Local Trust in Internet of Things Based on Contract Theory
<p>General Architecture.</p> "> Figure 2
<p>Stochastic Learning Automata operation and performance evaluation. (<b>a</b>) Action Probability vs. Iterations, (<b>b</b>) Average Trustworthiness & Network Overhead vs. Iterations, (<b>c</b>) Average Personalized Feedback vs. Iterations, (<b>d</b>) Average Personalized Feedback and Convergence Time vs. <span class="html-italic">b</span>.</p> "> Figure 3
<p>Bayesian trust belief evaluation (<span class="html-italic">S</span>: positive, <span class="html-italic">F</span>: negative evaluations). (<b>a</b>) Trust Belief vs. Interactions, (<b>b</b>) Evaluations vs. Interactions.</p> "> Figure 4
<p>Offline contract-theoretic crowdsourcing—operation and performance evaluation. (<b>a</b>) Nodes’ Scores vs. Interactions, (<b>b</b>) Alice’s Belief vs. Interactions, (<b>c</b>) Effort vs. Nodes, (<b>d</b>) Reward vs. Nodes, (<b>e</b>) Nodes’ Payoff vs. Nodes, (<b>f</b>) Nodes’ Payoff vs. Nodes IDs, (<b>g</b>) Alice’s Payoff vs. Nodes, (<b>h</b>) Social Welfare vs. Nodes.</p> "> Figure 5
<p>Behavioral change evaluation. (<b>a</b>) Alice’s belief vs. interactions, (<b>b</b>) average reward vs. behaviors.</p> "> Figure 6
<p>Offline contract-theoretic crowdsourcing—a comparative evaluation.</p> ">
Abstract
:1. Introduction
- Use of Stochastic Learning Automata (SLA), to select crowd-sourced nodes in an autonomous and distributed manner. In particular, the selection at every iteration of the utilized Reinforcement Learning (RL) algorithm is probabilistically reinforced with respect to the network characteristics, such as delay and congestion, and social characteristics, such as trust scores.
- Introduction of a Bayesian trust model to probabilistically estimate the nodes’ trust scores in the absence of complete information in a realistic Internet of Things environment.
- Formulation of a novel PeerTrust protocol coupled with Bayesian adverse selection to model Alice’s personalized belief of node trust levels despite the nodes’ potential false individual reports of trustworthiness.
- Introduction of a novel contract-theoretic scheme based on the theory of labor economics that operates under the scenario of information asymmetry, yet incentivizes nodes to contribute effort and receive rewards corresponding to actual trust levels. Ergo, the trust model operates with incomplete information, where the optimal pairing of effort and reward represents the contract.
- Formulation of payoff functions for Alice, Bob and all participating nodes, which are maximized under certain constraints that hold true within the IoT network. The non-convex optimization problem is transformed into a convex form, with the optimal efforts-reward pairs determined accordingly. An extensive numerical and comparative evaluation to demonstrate the operation and efficiency of the proposed framework.
