Visible to the public A Similarity based Trust Model to Mitigate Badmouthing Attacks in Internet of Things (IoT)

TitleA Similarity based Trust Model to Mitigate Badmouthing Attacks in Internet of Things (IoT)
Publication TypeConference Paper
Year of Publication2019
AuthorsReddy, Vijender Busi, Negi, Atul, Venkataraman, S, Venkataraman, V Raghu
Conference Name2019 IEEE 5th World Forum on Internet of Things (WF-IoT)
Date Publishedapr
PublisherIEEE
ISBN Number978-1-5386-4980-0
Keywordscloud computing, Collusion Attacks, composability, Computational modeling, Data models, Human Behavior, human factors, Internet of Things, IoT, IoT networks, IoT security, malicious object, Metrics, mitigate badmouthing attacks, Privacy., pubcrawl, Recommendations, reliability, resilience, Resiliency, security, Sensors, similarity, similarity model, telecommunication security, Trust, trust computation, trust model, Trusted Computing
Abstract

In Internet of Things (IoT) each object is addressable, trackable and accessible on the Internet. To be useful, objects in IoT co-operate and exchange information. IoT networks are open, anonymous, dynamic in nature so, a malicious object may enter into the network and disrupt the network. Trust models have been proposed to identify malicious objects and to improve the reliability of the network. Recommendations in trust computation are the basis of trust models. Due to this, trust models are vulnerable to bad mouthing and collusion attacks. In this paper, we propose a similarity model to mitigate badmouthing and collusion attacks and show that proposed method efficiently removes the impact of malicious recommendations in trust computation.

URLhttps://ieeexplore.ieee.org/document/8767170
DOI10.1109/WF-IoT.2019.8767170
Citation Keyreddy_similarity_2019