A Similarity based Trust Model to Mitigate Badmouthing Attacks in Internet of Things (IoT)
Title | A Similarity based Trust Model to Mitigate Badmouthing Attacks in Internet of Things (IoT) |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Reddy, Vijender Busi, Negi, Atul, Venkataraman, S, Venkataraman, V Raghu |
Conference Name | 2019 IEEE 5th World Forum on Internet of Things (WF-IoT) |
Date Published | apr |
Publisher | IEEE |
ISBN Number | 978-1-5386-4980-0 |
Keywords | cloud computing, Collusion Attacks, composability, Computational modeling, Data models, Human Behavior, human factors, Internet of Things, IoT, IoT networks, IoT security, malicious object, Metrics, mitigate badmouthing attacks, Privacy., pubcrawl, Recommendations, reliability, resilience, Resiliency, security, Sensors, similarity, similarity model, telecommunication security, Trust, trust computation, trust model, Trusted Computing |
Abstract | In Internet of Things (IoT) each object is addressable, trackable and accessible on the Internet. To be useful, objects in IoT co-operate and exchange information. IoT networks are open, anonymous, dynamic in nature so, a malicious object may enter into the network and disrupt the network. Trust models have been proposed to identify malicious objects and to improve the reliability of the network. Recommendations in trust computation are the basis of trust models. Due to this, trust models are vulnerable to bad mouthing and collusion attacks. In this paper, we propose a similarity model to mitigate badmouthing and collusion attacks and show that proposed method efficiently removes the impact of malicious recommendations in trust computation. |
URL | https://ieeexplore.ieee.org/document/8767170 |
DOI | 10.1109/WF-IoT.2019.8767170 |
Citation Key | reddy_similarity_2019 |
- Privacy.
- Trusted Computing
- trust model
- trust computation
- trust
- telecommunication security
- similarity model
- similarity
- sensors
- security
- Resiliency
- resilience
- Reliability
- Recommendations
- pubcrawl
- Cloud Computing
- mitigate badmouthing attacks
- Metrics
- malicious object
- IoT security
- IoT networks
- IoT
- Internet of Things
- Human Factors
- Human behavior
- Data models
- Computational modeling
- composability
- Collusion Attacks