LTEM: Lightweight Trust Evaluation Model in IoT Environment

Authors

  • Somya Abdulkarim Alhandi Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, 86400, Batu Pahat, Johor, Malaysia.
  • Hazalila Kamaludin Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, 86400, Batu Pahat, Johor, Malaysia.
  • Nayef Abdulwahab Mohammed Alduais Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, 86400, Batu Pahat, Johor, Malaysia.
  • Noor Zuraidin Mohd Safar Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, 86400, Batu Pahat, Johor, Malaysia.
  • Salama A. Mostafa Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, 86400, Batu Pahat, Johor, Malaysia.

DOI:

https://doi.org/10.48161/qaj.v4n2a537

Abstract

In the domain of the Internet of Things (IoT), data reliability is important, particularly within critical sectors like healthcare, environmental surveillance, and smart grids. Nevertheless, data transfer from the physical domain to the digital layer is susceptible to trust-related challenges encompassing data integrity, genuineness, and credibility. Predominantly, prevailing models for trust assessment primarily concentrate on the conduct of nodes, thus disregarding the direct evaluation of data packets. This particular constraint results in an insufficient validation of data credibility, thereby failing to consider pivotal elements like timeliness and accuracy. Furthermore, utilizing cloud-based packet evaluation frameworks frequently leads to inaccuracies, unreliability, and energy inefficiencies owing to the transfer of untrusted data. The current study introduces a streamlined trust assessment framework called the lightweight trust evaluation model (LTEM), custom-built for IoT settings to combat these obstacles. LTEM meticulously examines node behavior and data packets via a multi-tiered approach encompassing nodes, cluster heads (CH), and base stations (BS). Moreover, the proposed model's architecture considers energy usage by averting the transmission of untrusted data. Simulation results showcase the supremacy of LTEM compared to existing models by achieving a detection rate of 99% for untrusted data packets, outperforming the detection rates ranging from 30% to 75% observed in other models. Moreover, LTEM enhances the operational efficiency of sensor nodes regarding energy consumption, achieving an average energy utilization of 1.33J out of 4J, resulting in savings of approximately 2.67J on average, thereby extending the lifespan of nodes.

Downloads

Download data is not yet available.

References

Alghofaili, Y., & Rassam, M. A. (2023). A Dynamic Trust-Related Attack Detection Model for IoT Devices and Services Based on the Deep Long Short-Term Memory Technique. Sensors, 23(8), 3814.

Zheng, G., Gong, B., & Zhang, Y. (2021). Dynamic network security mechanism based on trust management in wireless sensor networks. Wireless Communications and Mobile Computing, 2021(1), 6667100.

Alghofaili, Y., & Rassam, M. A. (2022). A trust management model for IoT devices and services based on the multi-criteria decision-making approach and deep long short-term memory technique. Sensors, 22(2), 634.

Lakhan, A., Mohammed, M. A., Zebari, D. A., Abdulkareem, K. H., Deveci, M., Marhoon, H. A., ... & Martinek, R. (2024). Augmented iot cooperative vehicular framework based on distributed deep blockchain networks. IEEE Internet of Things Journal.

Talbi, S., & Bouabdallah, A. (2020). Interest-based trust management scheme for social internet of things. Journal of Ambient Intelligence and Humanized Computing, 11(3), 1129-1140.

Elkhodr, M., & Alsinglawi, B. (2020). Data provenance and trust establishment in the Internet of Things. Security and Privacy, 3(3), e99.

Abdulrahman, S. M., Hani, A. A., Zeebaree, S. R., Asaad, R. R., Majeed, D. A., Sallow, A. B., & Ahmad, H. B. (2024). INTELLIGENT HOME IOT DEVICES: AN EXPLORATION OF MACHINE LEARNING-BASED NETWORKED TRAFFIC INVESTIGATION. Jurnal Ilmiah Ilmu Terapan Universitas Jambi, 8(1), 1-10.

Abou-Nassar, E. M., Iliyasu, A. M., El-Kafrawy, P. M., Song, O. Y., Bashir, A. K., & Abd El-Latif, A. A. (2020). DITrust chain: towards blockchain-based trust models for sustainable healthcare IoT systems. IEEE access, 8, 111223-111238.

Ahmed, A. I. A., Ab Hamid, S. H., Gani, A., & Khan, M. K. (2019). Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges. Journal of Network and Computer Applications, 145, 102409.

Alduais, N. A. M., Abdullah, J., & Jamil, A. (2019). RDCM: An efficient real-time data collection model for IoT/WSN edge with multivariate sensors. IEEE Access, 7, 89063-89082.

Mohammed, Z. K., Mohammed, M. A., Abdulkareem, K. H., Zebari, D. A., Lakhan, A., Marhoon, H. A., ... & Martinek, R. (2024). A metaverse framework for IoT-based remote patient monitoring and virtual consultations using AES-256 encryption. Applied Soft Computing, 158, 111588.

Rizwanullah, M., Singh, S., Kumar, R., Alrayes, F. S., Alharbi, A., Alnfiai, M. M., ... & Agrawal, A. (2022). Development of a model for trust management in the social internet of things. Electronics, 12(1), 41.

