IEEE/CAA Journal of Automatica Sinica
Citation: | Giancarlo Fortino, Fabrizio Messina, Domenico Rosaci and Giuseppe M. L. Sarnè, "ResIoT: An IoT Social Framework Resilient to Malicious Activities," IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1263-1278, Sept. 2020. doi: 10.1109/JAS.2020.1003330 |
[1] |
K. Ashton, “That ‘internet of things’ thing,” RFID Journal, vol. 7, no. 7, pp. 97–114, 2009.
|
[2] |
G. Fortino, W. Russo, C. Savaglio, W. M. Shen, and M. C. Zhou, “Agent-oriented cooperative smart objects: From IoT system design to implementation,” IEEE Trans. Syst.,Man,Cybern.:Syst., vol. 48, no. 11, pp. 1939–1956, Nov. 2018. doi: 10.1109/TSMC.2017.2780618
|
[3] |
M. Barcelo, A. Correa, J. Llorca, A. M. Tulino, J. L. Vicario, and A. Morell, “IoT-cloud service optimization in next generation smart environments,” IEEE J. Sel. Areas Commun., vol. 34, no. 12, pp. 4077–4090, Dec. 2016. doi: 10.1109/JSAC.2016.2621398
|
[4] |
G. Fortino, F. Messina, D. Rosaci, and G. M. L. Sarné, “Using trust and local reputation for group formation in the cloud of things,” Future Gen. Comput. Syst., vol. 89, pp. 804–815, Dec. 2018. doi: 10.1016/j.future.2018.07.021
|
[5] |
G. Kortuem, F. Kawsar, V. Sundramoorthy, and D. Fitton, “Smart objects as building blocks for the internet of things,” IEEE Internet Comput., vol. 14, no. 1, pp. 44–51, Jan.–Feb. 2010. doi: 10.1109/MIC.2009.143
|
[6] |
Y. Kim, S. Lee, and I. Chong, “Orchestration in distributed web-of-objects for creation of user-centered IoT service capability,” Wirel. Pers. Commun., vol. 78, no. 4, pp. 1965–1980, Oct. 2014. doi: 10.1007/s11277-014-2056-9
|
[7] |
Z. Y. Wen, R. Y. Yang, P. Garraghan, T. Lin, J. Xu, and M. Rovatsos, “Fog orchestration for internet of things services,” IEEE Internet Comput., vol. 21, no. 2, pp. 16–24, Mar.–Apr. 2017. doi: 10.1109/MIC.2017.36
|
[8] |
G. Fortino, R. Gravina, W. Russo, and C. Savaglio, “Modeling and simulating internet-of-things systems: A hybrid agent-oriented approach,” Comput. Sci. Eng., vol. 19, no. 5, pp. 68–76, Sept. 2017. doi: 10.1109/MCSE.2017.3421541
|
[9] |
D. Calvaresi, M. Marinoni, A. Sturm, M. Schumacher, and G. Buttazzo, “The challenge of real-time multi-agent systems for enabling IoT and CPS,” in Proc. Int. Conf. Web Intelligence, Leipzig, Germany, 2017, pp. 356–364.
|
[10] |
M. Hamzei and N. J. Navimipour, “Toward efficient service composition techniques in the internet of things,” IEEE Internet Things J., vol. 5, no. 5, pp. 3774–3787, Oct. 2018. doi: 10.1109/JIOT.2018.2861742
|
[11] |
B. Anggorojati, P. N. Mahalle, N. R. Prasad, and R. Prasad, “Capability-based access control delegation model on the federated IoT network,” in Proc. 15th Int. Symp. Wireless Personal Multimedia Communications, Taipei, China, 2012, pp. 604–608.