Related Work
2. System Model
2.1. The Concept of Contract
2.2. Bayesian Trust Belief
2.3. IoT Node Score—A PeerTrust Modeling
2.4. Alice’s and Selected IoT Nodes’ Payoff
3. Contract-Theoretic Crowdsourcing
3.1. Complete Information Scenario
3.2. Feasible Contract under Incomplete Information
3.3. Optimal Contract under Incomplete Information
4. Autonomous Reinforcement Learning-Based Contributors Selection
5. Numerical Results
5.1. Stochastic Learning Automata Operation & Bayesian Trust Belief Evaluation
5.2. Contract-Theoretic Crowdsourcing Evaluation
5.3. Comparative Evaluation
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Wang, B.; Li, M.; Jin, X.; Guo, C. A reliable IoT edge computing trust management mechanism for smart cities. IEEE Access 2020, 8, 46373–46399. [Google Scholar] [CrossRef]
- Esposito, C.; Tamburis, O.; Su, X.; Choi, C. Robust decentralised trust management for the internet of things by using game theory. Inf. Process. Manag. 2020, 57, 102308. [Google Scholar] [CrossRef]
- Deng, X.; Han, D.; Dezert, J.; Deng, Y.; Shyr, Y. Evidence combination from an evolutionary game theory perspective. IEEE Trans. Cybern. 2015, 46, 2070–2082. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- El Sayed, A.I.; Aziz, M.A.; Azeem, M.H.A. Blockchain Decentralized IoT Trust Management. In Proceedings of the 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), Online, 20 December 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–6. [Google Scholar]
- Putra, G.D.; Dedeoglu, V.; Kanhere, S.S.; Jurdak, R. Trust management in decentralized iot access control system. In Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada, 2–6 May 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–9. [Google Scholar]
- Ma, Z.; Liu, L.; Meng, W. Towards multiple-mix-attack detection via consensus-based trust management in IoT networks. Comput. Secur. 2020, 96, 101898. [Google Scholar] [CrossRef]
- Alshehri, M.D.; Hussain, F.K. A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT). Computing 2019, 101, 791–818. [Google Scholar] [CrossRef]
- Fang, W.; Xu, M.; Zhu, C.; Han, W.; Zhang, W.; Rodrigues, J.J. FETMS: Fast and efficient trust management scheme for information-centric networking in Internet of Things. IEEE Access 2019, 7, 13476–13485. [Google Scholar] [CrossRef]
- Adewuyi, A.A.; Cheng, H.; Shi, Q.; Cao, J.; MacDermott, Á.; Wang, X. CTRUST: A dynamic trust model for collaborative applications in the Internet of Things. IEEE Internet Things J. 2019, 6, 5432–5445. [Google Scholar] [CrossRef] [Green Version]
- Jayasinghe, U.; Lee, G.M.; Um, T.W.; Shi, Q. Machine learning based trust computational model for IoT services. IEEE Trans. Sustain. Comput. 2018, 4, 39–52. [Google Scholar] [CrossRef]
- Dhelim, S.; Ning, H.; Farha, F.; Chen, L.; Atzori, L.; Daneshmand, M. IoT-enabled social relationships meet artificial social intelligence. IEEE Internet Things J. 2021, 8, 17817–17828. [Google Scholar] [CrossRef]
- Lahbib, A.; Toumi, K.; Laouiti, A.; Laube, A.; Martin, S. Blockchain based trust management mechanism for IoT. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, Marrakesh, Morocco, 15–18 April 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–8. [Google Scholar]
- Wu, X.; Liang, J. A blockchain-based trust management method for Internet of Things. Perv. Mob. Comp. 2021, 72, 101330. [Google Scholar] [CrossRef]
- Boudagdigue, C.; Benslimane, A.; Kobbane, A.; Liu, J. Trust management in industrial internet of things. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3667–3682. [Google Scholar] [CrossRef]
- Qureshi, K.N.; Iftikhar, A.; Bhatti, S.N.; Piccialli, F.; Giampaolo, F.; Jeon, G. Trust management and evaluation for edge intelligence in the Internet of Things. Eng. Appl. AI 2020, 94, 103756. [Google Scholar] [CrossRef]
- Chen, G.; Zeng, F.; Zhang, J.; Lu, T.; Shen, J.; Shu, W. An adaptive trust model based on recommendation filtering algorithm for the Internet of Things systems. Comput. Netw. 2021, 190, 107952. [Google Scholar] [CrossRef]
- Altaf, A.; Abbas, H.; Iqbal, F.; Khan, M.M.Z.M.; Rauf, A.; Kanwal, T. Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks. J. Syst. Arch. 2021, 115, 102028. [Google Scholar] [CrossRef]
- Cabral, L.M. The Economics of Trust and Reputation: A Primer. N. Y. Univ. CEPR 2005. Available online: http://pages.stern.nyu.edu/~lcabral/reputation/Reputation_June05.pdf (accessed on 14 March 2022).
