Trust-Based IoT Participatory Sensing for Hazard Detection and Response

  • Jia Guo
  • Ing-Ray Chen
  • Jeffrey J. P. Tsai
  • Hamid Al-Hamadi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10380)


The physical world can be monitored by ubiquitous Internet of Things (IoT) devices through participatory sensing by which a huge amount of data is collected and analyzed in the cloud for hazard detection and response. In this paper, we propose a Trust as a Service (TaaS) cloud utility leveraging a cloud hierarchy for assessing service trustworthiness of IoT devices so as filter out untrustworthy sensing data before hazard detection and response are taken. We demonstrate that our TaaS utility achieves accuracy, convergence, and resiliency compared with contemporary IoT/P2P distributed trust protocols while achieving scalability to cope with a huge number of IoT devices. We demonstrate the feasibility with an air pollution detection and response application.


Internet of Things Trust Participatory sensing Cloud computing 


  1. 1.
    Khan, W.Z., Xiang, Y., Aalsalem, M.Y., Arshad, Q.: Mobile phone sensing systems: a survey. IEEE Commun. Surv. Tutorials 15, 402–427 (2013)Google Scholar
  2. 2.
    Devarakonda, S., et al.: Real-time air quality monitoring through mobile sensing in metropolitan areas. In: UrbComp, Chicago, Illinois, USA (2013)Google Scholar
  3. 3.
    Mousa, H., et al.: Trust management and reputations systems in mobile participatory sensing applications: a survey. Comput. Netw., 90, 49–73 (2015)Google Scholar
  4. 4.
    Amintoosi, H., Kanhere, S.S., Allahbakhsh, M.: Trust-based privacy-aware participant selection in social participatory sensing. J. Inform. Secur. Appl. 20, 11–25 (2015)Google Scholar
  5. 5.
    Jøsang, A., Ismail, R.: The beta reputation system. In: Bled Electronic Commerce Conference, Bled, Slovenia, pp. 1–14 (2002)Google Scholar
  6. 6.
    Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: 12th International Conference on World Wide Web, Budapest, Hungary (2003)Google Scholar
  7. 7.
    Xiong, L., Liu, L.: PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16, 843–857 (2004)Google Scholar
  8. 8.
    Su, Z., Liu, L., Li, M., Fan, X., Zhou, Y.: ServiceTrust: trust management in service provision networks. In: IEEE International Conference on Services Computing, Santa Clara, pp. 272–279 (2013)Google Scholar
  9. 9.
    Chen, I.R., Guo, J., Bao, F.: Trust Management for SOA-based IoT and its application to service composition. IEEE Trans. Serv. Comput. 9, 482–495 (2016)Google Scholar
  10. 10.
    Chen, I.R., Guo, J., Tsai, J.J.P., Al-Hamadi, H.: A hierarchical cloud architecture for integrated mobility, service, and trust management of service-oriented IoT systems. In: 6th IEEE International Conference on Innovative Computing Technology, Dublin, Ireland (2016)Google Scholar
  11. 11.
    Chen, I.R., Chen, T.M., Lee, C.: Performance evaluation of forwarding strategies for location management in mobile networks. Comput. J. 41, 243–253 (1998)Google Scholar
  12. 12.
    Chen, I.R., Verma, N.: Simulation study of a class of autonomous host-centric mobility prediction algorithms for wireless cellular and ad hoc networks. In: 36th Annual Symposium Simulation (2003)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Jia Guo
    • 1
  • Ing-Ray Chen
    • 1
  • Jeffrey J. P. Tsai
    • 2
  • Hamid Al-Hamadi
    • 3
  1. 1.Virginia TechBlacksburgUSA
  2. 2.Asia UniversityTaichungTaiwan
  3. 3.Kuwait UniversityKuwait CityKuwait

Personalised recommendations