The role of big data in creating sense EHR, an integrated approach to create next generation mobile sensor and wearable data driven electronic health record. In: Big data computing service and applications (BigDataService), 2016 IEEE second international conference on

    Google Scholar 

  7. Arora D, Li KF, Loffler A (2016) Big data analytics for classification of network enabled devices. In: Advanced information networking and applications workshops (WAINA), 2016 30th international conference on, pp 708–713

    Google Scholar 

  8. Herwindra M, Tegar B, Rindang E, Buyung S, Wahana J, Luhung A (2016) Design and implementation of smart environment monitoring and analytics in real-time system framework based on internet of underwater things and big data. In: Electronics symposium (IES), 2016 international, pp 403–408

    Google Scholar 

  9. Ding Z, Gao X, Xu J, Wu H (2013) IOT-StatisticDB : a general statistical database cluster mechanism for big data analysis in the internet of things. In: Green computing and communications (GreenCom) IEEE and internet of things (iThings/CPSCom), IEEE international conference on and IEEE cyber, physical and social computing, pp 535–543

    Google Scholar 

  10. Lee CKM, Yeung CL, Cheng MN (2015) Research on IoT based cyber physical system for industrial big data analytics. In: Industrial engineering and engineering management (IEEM), IEEE international conference on, pp 1855–1859

    Google Scholar 

  11. Sezer OB, Dogdu E, Ozbayoglu M, Onal A (2016) An extended IoT framework with semantics, big data, and analytics

    Google Scholar 

  12. Wang H, Osen OL, Lit G, Lit W, Dai H, Zeng W (2015) Big data and industrial internet of things for the maritime industry in Northwestern Norway. In: TENCON 2015-2015 IEEE region 10 conference, pp 1–5

    Google Scholar 

  13. Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (1999) The role of trust management in distributed systems security In: Secure internet programming, pp 185–210

    Chapter  Google Scholar 

  14. Ben Abderrahim O (2017) TMCoI-SIOT : a trust management system based on communities of interest for the social internet of things, pp 747–752

    Google Scholar 

  15. Atzori L, Iera A, Morabito G (2011) SIoT: giving a social structure to the internet of things. IEEE Commun Lett 15(11):1193–1195

    Article  Google Scholar 

  16. Valarmathi AMKML (2017) Trust management in the social internet of things. Wirel Pers Commun 96(2):2681–2691

    Article  Google Scholar 

  17. Hasan R, Lee AJ, Yurcik W (2005) Toward a threat model for storage systems. In: Proceedings of the 2005 ACM workshop on storage security and survivability, pp 94–102

    Google Scholar 

  18. Ardagna CA, Damiani E, De Capitani S, Foresti S, Samarati P (2007) Trust management. In: Security, privacy, and trust in modern data management, pp 103–117

    Chapter  Google Scholar 

  19. Alshehri M, Hussain FK (2018) A centralized trust management mechanism for the internet of things (CTM-IoT). Int Conf Broadband Wirel Comput, Commun Appl 12(February):533–543

    Google Scholar 

  20. Nitti M, Girau R, Atzori L, Member S (2013) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26:1–14

    Google Scholar 

  21. Ben Y, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the internet of things : a context-aware and multi- service approach. Comput Secur 2013:1–15

    Google Scholar 

  22. Chen D, Chang G, Sun D, Li J, Jia J (2014) TRM-IoT : a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(October 2011):1207–1228

    Google Scholar 

  23. Chen I, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9:482–495

    Article  Google Scholar 

  24. Chen I, Triantis KP (2018) Trust-based service management of internet of things systems and its applications

    Google Scholar 

  25. Jayasinghe U, Otebolaku A, Um T, Lee GM (2017) Data centric trust evaluation and prediction framework for IOT. ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K) 2017(March):1–7

    Google Scholar 

  26. N. Networks (2012) ITU-T

    Google Scholar 

  27. Bao F, Chen I (2012) Dynamic trust management for internet of things applications, pp 1–6

    Google Scholar 

  28. Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: Wireless communications, vehicular technology, information theory and aerospace \& electronic systems (VITAE), 2013 3rd international conference on, pp 1–5

    Google Scholar 

  29. Javanmardi S, Shojafar M, Shariatmadari S, Ahrabi SS (2014) FR TRUST: a fuzzy reputation based model for trust management in semantic P2P grids. Int J Grid Util Comput 2:1–11

