Trustworthiness Management in the Social Internet of Things

Slides:



Advertisements
Similar presentations
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Advertisements

1 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions.
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Michel Nitti, Roberto Girau, Alessandro Floris, Luigi Atzori
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Experience with an Object Reputation System for Peer-to-Peer File Sharing NSDI’06(3th USENIX Symposium on Networked Systems Design & Implementation) Kevin.
A S URVEY OF TRUST MANAGEMENT AND ITS APPLICATIONS S UPERVISED BY : D R. Y AN W ANG Ravendra Singh Student-id:
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
Object Naming & Content based Object Search 2/3/2003.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
P2P Over MANET An Introduction to Mobile Resource Sharing.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Trustworthiness Management in the Social Internet of Things
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
UOS 1 Ontology Based Personalized Search Zhang Tao The University of Seoul.
The EigenTrust Algorithm for Reputation Management in P2P Networks
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
SIoT: Giving a Social Structure to the Internet of Things
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
An Ontological Framework for Web Service Processes By Claus Pahl and Ronan Barrett.
National Institute of Advanced Industrial Science and Technology Query Processing for Distributed RDF Databases Using a Three-dimensional Hash Index Akiyoshi.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
A NOVEL PREFETCHING METHOD FOR SCENE-BASED MOBILE SOCIAL NETWORK SERVICE 作者 :Song Li, Wendong Wang, Yidong Cui, Kun Yu, Hao Wang 報告者 : 饒展榕.
The EigenTrust Algorithm for Reputation Management in P2P Networks
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Peer to Peer Network Design Discovery and Routing algorithms
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Introduction to Active Directory
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar Mario T.Schlosser Hector Garcia-Molina.
Social Networks and Peer to Peer As Presented by Jeremy Robinson 3/22/2007.
SECURE MANET ROUTING WITH TRUST INTRIGUE Prepared By: Aditya Kiran R.S Mangipudi Srikanth Gadde Varun Mannar.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
A NOVEL PREFETCHING METHOD FOR SCENE- BASED MOBILE SOCIAL NETWORK SERVICE 作者 :SONG LI, WENDONG WANG, YIDONG CUI, KUN YU, HAO WANG 報告者 : 饒展榕.
Presented by Edith Ngai MPhil Term 3 Presentation
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
Nuno Salta Supervisor: Manuel Ricardo Supervisor: Ricardo Morla
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Pastry Scalable, decentralized object locations and routing for large p2p systems.
The Beta Reputation System
CHAPTER 3 Architectures for Distributed Systems
Deanonymization of Clients in Bitcoin P2P Network
Dieudo Mulamba November 2017
Seminar On Computer Networks
EE 122: Peer-to-Peer (P2P) Networks
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
Paraskevi Raftopoulou, Euripides G.M. Petrakis
by Xiang Mao and Qin Chen
IPFS: Interplanetary File Systems
Korea University of Technology and Education
A Semantic Peer-to-Peer Overlay for Web Services Discovery
Kostas Kolomvatsos, Christos Anagnostopoulos
Outline Introduction Background Distributed DBMS Architecture
Presentation transcript:

Trustworthiness Management in the Social Internet of Things Michele Nitti, Roberto Girau, and Luigi Atzori

Outline Introduction Background The Proposed Solution Trust Models Basic Trust Elements Subjective and Objective Models Subjective Trustworthiness Objective Trustworthiness Experimental Evaluation Conclusion

Social IoTs and Trust Management Integrate the social network concepts into the Internet of things Use social networking elements in the Internet of things to allow objects to autonomously establish social relationships. The goal is to understand how the objects in the SIoTs process the information and build a reliable system based on the behaviors of objects. Object relationships: Parental object relationships co-location and co-work object relationships Ownership object relationships Social object relationships

Social IoTs and Trust Management Four major components of Social IoT architecture: Relationship management service discovery service composition trustworthiness management The major contribution of this work: Define the problem of trustworthiness management in the SIoT. Define two models for trustworthiness management (subjective and objective) starting from the solutions proposed for social networks and P2P. Evaluation of the benefits of the trustworthiness management in the IoT.

State of the Art in P2P Networks Trust Management To calculate the peer trustworthiness, the system has to store the reputation information.

State of the Art in Social Networks Trust Management Transitivity: It is based on the concept of recommendation of someone that is not directly known. A trusts B, B trusts C, then A trusts C. Composability: Compose the recommendations from different friends into a unique value and then decide whether to trust someone or not. Personalization: Trust is related to a person’s past experience. Asymmetric: Two people tied a relationship may have different levels of trustworthiness to each other.