|
[12] |
L. Cui, F. P. Tso, and W. J. Jia, “Federated service chaining: Architecture and challenges,” IEEE Commun. Mag., vol. 58, no. 3, pp. 47–53, Mar. 2020. doi: 10.1109/MCOM.001.1900627
|
[13] |
T. Leppänen, J. Riekki, M. R. Liu, E. Harjula, and T. Ojala, “Mobile agents-based smart objects for the internet of things,” in Internet of Things Based on Smart Objects, G. Fortino and P. Trunfio, Eds. Cham, Switzerland: Springer, 2014, pp. 29–48.
|
[14] |
H. B. Zhu and M. C. Zhou, “Role-based collaboration and its kernel mechanisms,” IEEE Trans. Syst.,Man,Cybern.,Part C (Appl. Rev.)
|
[15] |
P. De Meo, F. Messina, M. N. Postorino, D. Rosaci, and G. M. L. Sarné, “A reputation framework to share resources into IoT-based environments,” in Proc. IEEE 14th Int. Conf. Networking, Sensing and Control, Calabria, Italy, 2017, pp. 513–518.
|
[16] |
M. S. Roopa, S. Pattar, R. Buyya, K. R. Venugopal, S. S. Iyengar, and L. M. Patnaik, “Social internet of things (SIoT): Foundations, thrust areas, systematic review and future directions,” Comput. Commun., vol. 139, pp. 32–57, May 2019. doi: 10.1016/j.comcom.2019.03.009
|
[17] |
W. J. Li, J. Y. Wu, Q. F. Zhang, K. Y. Hu, and J. Li, “Trust-driven and QoS demand clustering analysis based cloud workflow scheduling strategies,” Cluster Comput., vol. 17, no. 3, pp. 1013–1030, Sept. 2014. doi: 10.1007/s10586-013-0340-1
|
[18] |
M. Trnka, J. Svacina, T. Cerny, E. Song, J. M. Hong, and M. Bures, “Securing internet of things devices using the network context,” IEEE Trans. Ind. Inform., vol. 16, no. 6, pp. 4017–4027, Jun. 2020. doi: 10.1109/TII.2019.2954100
|
[19] |
H. H. Chang and S. S. Chuang, “Social capital and individual motivations on knowledge sharing: Participant involvement as a moderator,” Inf. Manag., vol. 48, no. 1, pp. 9–18, Jan. 2011. doi: 10.1016/j.im.2010.11.001
|
[20] |
C. M. Chiu, M. H. Hsu, and E. T. G. Wang, “Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories,” Decis. Support Syst., vol. 42, no. 3, pp. 1872–1888, Dec. 2006. doi: 10.1016/j.dss.2006.04.001
|
[21] |
J. Doodson, J. Gavin, and R. Joiner, “Getting acquainted with groups and individuals: Information seeking, social uncertainty and social network sites,” in Proc. 7th Int. AAAI Conf. Weblogs and Social Media, Boston, USA, 2013.
|
[22] |
J. M. Leimeister, P. Sidiras, and H. Krcmar, “Success factors of virtual communities from the perspective of members and operators: An empirical study,” in Proc. 37th Annu. Hawaii Int. Conf. System Sciences, Big Island, USA, 2004, pp. 10.
|
[23] |
H. B. Zhu, “Avoiding conflicts by group role assignment,” IEEE Trans. Syst.,Man,Cybern.:Syst., vol. 46, no. 4, pp. 535–547, Apr. 2016. doi: 10.1109/TSMC.2015.2438690
|
[24] |
L. Fotia, F. Messina, D. Rosaci, and G. M. L. Sarnè, “Using local trust for forming cohesive social structures in virtual communities,” Comput. J., vol. 60, no. 11, pp. 1717–1727, Nov. 2017. doi: 10.1093/comjnl/bxx072
|
[25] |
R. Roman, J. Y. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Comput. Netw., vol. 57, no. 10, pp. 2266–2279, Jul. 2013. doi: 10.1016/j.comnet.2012.12.018
|
[26] |
K. Benson, “Enabling resilience in the internet of things,” in Proc. IEEE Int. Conf. Pervasive Computing and Communication Workshops, St. Louis, USA, 2015, pp. 230–232.