    Google Scholar 

  30. Jayasinghe U, Lee H, Lee GM (2015) A computational model to evaluate honesty in social internet of things

    Google Scholar 

  31. Singh K, Verma AK (2018) A fuzzy-based trust model for flying ad hoc networks (FANETs). Int J Commun Syst 31(6):e3517

    Article  Google Scholar 

  32. Bao F, Chen I (2012) Dynamic trust management for the internet of things applications, pp 1–30

    Google Scholar 

  33. Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. Wirel VITAE 2013:1–5

    Google Scholar 

  34. Bao F, Chen I, Chang M, Cho J (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Service Manag 9(2):169–183

    Article  Google Scholar 

  35. Alhadad N et al (2013) Graph-based trust model for evaluating trust using subjective logic to cite this version : HAL Id : hal-00871138 graph-based trust model for evaluating trust using subjective logic

    Google Scholar 

  36. Jayasinghe U, Member G, Lee GM, Member S, Um T (2018) Machine learning based trust computational model for IoT services. IEEE Trans Sustain Comput 3782(c):1–14

    Google Scholar 

  37. Jorge L (2015) Towards a generic trust management framework using a machine-learning-based trust model, pp 1343–1348

    Google Scholar 

  38. Mahmud M et al (2018) A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications. Cognit Comput 10:1–10

    Article  Google Scholar 

  39. Caminha J, Perkusich A, Perkusich M (2018) A smart trust management method to detect on-off attacks in the internet of things. Security Commun Netw 2018:1–10

    Article  Google Scholar 

  40. Deng S, Huang L, Xu G (2016) On deep learning for trust-aware recommendations in social networks. IEEE Trans Neural Netw Learn Syst 28:1–14

    Article  Google Scholar 

  41. A. Engineering (2010) TrustWalker: a RandomWalk model for combining trust-based and item-based recommendation Mohsen. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, no. 1990, pp 397–406

    Google Scholar 

  42. Baras JS (2009) Graph algebraic interpretation of trust establishment in autonomic networks. Prepr. Wiley J. Networks

    Google Scholar 

  43. Garmsiri S, Hamzeh A (2015) New graph based trust similarity measure. Ciência e Nat 37(December):339–343

    Article  Google Scholar 

  44. George G, Thampi SM (2018) A graph-based security framework for securing industrial IoT networks from vulnerability exploitations. IEEE Access 6(September):43586–43601

    Article  Google Scholar 

  45. Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proc. twelfth Int. Conf. World Wide Web – WWW ’03, p 640

    Google Scholar 

  46. Khan ZA, Ullrich J, Herrmann P (2017) A trust-based resilient routing mechanism for the internet of things

    Google Scholar 

  47. Nizamkari NS (2017) A graph-based trust-enhanced recommender system for service selection in IOT. In: Inventive systems and control (ICISC), 2017 international conference on, pp 1–5

    Google Scholar 

  48. Li L, Cai W, Liang L, Fan L (2010) Design and analysis of Bayesian game in role based trust management. In: Information theory and information security (ICITIS), 2010 IEEE international conference on, pp 394–398

    Google Scholar 

  49. Feng R, Che S, Wang X, Wan J (2014) An incentive mechanism based on game theory for trust management. Security Commun Netw March:2318–2325

    Article  Google Scholar 

  50. Lim H, Ghinita G, Bertino E, Kantarcioglu M (2012) A game-theoretic approach for high-assurance of data trustworthiness in sensor networks

    Google Scholar 

  51. Fang H, Xu L, Huang X (2015) Self-adaptive trust management based on game theory in fuzzy large-scale networks. Soft Comput 21:907–921

    Article  MATH  Google Scholar 

  52. Xu G, Xu C, Tian X (2012) PSO-TPS : an optimal trust path selection algorithm based on particle swarm optimization in small world network, pp 12–16

    Google Scholar 

  53. Huang W, Deng Z, Li R, Tang X (2013) Trust-based particle swarm optimization for grid task scheduling. Appl Mech Mater 240:1331–1335

    Google Scholar 

  54. Eray U, Sen S, Burak A (2015) GenTrust : a genetic trust management model for peer-to-peer systems. Appl Soft Comput 34:693–704

