Download presentation
Presentation is loading. Please wait.
Published byMerry Blake Modified over 6 years ago
1
Trustworthiness Management in the Social Internet of Things
Michele Nitti, Roberto Girau, and Luigi Atzori
2
Outline Introduction Background The Proposed Solution Trust Models
Basic Trust Elements Subjective and Objective Models Subjective Trustworthiness Objective Trustworthiness Experimental Evaluation Conclusion
3
Social IoTs and Trust Management
Integrate the social network concepts into the Internet of things Use social networking elements in the Internet of things to allow objects to autonomously establish social relationships. The goal is to understand how the objects in the SIoTs process the information and build a reliable system based on the behaviors of objects. Object relationships: Parental object relationships co-location and co-work object relationships Ownership object relationships Social object relationships
4
Social IoTs and Trust Management
Four major components of Social IoT architecture: Relationship management service discovery service composition trustworthiness management The major contribution of this work: Define the problem of trustworthiness management in the SIoT. Define two models for trustworthiness management (subjective and objective) starting from the solutions proposed for social networks and P2P. Evaluation of the benefits of the trustworthiness management in the IoT.
5
State of the Art in P2P Networks Trust Management
To calculate the peer trustworthiness, the system has to store the reputation information.
6
State of the Art in Social Networks Trust Management
Transitivity: It is based on the concept of recommendation of someone that is not directly known. A trusts B, B trusts C, then A trusts C. Composability: Compose the recommendations from different friends into a unique value and then decide whether to trust someone or not. Personalization: Trust is related to a personβs past experience. Asymmetric: Two people tied a relationship may have different levels of trustworthiness to each other.
7
Notation and Problem Definition
Node π«= π 1 , π 2 β¦, π π Service providers Service requesters Components: π© 1 ={ π 2 , π 3 , π 4 } π¦ 1,4 ={ π 2 , π 3 } Service discovery π΅ 5 ={ π 10 } β 1,5 ={ π 1 π 4 , π 4 π 8 , π 8 π 5 }
8
Subjective Trustworthiness
From social point of view. Each node calculate the trustworthiness of its neighbors based on its experience and that of its friends. If two nodes are not friends, the trustworthiness is calculated by word of mouth through a chain of friends. Transitivity: All the objects in the SIoT try to achieve the same goal. Composability: Combine the recommendations from π¦ π,π . Personalization and Asymmetry: personal experience and opinion.
9
Objective Trustworthiness
From P2P scenarios. The information of each node is distributed and stored by a Distributed Hash Table (DHT) structure. The information is visible to every node but is only managed by special nodes, named Pre-trusted objects. The experience of each node is shared with the entire network, so there is no transitivity, personalization, and asymmetry. Composability: Combine the past works, concepts of weighted feedback and credibility to estimate trust values.