|
[27] |
M. Srivatsa, L. Xiong, and L. Liu, “Trustguard: Countering vulnerabilities in reputation management for decentralized overlay networks,” in Proc. 14th Int. Conf. World Wide Web, Chiba, Japan, 2005, pp. 422–431.
|
[28] |
Y. F. Ruan and A. Durresi, “A survey of trust management systems for online social communities–trust modeling, trust inference and attacks,” Knowl.-Based Syst., vol. 106, pp. 150–163, Aug. 2016. doi: 10.1016/j.knosys.2016.05.042
|
[29] |
M. Daudi, J. B. Hauge, and K. D. Thoben, “A trust framework for agent’s interactions in collaborative logistics,” in Dynamics in Logistics, M. Freitag, H. Kotzab, and J. Pannek, Eds. Cham, Switzerland: Springer, 2017, pp. 53–63.
|
[30] |
M. Aazam, I. Khan, A. A. Alsaffar, and E. N. Huh, “Cloud of things: Integrating internet of things and cloud computing and the issues involved,” in Proc. 11th Int. Bhurban Conf. Applied Sciences & Technology, Islamabad, Pakistan, 2014, pp. 414–419.
|
[31] |
M. G. V. Kumar and U. S. Ragupathy, “A survey on current key issues and status in cryptography,” in Proc. Int. Conf. Wireless Communications, Signal Processing and Networking, Chennai, India, 2016, pp. 205–210.
|
[32] |
J. Fogel and E. Nehmad, “Internet social network communities: Risk taking, trust, and privacy concerns,” Comput. Hum. Behav., vol. 25, no. 1, pp. 153–160, Jan. 2009. doi: 10.1016/j.chb.2008.08.006
|
[33] |
L. Xiong and L. Liu, “PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities,” IEEE Trans. Knowl. Data Eng., vol. 16, no. 7, pp. 843–857, Jul. 2004. doi: 10.1109/TKDE.2004.1318566
|
[34] |
D. Rosaci, G. M. L. Sarnè, and S. Garruzzo, “Integrating trust measures in multiagent systems,” Int. J. Intell. Syst., vol. 27, no. 1, pp. 1–15, Jan. 2012. doi: 10.1002/int.20513
|
[35] |
T. D. Huynh, N. R. Jennings, and N. R. Shadbolt, “An integrated trust and reputation model for open multi-agent systems,” Auton. Agent Multi Agent Syst., vol. 13, no. 2, pp. 119–154, 2006. doi: 10.1007/s10458-005-6825-4
|
[36] |
D. Houser and J. Wooders, “Reputation in auctions: Theory, and evidence from eBay,” J. Econ. Manag. Strategy, vol. 15, no. 2, pp. 353–369, Apr. 2006. doi: 10.1111/j.1530-9134.2006.00103.x
|
[37] |
G. Zacharia, A. Moukas, and P. Maes, “Collaborative reputation mechanisms for electronic marketplaces,” Decis. Support Syst., vol. 29, no. 4, pp. 371–388, Dec. 2000. doi: 10.1016/S0167-9236(00)00084-1
|
[38] |
L. Tseng, Y. J. Wu, H. C. Pan, M. Aloqaily, and A. Boukerche, “Reliable broadcast in networks with trusted nodes,” in Proc. IEEE Global Communications Conf., Waikoloa, USA, 2019, pp. 1–6.
|
[39] |
X. Li, Q. X. Wang, X. Lan, X. S. Chen, N. Zhang, and D. J. Chen, “Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach,” IEEE Access, vol. 7, pp. 9368–9383, Jan. 2019. doi: 10.1109/ACCESS.2018.2890432
|
[40] |
M. Indiramma and K. R. Anandakumar, “TCM: A trust computation model for collaborative decision making in multi-agent system,” Int. J. Comput. Sci. Netw. Secur., vol. 8, no. 11, pp. 69–75, Nov. 2008.
