Trust-Based IoT Participatory Sensing for Hazard Detection and Response

被引:0
|
作者
Guo, Jia [1 ]
Chen, Ing-Ray [1 ]
Tsai, Jeffrey J. P. [2 ]
Al-Hamadi, Hamid [3 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] Asia Univ, Taichung, Taiwan
[3] Kuwait Univ, Kuwait, Kuwait
关键词
Internet of Things; Trust; Participatory sensing; Cloud computing; MANAGEMENT; SYSTEMS;
D O I
10.1007/978-3-319-68136-8_7
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The physical world can be monitored by ubiquitous Internet of Things (IoT) devices through participatory sensing by which a huge amount of data is collected and analyzed in the cloud for hazard detection and response. In this paper, we propose a Trust as a Service (TaaS) cloud utility leveraging a cloud hierarchy for assessing service trustworthiness of IoT devices so as filter out untrustworthy sensing data before hazard detection and response are taken. We demonstrate that our TaaS utility achieves accuracy, convergence, and resiliency compared with contemporary IoT/P2P distributed trust protocols while achieving scalability to cope with a huge number of IoT devices. We demonstrate the feasibility with an air pollution detection and response application.
引用
收藏
页码:79 / 84
页数:6
相关论文
共 50 条
  • [31] Adaptive Threshold Selection for Trust-based Detection Systems
    Chae, Younghun
    Katenka, Natallia
    DiPippo, Lisa
    2016 IEEE 16TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2016, : 281 - 287
  • [32] Trust-based classifier combination for network anomaly detection
    Rehak, Martin
    Pechoucek, Michal
    Grill, Martin
    Bartos, Karel
    COOPERATIVE INFORMATION AGENTS XII, PROCEEDINGS, 2008, 5180 : 116 - +
  • [33] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [34] Trust-Based Anomaly Detection in Emerging Sensor Networks
    Wu, Renyong
    Deng, Xue
    Lu, Rongxing
    Shen, Xuemin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [35] Trust-based Voting Method for Efficient Malware Detection
    More, Shraddha S.
    Gaikwad, Pranit P.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 657 - 667
  • [36] Enhanced Trust-based Intrusion Detection System in MANET
    Hassan, Kr Lutful
    Mandal, J. K.
    Mondal, S.
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2019, 78 (08): : 509 - 512
  • [37] Trust-based secure routing in IoT network based on rider foraging optimization algorithm
    Vijay, Kore Amit
    Ranjan, Mishra Manoj
    JOURNAL OF HIGH SPEED NETWORKS, 2022, 28 (01) : 75 - 94
  • [38] TRUST-BASED MEDICINE
    Nemcekova, Maria
    HUMAN AFFAIRS-POSTDISCIPLINARY HUMANITIES & SOCIAL SCIENCES QUARTERLY, 2013, 23 (01): : 114 - 116
  • [39] Trust-Based Intrusion-Tolerant Coverage Reliability in Intelligent IoT Systems
    Xia, Yunzhi
    Tang, Xiao
    Yi, Lingzhi
    Yi, Yuanyuan
    Cheng, Minmin
    Deng, Xianjun
    Yang, Laurence T.
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (15): : 25637 - 25647
  • [40] Dynamic Trust-Based Device Legitimacy Assessment Towards Secure IoT Interactions
    Garagad, Vishwanath
    Iyer, Nalini
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2022, 18 (03) : 269 - 276