    Article  Google Scholar 

  55. Vijayarangan S, Suresh S, Megalai J (2016) Genetic algorithm based an optimized trust based traffic analyzer for wireless sensor networks to detect malicious activities. Middle-East J Sci Res 24:41–47. https://doi.org/10.20894/IJCNES.103.005.001.010

    Article  Google Scholar 

  56. Sanadhya S, Singh S (2015) Trust calculation with ant colony optimization in online social Networks. Proc Comput Sci 54:186–195

    Article  Google Scholar 

  57. Sun M, Shi Z, Chen S, Zhou Z, Duan Y (2017) Energy-efficient composition of configurable internet of things services. IEEE Access 99:25609–25622

    Article  Google Scholar 

  58. Gómez Mármol F, Martínez Pérez G, Gómez Skarmeta AF (2009) TACS, a trust model for P2P networks. Wirel Pers Commun 51(1):153–164

    Article  Google Scholar 

  59. Bao F, Chen I, Tech V (2012) Trust management for the internet of things and its application to service composition. In: World of wireless, mobile and multimedia networks (WoWMoM), 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)

    Google Scholar 

  60. Wu G, Liu Z, Yao L, Xu Z, Wang W (2013) A fuzzy-based trust management in WSNs. J Internet Serv Inf … 2:124–135

    Google Scholar 

  61. Wang Y (2011) A probabilistic approach for maintaining trust based on evidence. J Artif Intell Res 40:221–267

    Article  MATH  Google Scholar 

  62. Jøsang A (2002) The Beta reputation system. In: Proceedings of the 15th bled electronic commerce conference, pp 1–14

    Google Scholar 

  63. Ganeriwal S, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. Reputation-based Framew high Integr Sens networks 4:15

    Google Scholar 

  64. Sun Z, Zhang Z, Xiao C, Qu G (2017) D-S evidence theory based trust ant colony routing in WSN. China Commun 6:27–41

    Google Scholar 

  65. Che S, Feng R, Liang X, Wang X (2015) A lightweight trust management based on Bayesian and Entropy for wireless sensor networks. Scurity Commun Netw 2014:168–175

    Article  Google Scholar 

  66. Qiu X, Zhang L, Wang S, Qian G (2010) A trust transitivity model based-on Dempster-Shafer theory. JNW 5(9):1025–1032

    Article  Google Scholar 

  67. Feng R, Xu X, Zhou X, Wan J (2011) A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory. Sensors 11(2):1345–1360

    Article  Google Scholar 

  68. Di Pietro R, Salleras X, Signorini M, Waisbard E (2018) A blockchain-based trust system for the internet of things In: Proc. 23nd ACM Symp. Access Control Model. Technol. – SACMAT ’18, pp 77–83

    Google Scholar 

  69. Di Pietro R, Salleras X, Signorini M, Waisbard E (2018) A blockchain-based trust system for the internet of things. Proc ACM Symp Access Control Model Technol SACMAT Part F1371:77–83

    Article  Google Scholar 

  70. Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: a decentralized Blockchain-based authentication system for IoT. Comput Secur 78:126–142

    Article  Google Scholar 

  71. Zyskind G, Pentland AS (2015) Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops, pp 180–184

    Google Scholar 

  72. Song JC, Demir MA, Prevost JJ, Rad P (2018) Blockchain design for trusted decentralized IoT networks In: 2018 13th Syst. Syst. Eng. Conf. SoSE 2018, pp 169–174

    Google Scholar 

  73. Huang Z, Su X, Zhang Y, Shi C, Zhang H, Xie L (2018) A decentralized solution for IoT data trusted exchange based-on blockchain. In: 2017 3rd IEEE Int. Conf. Comput. Commun. ICCC 2017, vol 2018–Janua, pp 1180–1184

    Google Scholar 

  74. Li J, Bai Y, Zaman N, Leung VCM (2017) A decentralized trustworthy context and QoS-aware service discovery framework for the internet of things. IEEE Access 5:19154–19166

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sabu M. Thampi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Fabi, A.K., Thampi, S.M. (2020). Secure Big Data Transmission with Trust Management for the Internet of Things (IoT). In: Fadlullah, Z., Khan Pathan, AS. (eds) Combating Security Challenges in the Age of Big Data. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-35642-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-35642-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-35641-5

  • Online ISBN: 978-3-030-35642-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics