A multi-dimensional trust attestation solution in 5G-IoT

Li Xiangrong , Zhang Yu , Zhu Haotian , Wang Yubo , Huang Junjia

›› 2025, Vol. 11 ›› Issue (1) : 225 -233.

PDF
›› 2025, Vol. 11 ›› Issue (1) : 225 -233. DOI: 10.1016/j.dcan.2023.10.003
Original article

A multi-dimensional trust attestation solution in 5G-IoT

Author information +
History +
PDF

Abstract

The core missions of IoT are to sense data, transmit data and give feedback to the real world based on the calculation of the sensed data. The trust of sensing source data and transmission network is extremely important to IoT security. 5G-IoT with its low latency, wide connectivity and high-speed transmission extends the business scenarios of IoT, yet it also brings new challenges to trust proof solutions of IoT. Currently, there is a lack of efficient and reliable trust proof solutions for massive dynamically connected nodes, while the existing solutions have high computational complexity and can't adapt to time-sensitive services in 5G-IoT scenarios. In order to solve the above problems, this paper proposes an adaptive multi-dimensional trust proof solution. Firstly, the static and dynamic attributes of sensing nodes are metricized, and the historical interaction as well as the recommendation information are combined with the comprehensive metric of sensing nodes, and a multi-dimensional fine-grained trusted metric model is established in this paper. Then, based on the comprehensive metrics, the sensing nodes are logically grouped and assigned with service levels to achieve the screening and isolation of malicious nodes. At the same time, the proposed solution reduces the energy consumption of the metric process and optimizes the impact of real-time metrics on the interaction latency. Simulation experiments show that the solution can accurately and efficiently identify malicious nodes and effectively guarantee the safe and trustworthy operation of 5G-IoT nodes, while having a small impact on the latency of the 5G network.

Keywords

5G-IoT / Trusted metrics / Trust model

Cite this article

Download citation ▾
Li Xiangrong, Zhang Yu, Zhu Haotian, Wang Yubo, Huang Junjia. A multi-dimensional trust attestation solution in 5G-IoT. , 2025, 11(1): 225-233 DOI:10.1016/j.dcan.2023.10.003

登录浏览全文

4963

注册一个新账户 忘记密码

Declaration of Competing Interest

The authors declared that they have no conflicts of interest to this work.

Acknowledgements

This work is supported by National Key R&D Program of China (2019YFB2102303), National Natural Science Foundation of China (NSFC61971014, NSFC11675199), Beijing Postdoctoral Research Foundation (2021-ZZ-079), Young Backbone Teacher Training Program of Henan Colleges and Universities (2021GGJS170) and Henan Province Higher Education Key Research Project (23B520014).

References

[1]

D. Georgakopoulos, P.P. Jayaraman, Internet of things: from Internet scale sensing to smart services, Computing 98 (10) (2016) 1041-1058.

[2]

A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, Internet of things: a survey on enabling technologies, protocols, and applications, IEEE Com-mun. Surv. Tutor. 17 (4) (2015) 2347-2376.

[3]

K. Shafique, B.A. Khawaja, F. Sabir, S. Qazi, M. Mustaqim,Internet of things (IoT) for next-generation smart systems: a review of current challenges, future trends and prospects for emerging 5G-IoT scenarios, IEEE Access 8 (2020) 23022-23040.

[4]

H.L. Nguyen, O.-J. Lee, J.E. Jung, J. Park, T.-W. Um, H.-W. Lee, Event-driven trust refreshment on ambient services, IEEE Access 5 (2017) 4664-4670.

[5]

Z. Lin, L. Dong, Clarifying trust in social Internet of things, IEEE Trans. Knowl. Data Eng. 30 (2) (2017) 234-248.

[6]

A. Meena Kowshalya, M. Valarmathi, Trust management for reliable decision mak-ing among social objects in the social Internet of things, IET Netw. 6 (4) (2017) 75-80.

[7]

F. Bao, R. Chen, J. Guo, Scalable, adaptive and survivable trust management for community of interest based Internet of things systems, in: 2013 IEEE Eleventh In-ternational Symposium on Autonomous Decentralized Systems, ISADS, IEEE, 2013, pp. 1-7.

[8]

A. Mohsenzadeh, H. Motameni, M.J. Er, Retraction note to: a new trust evaluation algorithm between cloud entities based on fuzzy mathematics, Int. J. Fuzzy Syst. 6 (21) (2019) 1988.

[9]

J. Jiang, G. Han, F. Wang, L. Shu, M. Guizani, An efficient distributed trust model for wireless sensor networks, IEEE Trans. Parallel Distrib. Syst. 26 (5) (2014) 1228-1237.

[10]

S. Ben Saad, A. Ksentini, B. Brik, An end-to-end trusted architecture for network slicing in 5G and beyond networks, IEEE Secur. Priv. 5 (1) (2022) e186.

[11]

C. Suraci, S. Pizzi, D. Garompolo, G. Araniti, A. Molinaro, A. Iera, Trusted and secured d2d-aided communications in 5G networks, Ad Hoc Netw. 114 (2021) 102403.

[12]

Y. Ouyang, Z. Zeng, X. Li, T. Wang, X. Liu, A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks, Comput. Stand. Interfaces 77 (2021) 103519.

[13]

S. Pourmohseni, M. Ashtiani, A.A. Azirani, A computational trust model for social IoT based on interval neutrosophic numbers, Inf. Sci. 607 (8) (2022) 758-782.

[14]

W. Ma, X. Wang, M. Hu, Q. Zhou, Machine learning empowered trust evaluation method for IoT devices, IEEE Access 9 (2021) 65066-65077.

[15]

A. Mohan, D. Bhanu Bhaskara, Multi-dimensional trust aware routing for clustered IoT framework, Int. J. Eng. Technol. 7 (4.20) ( 2018) 15-21.

[16]

S. Chinnaswamy, K. Annapurani, Trust aggregation authentication protocol using machine learning for IoT wireless sensor networks, Comput. Electr. Eng. 91 (2021) 107130.

[17]

G. Rathee, R. Sandhu, H. Saini, M. Sivaram, V. Dhasarathan, A trust computed framework for IoT devices and fog computing environment, Wirel. Netw. 26 (4) (2020) 2339-2351.

[18]

J.M.J. Valero, P.M.S. Sánchez, M.G. Pérez, A.H. Celdrán, G.M. Pérez, Toward pre-standardization of reputation-based trust models beyond 5G, Comput. Stand. Inter-faces 81 (2022) 103596.

[19]

T. Le, S. Shetty, Artificial intelligence-aided privacy preserving trustworthy com-putation and communication in 5G-based IoT networks, Ad Hoc Netw. 126 (2022) 102752.

[20]

J. Shi, L. Liu, X. Yu, H. Lu, A collaborative service resource evaluation model based on trust network, EURASIP J. Wirel. Commun. Netw. 2021 (1) (2021) 1-15.

[21]

Q. Pan, J. Wu, J. Li, W. Yang, Z. Guan, Blockchain and AI empowered trust-information-centric network for beyond 5G, IEEE Netw. 34 (6) (2020) 38-45.

[22]

Y. Alghofaili, M.A. Rassam, A trust management model for IoT devices and ser-vices based on the multi-criteria decision-making approach and deep long short-term memory technique, Sensors 22 (2) (2022) 634.

[23]

N. Narang, S. Kar, A hybrid trust management framework for a multi-service social IoT network, Comput. Commun. 171 (2021) 61-79.

[24]

M. Mahmud, M.S. Kaiser, M.M. Rahman, M.A. Rahman, A. Shabut, S. Al-Mamun, A. Hussain, A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications, Cogn. Comput. 10 (5) (2018) 864-873.

[25]

S. Mon, S.G. Winster, R. Ramesh, Trust model for IoT using cluster analysis: a cen-tralized approach, Wirel. Pers. Commun. (2021) 1-22.

[26]

R. Du, C. Liu, F. Liu, Trust authorization monitoring model in IoT, Int. J. Perform. Eng. 14 (3) (2018) 453.

[27]

L. Zhang, B. Cao, Y. Li, M. Peng, G. Feng, A multi-stage stochastic programming-based offloading policy for fog enabled IoT-ehealth, IEEE J. Sel. Areas Commun. 39 (2) (2020) 411-425.

[28]

M. Cao, L. Zhang, B. Cao, Toward on-device federated learning: a direct acyclic graph-based blockchain approach, IEEE Trans. Neural Netw. Learn. Syst. 34 (4) (2021) 2028-2042.

[29]

B. Cao, Z. Zhang, D. Feng, S. Zhang, L. Zhang, M. Peng, Y. Li, Performance analysis and comparison of pow, pos and dag based blockchains, Digit. Commun. Netw. 6 (4) (2020) 480-485.

AI Summary AI Mindmap
PDF

204

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/