10
Basic Trust Elements Feedback system π ππ π
Total number of transactions π ππ Credibility πΆ ππ Transaction factor π ππ π Relationship factor πΉ ππ Notion of centrality π
ππ Computation capability πΌ π
11
Subjective Trustworthiness
Assume π π and π π are adjacent nodes: π ππ = 1βπΌβπ½ π
ππ +πΌ π ππ πππ +π½ π ππ πππ The centrality of π π with respect to π π : π
ππ = π¦ ππ /( π© π β1) When π π needs the trustworthiness of π π , it checks the last direct transactions and determines its own opinion: π ππ πππ = log π ππ log π ππ πΎ π ππ πππ + 1βπΎ π ππ πππ log π ππ (πΏ πΉ ππ +(1βπΏ)(1β πΌ π )) Feedback system π ππ π Total number of transactions π ππ Credibility πΆ ππ Transaction factor π ππ π Relationship factor πΉ ππ Notion of centrality π
ππ Computation capability πΌ π
12
Subjective Trustworthiness
The long and short-term opinions: π ππ πππ = π=1 πΏ πππ π ππ π π ππ π π=1 πΏ πππ π ππ π π ππ πππ = π=1 πΏ πππ π ππ π π ππ π π=1 πΏ πππ π ππ π The indirect opinion π ππ πππ = π=1 π¦ ππ ( πΆ ππ π ππ πππ ) / π=1 π¦ ππ πΆ ππ The credibility value: πΆ ππ =π π ππ πππ + 1βπ π
ππ Feedback system π ππ π Total number of transactions π ππ Credibility πΆ ππ Transaction factor π ππ π Relationship factor πΉ ππ Notion of centrality π
ππ Computation capability πΌ π
13
Subjective Trustworthiness
Assume π π and π π are not adjacent (not linked by a direct social relationship): π ππ β² = π,π: π ππ π π ππ π β β ππ π ππ The feedback generated by π π is stored locally and used for future trust evaluations: π ππ π = π ππ π ππ π ππ πππ β₯0.5 1β π ππ π ππ π ππ πππ <0.5 Feedback system π ππ π Total number of transactions π ππ Credibility πΆ ππ Transaction factor π ππ π Relationship factor πΉ ππ Notion of centrality π
ππ Computation capability πΌ π
14
Subjective Trustworthiness
15
Objective Trustworthiness
The values used to compute the trustworthiness are stored in Distributed Harsh Table (DHT) (CAN, Chord, Pastry). A DHT system is based on an abstract key space. Each node is responsible for a set of keys. An overlay network connects the nodes, allowing them to find the owner of any given key in the key space. To store a file with a given filename and data, a key for the filename is generated through a hash function and the data and the key are sent to the node responsible for that key. If a node wants retrieve the data, it first generates the key from the filename and then sends to the DHT a request for the node that holds the data with that key. In this paper, every node can query the DHT to retrieve the trustworthiness value of every other node in the network.
16
Objective Trustworthiness
The trustworthiness: π π = 1βπΌβπ½ π
π +πΌ π π πππ +π½ π π πππ Centrality: π
π = π΄ π + π» π π π + π΄ π + π» π The short and long term opinions: π π πππ = π=1 π π=1 πΏ πππ πΆ ππ π ππ π π ππ π / π=1 π π=1 πΏ πππ πΆ ππ π ππ π π π πππ = π=1 π π=1 πΏ πππ πΆ ππ π ππ π π ππ π / π=1 π π=1 πΏ πππ πΆ ππ π ππ π Feedback system π ππ π Total number of transactions π ππ Credibility πΆ ππ Transaction factor π ππ π Relationship factor πΉ ππ Notion of centrality π
ππ Computation capability πΌ π
17
Objective Trustworthiness
The credibility: πΆ ππ = 1βπΎβπΏ π π +πΎ 1β πΉ ππ +πΏ(1β πΌ π ) 1+ log ( π ππ +1) Feedback system π ππ π Total number of transactions π ππ Credibility πΆ ππ Transaction factor π ππ π Relationship factor πΉ ππ Notion of centrality π
ππ Computation capability πΌ π
18
Experimental Evaluation
Data: Synthetic data: generated by mobility model called Small World In Motion (SWIM). Real dataset of the location-based online social network Brightlite. Two different behaviors considered in a social network: social nodes and malicious nodes.
19
Malicious Node Behavior
20
Parameter Setting Transaction success rate when the system has reached the steady- state using the SWIM data.
21
Transaction Success Rate
22
Transaction Success Rate
23
Dynamic Behavior
24
Dynamic Behavior
25
Conclusion This paper focuses on the trustworthiness management in the social IoT by proposing subjective and objective approaches. Subjective approach: Slower transitory response, especially when dealing with nodes with dynamic behaviors. Immune to behaviors typical of social networks Objective approach: Suffers from behavior of social networks, since a nodeβs trustworthiness is global for the entire network Including both the opinion from malicious nodes and social nodes.
26
Thanks
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.