Notation and Problem Definition Node 𝒫= 𝑝 1 , 𝑝 2 …, 𝑝 𝑀 Service providers Service requesters Components: 𝒩 1 ={ 𝑝 2 , 𝑝 3 , 𝑝 4 } 𝒦 1,4 ={ 𝑝 2 , 𝑝 3 } Service discovery 𝒵 5 ={ 𝑝 10 } ℛ 1,5 ={ 𝑝 1 𝑝 4 , 𝑝 4 𝑝 8 , 𝑝 8 𝑝 5 }

Subjective Trustworthiness From social point of view. Each node calculate the trustworthiness of its neighbors based on its experience and that of its friends. If two nodes are not friends, the trustworthiness is calculated by word of mouth through a chain of friends. Transitivity: All the objects in the SIoT try to achieve the same goal. Composability: Combine the recommendations from 𝒦 𝑖,𝑗 . Personalization and Asymmetry: personal experience and opinion.

Objective Trustworthiness From P2P scenarios. The information of each node is distributed and stored by a Distributed Hash Table (DHT) structure. The information is visible to every node but is only managed by special nodes, named Pre-trusted objects. The experience of each node is shared with the entire network, so there is no transitivity, personalization, and asymmetry. Composability: Combine the past works, concepts of weighted feedback and credibility to estimate trust values.

Basic Trust Elements Feedback system 𝑓 𝑖𝑗 𝑙 Total number of transactions 𝑁 𝑖𝑗 Credibility 𝐶 𝑖𝑗 Transaction factor 𝜔 𝑖𝑗 𝑙 Relationship factor 𝐹 𝑖𝑗 Notion of centrality 𝑅 𝑖𝑗 Computation capability 𝐼 𝑗

Subjective Trustworthiness Assume 𝑝 𝑖 and 𝑝 𝑗 are adjacent nodes: 𝑇 𝑖𝑗 = 1−𝛼−𝛽 𝑅 𝑖𝑗 +𝛼 𝑂 𝑖𝑗 𝑑𝑖𝑟 +𝛽 𝑂 𝑖𝑗 𝑖𝑛𝑑 The centrality of 𝑝 𝑗 with respect to 𝑝 𝑖 : 𝑅 𝑖𝑗 = 𝒦 𝑖𝑗 /( 𝒩 𝑖 −1) When 𝑝 𝑖 needs the trustworthiness of 𝑝 𝑗 , it checks the last direct transactions and determines its own opinion: 𝑂 𝑖𝑗 𝑑𝑖𝑟 = log 𝑁 𝑖𝑗 +1 1+ log 𝑁 𝑖𝑗 +1 𝛾 𝑂 𝑖𝑗 𝑙𝑜𝑛 + 1−𝛾 𝑂 𝑖𝑗 𝑟𝑒𝑐 + 1 1+ log 𝑁 𝑖𝑗 +1 (𝛿 𝐹 𝑖𝑗 +(1−𝛿)(1− 𝐼 𝑗 )) Feedback system 𝑓 𝑖𝑗 𝑙 Total number of transactions 𝑁 𝑖𝑗 Credibility 𝐶 𝑖𝑗 Transaction factor 𝜔 𝑖𝑗 𝑙 Relationship factor 𝐹 𝑖𝑗 Notion of centrality 𝑅 𝑖𝑗 Computation capability 𝐼 𝑗

Subjective Trustworthiness The long and short-term opinions: 𝑂 𝑖𝑗 𝑙𝑜𝑛 = 𝑙=1 𝐿 𝑙𝑜𝑛 𝜔 𝑖𝑗 𝑙 𝑓 𝑖𝑗 𝑙 𝑙=1 𝐿 𝑙𝑜𝑛 𝜔 𝑖𝑗 𝑙 𝑂 𝑖𝑗 𝑟𝑒𝑐 = 𝑙=1 𝐿 𝑟𝑒𝑐 𝜔 𝑖𝑗 𝑙 𝑓 𝑖𝑗 𝑙 𝑙=1 𝐿 𝑟𝑒𝑐 𝜔 𝑖𝑗 𝑙 The indirect opinion 𝑂 𝑖𝑗 𝑖𝑛𝑑 = 𝑘=1 𝒦 𝑖𝑗 ( 𝐶 𝑖𝑘 𝑂 𝑘𝑗 𝑑𝑖𝑟 ) / 𝑘=1 𝒦 𝑖𝑗 𝐶 𝑖𝑘 The credibility value: 𝐶 𝑖𝑘 =𝜂 𝑂 𝑖𝑘 𝑑𝑖𝑟 + 1−𝜂 𝑅 𝑖𝑘 Feedback system 𝑓 𝑖𝑗 𝑙 Total number of transactions 𝑁 𝑖𝑗 Credibility 𝐶 𝑖𝑗 Transaction factor 𝜔 𝑖𝑗 𝑙 Relationship factor 𝐹 𝑖𝑗 Notion of centrality 𝑅 𝑖𝑗 Computation capability 𝐼 𝑗