- Jaffray, J.Y. Bayesian updating and belief functions. IEEE Trans. Syst. Man Cybern. 1992, 22, 1144–1152. [Google Scholar] [CrossRef]
- Xiong, L.; Liu, L. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 2004, 16, 843–857. [Google Scholar] [CrossRef]
- Bolton, P.; Dewatripont, M. Contract Theory; MIT Press: Cambridge, MA, USA, 2005. [Google Scholar]
- Mars, P. Learning Algorithms: Theory and Applications in Signal Processing, Control and Communications; CRC Press: Boca Raton, FL, USA, 2018. [Google Scholar]
- Fragkos, G.; Minwalla, C.; Plusquellic, J.; Tsiropoulou, E.E. Reinforcement Learning toward Decision-Making for Multiple Trusted-Third-Parties in PUF-Cash. In Proceedings of the IEEE 6th WFIoT, Online, 2 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Fragkos, G.; Minwalla, C.; Tsiropoulou, E.E.; Plusquellic, J. Enhancing Privacy in PUF-Cash through Multiple Trusted Third Parties and Reinforcement Learning. ACM J. Emerg. Technol. Comput. Syst. (JETC) 2021, 18, 1–26. [Google Scholar] [CrossRef]
Notation | Description |
---|---|
t | time slot |
C | Set of IoT nodes |
c | IoT node |
A | Alice |
Set of IoT nodes selected by Alice | |
Alice’s distance from an IoT node c | |
Normalised congestion of the communication link between Alice and an IoT node c | |
Effort that Alice collects from the IoT node c | |
Optimal effort | |
Personalized reward that Alice provides to an IoT node c | |
Optimal reward | |
Bayesian trust belief of Alice regarding an IoT node c | |
Initial belief distribution | |
Probability that an IoT node provides high contribution | |
Probability that an IoT node provides low contribution | |
Number of times that an IoT node c contributed in a satisfactory manner up to time slot t | |
Number of times that an IoT node c contributed in a unsatisfactory manner up to time slot t | |
Score of an IoT node c | |
Trustworthiness of an IoT node c | |
Number of interactions that an IoT node c has with Alice | |
Interaction context factor | |
Normalized weighting factor | |
Payoff function of an IoT node c | |
Evaluation function of the received reward | |
Alice’s payoff function o | |
Alice’s cost to provide rewards to the IoT nodes | |
Alice’s probabilistic estimation of an IoT node’s c score | |
Social Welfare | |
Alice’s discrete action space | |
Set of subsets of the IoT nodes with cardinality | |
RL iteration | |
Alice’s RL personalized feedback | |
Alice’s RL normalized personalized feedback | |
Alice’s action probability vector | |
b | RL learning parameter |
Parameter | Value | Parameter | Value |
---|---|---|---|
10 | 4 | ||
b | |||
1 | |||
1 | |||
[10 m, 400 m] |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Fragkos, G.; Minwalla, C.; Plusquellic, J.; Tsiropoulou, E.E. Local Trust in Internet of Things Based on Contract Theory. Sensors 2022, 22, 2393. https://doi.org/10.3390/s22062393
Fragkos G, Minwalla C, Plusquellic J, Tsiropoulou EE. Local Trust in Internet of Things Based on Contract Theory. Sensors. 2022; 22(6):2393. https://doi.org/10.3390/s22062393
Chicago/Turabian StyleFragkos, Georgios, Cyrus Minwalla, Jim Plusquellic, and Eirini Eleni Tsiropoulou. 2022. "Local Trust in Internet of Things Based on Contract Theory" Sensors 22, no. 6: 2393. https://doi.org/10.3390/s22062393
APA StyleFragkos, G., Minwalla, C., Plusquellic, J., & Tsiropoulou, E. E. (2022). Local Trust in Internet of Things Based on Contract Theory. Sensors, 22(6), 2393. https://doi.org/10.3390/s22062393