Title | DTMSim-IoT: A Distributed Trust Management Simulator for IoT Networks |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Abbas Hamdani, Syed Wasif, Waheed Khan, Abdul, Iltaf, Naima, Iqbal, Waseem |
Conference Name | 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) |
Date Published | aug |
Keywords | distributed trust management, Focusing, History, human factors, Internet of Things, IoT, IoT security, IoT Simulator, Metrics, on-off attack, Pervasive Computing Security, pubcrawl, Resiliency, Scalability, Standards, Task Analysis, Testing, Trust management, Weighted-Sum |
Abstract | In recent years, several trust management frame-works and models have been proposed for the Internet of Things (IoT). Focusing primarily on distributed trust management schemes; testing and validation of these models is still a challenging task. It requires the implementation of the proposed trust model for verification and validation of expected outcomes. Nevertheless, a stand-alone and standard IoT network simulator for testing of distributed trust management scheme is not yet available. In this paper, a .NET-based Distributed Trust Management Simulator for IoT Networks (DTMSim-IoT) is presented which enables the researcher to implement any static/dynamic trust management model to compute the trust value of a node. The trust computation will be calculated based on the direct-observation and trust value is updated after every transaction. Transaction history and logs of each event are maintained which can be viewed and exported as .csv file for future use. In addition to that, the simulator can also draw a graph based on the .csv file. Moreover, the simulator also offers to incorporate the feature of identification and mitigation of the On-Off Attack (OOA) in the IoT domain. Furthermore, after identifying any malicious activity by any node in the networks, the malevolent node is added to the malicious list and disseminated in the network to prevent potential On-Off attacks. |
DOI | 10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00091 |
Citation Key | abbas_hamdani_dtmsim-iot_2020 |