Subjective Trustworthiness Assume 𝑝 𝑖 and 𝑝 𝑗 are not adjacent (not linked by a direct social relationship): 𝑇 𝑖𝑗 ′ = 𝑎,𝑏: 𝑝 𝑖𝑗 𝑎 𝑝 𝑖𝑗 𝑏 ∈ ℛ 𝑖𝑗 𝑇 𝑎𝑏 The feedback generated by 𝑝 𝑖 is stored locally and used for future trust evaluations: 𝑓 𝑖𝑘 𝑙 = 𝑓 𝑖𝑗 𝑙 𝑖𝑓 𝑂 𝑘𝑗 𝑑𝑖𝑟 ≥0.5 1− 𝑓 𝑖𝑗 𝑙 𝑖𝑓 𝑂 𝑘𝑗 𝑑𝑖𝑟 <0.5 Feedback system 𝑓 𝑖𝑗 𝑙 Total number of transactions 𝑁 𝑖𝑗 Credibility 𝐶 𝑖𝑗 Transaction factor 𝜔 𝑖𝑗 𝑙 Relationship factor 𝐹 𝑖𝑗 Notion of centrality 𝑅 𝑖𝑗 Computation capability 𝐼 𝑗

Subjective Trustworthiness

Objective Trustworthiness The values used to compute the trustworthiness are stored in Distributed Harsh Table (DHT) (CAN, Chord, Pastry). A DHT system is based on an abstract key space. Each node is responsible for a set of keys. An overlay network connects the nodes, allowing them to find the owner of any given key in the key space. To store a file with a given filename and data, a key for the filename is generated through a hash function and the data and the key are sent to the node responsible for that key. If a node wants retrieve the data, it first generates the key from the filename and then sends to the DHT a request for the node that holds the data with that key. In this paper, every node can query the DHT to retrieve the trustworthiness value of every other node in the network.

Objective Trustworthiness The trustworthiness: 𝑇 𝑗 = 1−𝛼−𝛽 𝑅 𝑗 +𝛼 𝑂 𝑗 𝑙𝑜𝑛 +𝛽 𝑂 𝑗 𝑟𝑒𝑐 Centrality: 𝑅 𝑗 = 𝐴 𝑗 + 𝐻 𝑗 𝑄 𝑗 + 𝐴 𝑗 + 𝐻 𝑗 The short and long term opinions: 𝑂 𝑗 𝑙𝑜𝑛 = 𝑖=1 𝑀 𝑙=1 𝐿 𝑙𝑜𝑛 𝐶 𝑖𝑗 𝜔 𝑖𝑗 𝑙 𝑓 𝑖𝑗 𝑙 / 𝑖=1 𝑀 𝑙=1 𝐿 𝑙𝑜𝑛 𝐶 𝑖𝑗 𝜔 𝑖𝑗 𝑙 𝑂 𝑗 𝑟𝑒𝑐 = 𝑖=1 𝑀 𝑙=1 𝐿 𝑟𝑒𝑐 𝐶 𝑖𝑗 𝜔 𝑖𝑗 𝑙 𝑓 𝑖𝑗 𝑙 / 𝑖=1 𝑀 𝑙=1 𝐿 𝑟𝑒𝑐 𝐶 𝑖𝑗 𝜔 𝑖𝑗 𝑙 Feedback system 𝑓 𝑖𝑗 𝑙 Total number of transactions 𝑁 𝑖𝑗 Credibility 𝐶 𝑖𝑗 Transaction factor 𝜔 𝑖𝑗 𝑙 Relationship factor 𝐹 𝑖𝑗 Notion of centrality 𝑅 𝑖𝑗 Computation capability 𝐼 𝑗

Objective Trustworthiness The credibility: 𝐶 𝑖𝑗 = 1−𝛾−𝛿 𝑇 𝑖 +𝛾 1− 𝐹 𝑖𝑗 +𝛿(1− 𝐼 𝑗 ) 1+ log ( 𝑁 𝑖𝑗 +1) Feedback system 𝑓 𝑖𝑗 𝑙 Total number of transactions 𝑁 𝑖𝑗 Credibility 𝐶 𝑖𝑗 Transaction factor 𝜔 𝑖𝑗 𝑙 Relationship factor 𝐹 𝑖𝑗 Notion of centrality 𝑅 𝑖𝑗 Computation capability 𝐼 𝑗

Experimental Evaluation Data: Synthetic data: generated by mobility model called Small World In Motion (SWIM). Real dataset of the location-based online social network Brightlite. Two different behaviors considered in a social network: social nodes and malicious nodes.

Malicious Node Behavior

Parameter Setting Transaction success rate when the system has reached the steady- state using the SWIM data.

Transaction Success Rate

Transaction Success Rate

Dynamic Behavior

Dynamic Behavior

Conclusion This paper focuses on the trustworthiness management in the social IoT by proposing subjective and objective approaches. Subjective approach: Slower transitory response, especially when dealing with nodes with dynamic behaviors. Immune to behaviors typical of social networks Objective approach: Suffers from behavior of social networks, since a node’s trustworthiness is global for the entire network Including both the opinion from malicious nodes and social nodes.

Thanks