|
[41] |
J. Sabater and C. Sierra, “Regret: Reputation in gregarious societies,” in Proc. 5th Int. Conf. Autonomous Agents, Quebec, Canada, 2001, pp. 194–195.
|
[42] |
S. A. Ghasempouri and B. T. Ladani, “Modeling trust and reputation systems in hostile environments,” Future Gen. Comput. Syst., vol. 99, pp. 571–592, Oct. 2019. doi: 10.1016/j.future.2019.05.017
|
[43] |
S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in internet of things: The road ahead,” Comput. Netw., vol. 76, pp. 146–164, Jan. 2015. doi: 10.1016/j.comnet.2014.11.008
|
[44] |
J. Guo, I. R. Chen, and J. J. P. Tsai, “A survey of trust computation models for service management in internet of things systems,” Comput. Commun., vol. 97, pp. 1–14, Jan. 2017. doi: 10.1016/j.comcom.2016.10.012
|
[45] |
M. Aloqaily, S. Otoum, I. Al Ridhawi, and Y. Jararweh, “An intrusion detection system for connected vehicles in smart cities,” Ad Hoc Netw., vol. 90, pp. 101842, Jul. 2019. doi: 10.1016/j.adhoc.2019.02.001
|
[46] |
F. Y. Bao and I. R. Chen, “Dynamic trust management for internet of things applications,” in Proc. Int. Workshop on Self-Aware Internet of Things, San Jose, USA, 2012, pp. 1–6.
|
[47] |
I. R. Chen, F. Y. Bao, and J. Guo, “Trust-based service management for social internet of things systems,” IEEE Trans. Dependable Secure Comput., vol. 13, no. 6, pp. 684–696, Nov.–Dec. 2016. doi: 10.1109/TDSC.2015.2420552
|
[48] |
C. Vallati, E. Mingozzi, G. Tanganelli, N. Buonaccorsi, N. Valdambrini, N. Zonidis, B. Martínez, A. Mamelli, D. Sommacampagna, B. Anggorojati, S. Kyriazakos, N. Prasad, F. J. Nieto, and O. B. Rodriguez, “BETaaS: A platform for development and execution of machine-to-machine applications in the internet of things,” Wirel. Pers. Commun., vol. 87, no. 3, pp. 1071–1091, Apr. 2016. doi: 10.1007/s11277-015-2639-0
|
[49] |
Y. B. Saied, A. Olivereau, D. Zeghlache, and M. Laurent, “Trust management system design for the internet of things: A context-aware and multi-service approach,” Comput. Secur., vol. 39, pp. 351–365, Nov. 2013. doi: 10.1016/j.cose.2013.09.001
|
[50] |
E. M. Schooler, D. Zage, J. Sedayao, H. Moustafa, A. Brown, and M. Ambrosin, “An architectural vision for a data-centric IoT: Rethinking things, trust and clouds,” in Proc. IEEE 37th Int. Conf. Distributed Computing Systems, Atlanta, USA, 2017, pp. 1717–1728.
|
[51] |
M. D. Alshehri, F. K. Hussain, and O. K. Hussain, “Clustering-driven intelligent trust management methodology for the internet of things (CITM-IoT),” Mobile Netw. Appl., vol. 23, no. 3, pp. 419–431, Jun. 2018. doi: 10.1007/s11036-018-1017-z
|
[52] |
J. P. G. Sterbenz, “Smart city and IoT resilience, survivability, and disruption tolerance: Challenges, modelling, and a survey of research opportunities,” in Proc. 9th Int. Workshop Resilient Networks Design and Modeling, Alghero, Italy, 2017, pp. 1–6.
