4.7 Article

A novel multidimensional trust evaluation and fusion mechanism in fog-based Internet of Things

Journal

COMPUTER NETWORKS
Volume 217, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.comnet.2022.109354

Keywords

Internet of things; Fog computing; Trust management; Information fusion

Funding

  1. National Natural Science Founda-tion of China
  2. [61761007]

Ask authors/readers for more resources

In this paper, a novel trust management approach is proposed to address the lack of trust between IoT edge devices and the network. The approach includes a multidimensional trust evaluation mechanism and a trust fusion scheme. The results show that the proposed approach has high computation efficiency, scalability, resilience, and robustness, and outperforms other methods in reliability. It also effectively defends against various cyber attacks, reflecting its high security.
With the fast advancement of IoT, it has gained more attention from industry and academia. However, because diverse security attacks result in the lack of trust between IoT edge devices and the network, a proper trust mechanism is necessary. To address the issue, a novel trust management approach is proposed in this work. In particular, we have proposed a multidimensional trust evaluation mechanism to comprehensively evaluate the trustworthiness of IoT edge devices, with diverse opinions formed by different network entities after observing. Next, a novel trust fusion scheme named JSDM-AHP that integrates the objective Jensen-Shannon divergence measure (JSDM) and analytic hierarchy process (AHP) is developed to fuse diverse decision factors. Theoretical analysis and simulation results show that the proposed trust strategy has high computation -efficiency, scalability, resilience, robustness, and outperforms all the other compered methods in reliability. Furthermore, with the proposed security approach, diverse cyber attacks such as flooding attacks, random attacks, conflicting behavior attacks, on-off attacks, and recommendation attacks can well be defended against, reflecting the high security of the method.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available