Chen, R., & Guo, J. (2014, May). Dynamic hierarchical trust management of mobile groups and its application to misbehaving node detection. In 2014 IEEE 28th international conference on advanced information networking and applications (pp. 49-56). IEEE.

Awan, K. A., Din, I. U., Zareei, M., Talha, M., Guizani, M., & Jadoon, S. U. (2019). Holitrust-a holistic cross-domain trust management mechanism for service-centric Internet of Things. Ieee Access, 7, 52191-52201.

Lingda, K., Feng, Z., Yingjie, Z., Nan, Q., Dashuai, L., & Shaotang, C. (2021, February). Evaluation method of trust degree of distribution IoT terminal equipment based on information entropy. In Journal of Physics: Conference Series (Vol. 1754, No. 1, p. 012108). IOP Publishing.

Yu, Y., Jia, Z., Tao, W., Xue, B., & Lee, C. (2017). An efficient trust evaluation scheme for node behavior detection in the internet of things. Wireless Personal Communications, 93, 571-587.

Zhang, W., Zhu, S., Tang, J., & Xiong, N. (2018). A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks. The Journal of Supercomputing, 74, 1779-1801.

Ahmed, A., Bakar, K. A., Channa, M. I., Haseeb, K., & Khan, A. W. (2015). TERP: A trust and energy aware routing protocol for wireless sensor network. IEEE Sensors Journal, 15(12), 6962-6972.

Mon, S. F. A., Winster, S. G., & Ramesh, R. (2022). Trust model for IoT using cluster analysis: A centralized approach. Wireless Personal Communications, 127(1), 715-736.

Kowshalya, A. M., & Valarmathi, M. L. (2017). Trust management in the social internet of things. Wireless Personal Communications, 96, 2681-2691.

Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H. C. (2014). Management and applications of trust in Wireless Sensor Networks: A survey. Journal of Computer and System Sciences, 80(3), 602-617.

Chen, Z., Tian, L., & Lin, C. (2017). Trust model of wireless sensor networks and its application in data fusion. Sensors, 17(4), 703.

Ye, Z., Wen, T., Liu, Z., Song, X., & Fu, C. (2017). An efficient dynamic trust evaluation model for wireless sensor networks. Journal of Sensors, 2017(1), 7864671.

Jiang, J., Han, G., Wang, F., Shu, L., & Guizani, M. (2014). An efficient distributed trust model for wireless sensor networks. IEEE transactions on parallel and distributed systems, 26(5), 1228-1237.

Yin, X., & Li, S. (2019). Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2019, 1-10.

MOhammed Alduais, N. A. (2019). An efficient real-time data collection model for multivariate sensors in internet of things (IOT) applications (Doctoral dissertation, Universiti Tun Hussein Onn Malaysia).

Alqarni, A., Alabdulhafith, M., & Sampalli, S. (2014). A proposed RFID authentication protocol based on two stages of authentication. Procedia Computer Science, 37, 503-510.

Mubarak, M. F., & Yahya, S. (2011, March). A critical review on RFID system towards security, trust, and privacy (STP). In 2011 IEEE 7th International Colloquium on Signal Processing and its Applications (pp. 39-44). IEEE.

Ferrari, P., Flammini, A., Sisinni, E., Rinaldi, S., Brandão, D., & Rocha, M. S. (2018). Delay estimation of industrial IoT applications based on messaging protocols. IEEE Transactions on Instrumentation and Measurement, 67(9), 2188-2199.

Feng, R., Che, S., Wang, X., & Yu, N. (2013). Trust management scheme based on DS evidence theory for wireless sensor networks. International Journal of Distributed Sensor Networks, 9(6), 948641.

Ferrari, P., Flammini, A., Sisinni, E., Rinaldi, S., Brandão, D., & Rocha, M. S. (2018). Delay estimation of industrial IoT applications based on messaging protocols. IEEE Transactions on Instrumentation and Measurement, 67(9), 2188-2199.

Feng, R., Xu, X., Zhou, X., & Wan, J. (2011). A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory. Sensors, 11(2), 1345-1360.

Ali, B. A., Abdulsalam, H. M., & AlGhemlas, A. (2018). Trust based scheme for IoT enabled wireless sensor networks. Wireless Personal Communications, 99, 1061-1080.

Bouguera, T., Diouris, J. F., Chaillout, J. J., Jaouadi, R., & Andrieux, G. (2018). Energy consumption model for sensor nodes based on LoRa and LoRaWAN. Sensors, 18(7), 2104.

Alduais, N. A. M., Abdullah, J., Jamil, A., Audah, L., & Alias, R. (2017, March). Sensor node data validation techniques for realtime IoT/WSN application. In 2017 14th International Multi-Conference on Systems, Signals & Devices (SSD) (pp. 760-765). IEEE.

Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE transactions on information forensics and security, 8(6), 924-93

Published

2024-06-30

How to Cite

Abdulkarim Alhandi , S. ., Kamaludin , H. ., Abdulwahab Mohammed Alduais , N. ., Zuraidin Mohd Safar , N. ., & A. Mostafa , S. . (2024). LTEM: Lightweight Trust Evaluation Model in IoT Environment. Qubahan Academic Journal, 4(2), 477–497. https://doi.org/10.48161/qaj.v4n2a537

Issue

Section

Articles