|
[53] |
I. Al Ridhawi, S. Otoum, M. Aloqaily, Y. Jararweh, and T. Baker, “Providing secure and reliable communication for next generation networks in smart cities,” Sustain. Cities Soc., vol. 56, pp. 102080, May 2020. doi: 10.1016/j.scs.2020.102080
|
[54] |
H. Q. Li, Q. G. Lu, and T. W. Huang, “Convergence analysis of a distributed optimization algorithm with a general unbalanced directed communication network,” IEEE Trans. Netw. Sci. Eng., vol. 6, no. 3, pp. 237–248, Jul. 2019. doi: 10.1109/TNSE.2018.2848288
|
[55] |
H. Sándor, B. Genge, and G. Sebestyén-Pál, “Resilience in the internet of things: The software defined networking approach,” in Proc. IEEE Int. Conf. Intelligent Computer Communication and Processing, Cluj-Napoca, Romania, 2015, pp. 545–552.
|
[56] |
X. P. Liang, J. Zhao, S. Shetty, and D. Y. Li, “Towards data assurance and resilience in IoT using blockchain,” in Proc. IEEE Military Communications Conf., Baltimore, USA, 2017, pp. 261–266.
|
[57] |
P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi, and K. K. R. Choo, “A systematic literature review of blockchain cyber security,” Digit. Commun. Netw., vol. 6, no. 2, pp. 147–156, May 2020. doi: 10.1016/j.dcan.2019.01.005
|
[58] |
L. Tseng, L. Wong, S. Otoum, M. Aloqaily, and J. B. Othman, “Blockchain for managing heterogeneous internet of things: A perspective architecture,” IEEE Netw., vol. 34, no. 1, pp. 16–23, Jan.–Feb. 2020. doi: 10.1109/MNET.001.1900103
|
[59] |
Z. A. Khan, J. Ullrich, A. G. Voyiatzis, and P. Herrmann, “A trust-based resilient routing mechanism for the internet of things,” in Proc. 12th Int. Conf. Availability, Reliability and Security, Reggio Calabria, Italy, 2017, pp. 1–6
|
[60] |
H. Q. Li, Q. G. Lu, and T. W. Huang, “Distributed projection subgradient algorithm over time-varying general unbalanced directed graphs,” IEEE Trans. Autom. Control, vol. 64, no. 3, pp. 1309–1316, Mar. 2019. doi: 10.1109/TAC.2018.2849616
|
[61] |
L. Liu, M. Loper, Y. Ozkaya, A. Yasar, and E. Yigitoglu, “Machine to machine trust in the IoT era. ” in Proc. 18th Int. Conf. Trust in Agent Societies, Singapore, 2016, pp. 18–29.
|
[62] |
M. Feldman, C. Papadimitriou, J. Chuang, and I. Stoica, “Free-riding and whitewashing in peer-to-peer systems,” IEEE J. Sel. Areas Commun., vol. 24, no. 5, pp. 1010–1019, May 2006. doi: 10.1109/JSAC.2006.872882
|
[63] |
A. J. Bidgoly and B. T. Ladani, “Benchmarking reputation systems: A quantitative verification approach,” Comput. Hum. Behav., vol. 57, pp. 274–291, Apr. 2016. doi: 10.1016/j.chb.2015.12.024
|
[64] |
P. Y. Zhang, S. Shu, and M. C. Zhou, “An online fault detection model and strategies based on SVM-grid in clouds,” IEEE/CAA J. Autom. Sinica, vol. 5, no. 2, pp. 445–456, Mar. 2018. doi: 10.1109/JAS.2017.7510817
|
[65] |
J. J. Wang and T. Kumbasar, “Parameter optimization of interval type-2 fuzzy neural networks based on PSO and BBBC methods,” IEEE/CAA J. Autom. Sinica, vol. 6, no. 1, pp. 247–257, Jan. 2019. doi: 10.1109/JAS.2019.1911348
|
[66] |
S. C. Gao, M. C. Zhou, Y. R. Wang, J. J. Cheng, H. Yachi, and J. H. Wang, “Dendritic neuron model with effective learning algorithms for classification, approximation, and prediction,” IEEE Trans. Neural Netw. Learn. Syst., vol. 30, no. 2, pp. 601–614, Feb. 2019. doi: 10.1109/TNNLS.2018.2846646
|