Back to Search Start Over

Trust2Vec: Large-Scale IoT Trust Management System based on Signed Network Embeddings

Authors :
Dhelim, Sahraoui
Aung, Nyothiri
Kechadi, Tahar
Ning, Huansheng
Chen, Liming
Lakas, Abderrahmane
Source :
IEEE Internet of Things Journal (2022). https://ieeexplore.ieee.org/document/9866814
Publication Year :
2022

Abstract

A trust management system (TMS) is an integral component of any IoT network. A reliable trust management system must guarantee the network security, data integrity, and act as a referee that promotes legitimate devices, and punishes any malicious activities. Trust scores assigned by TMSs reflect devices' reputations, which can help predict the future behaviours of network entities and subsequently judge the reliability of different network entities in IoT networks. Many TMSs have been proposed in the literature, these systems are designed for small-scale trust attacks, and can deal with attacks where a malicious device tries to undermine TMS by spreading fake trust reports. However, these systems are prone to large-scale trust attacks. To address this problem, in this paper, we propose a TMS for large-scale IoT systems called Trust2Vec, which can manage trust relationships in large-scale IoT systems and can mitigate large-scale trust attacks that are performed by hundreds of malicious devices. Trust2Vec leverages a random-walk network exploration algorithm that navigates the trust relationship among devices and computes trust network embeddings, which enables it to analyze the latent network structure of trust relationships, even if there is no direct trust rating between two malicious devices. To detect large-scale attacks, suck as self-promoting and bad-mouthing, we propose a network embeddings community detection algorithm that detects and blocks communities of malicious nodes. The effectiveness of Trust2Vec is validated through large-scale IoT network simulation. The results show that Trust2Vec can achieve up to 94\% mitigation rate in various network scenarios.<br />Comment: \c{opyright} 20XX IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

Details

Database :
arXiv
Journal :
IEEE Internet of Things Journal (2022). https://ieeexplore.ieee.org/document/9866814
Publication Type :
Report
Accession number :
edsarx.2204.06988
Document Type :
Working Paper
Full Text :
https://doi.org/10.1109/JIOT.2022.3201772