Ensuring authentication in the Internet of Things (IoT) environment is a crucial task because of its unique characteristics which include sensing, intelligence, large scale, selfconfiguring, connectivity, heterogeneity, open and dynamic environment. Besides, every object in the IoT environment should trust other devices with no recommendation or prior knowledge for any network operations. Hence, those characteristics and blindness in communication make security violations in the form of various attacks. Therefore, a trustbased solution is necessary for ensuring security in the IoT environment. Trust is considered as a computational measure represented through a relationship between trustor and trustee, explained in a particular context valued through trust metrics and evaluated by a trust mechanism. The proposed logistic regression-based trust model provides an efficient way to identify and isolate the misbehaving nodes in the RPL (Routing Protocol for Low Power Lossy Networks) based IoT network. It is one of the popularly used routing protocols in IoT, that builds a path especially for the constrained nodes in IoT environments. However, it is vulnerable to many attacks. The proposed model classifies and predicts the node’s behavior (trusted or malicious). This model uses the logistic regression model to predict the node’s behavior based on the integrated trust value which is computed from the direct trust, reputation score, and experience trust. It is primarily designed to address the black hole attack in the IoT environment. The mathematical analysis shows the possibility of the proposed work and the simulation results show the proposed model is better than the existing similar work.
The Internet of Things (IoT) defined as the assembling of real-world objects that are connected over the Internet to make human lives become well-being. The implementation and success of an IoT depend on how it’s secured. But providing security is a critical task because of various natures of IoT devices such as shared and open environment, a wide range of communication protocols, standards, self-organized, lack of central control, heterogeneity of devices, etc. To provide security solutions and mechanisms, key management, cryptographic mechanisms such as private and public-key cryptography, Intrusion Detection System (IDS), and hash functions have been used. Though it is working well, it is not suitable for lightweight IoT devices. Because of such mechanisms always demand high computational, memory, and processing. To overcome these issues, researchers have chosen trust management for providing security. In this article, some of the trust-based solutions have presented. Besides, security issues, security loopholes/attacks in various layers of IoT, security requirements, trust management in IoT, properties of trust, trust management building blocks, the role of trust management in IoT, basic trust calculation methods have presented.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.