Skip to main content

Game Theory Approach for Trust Management in the Realm of IoT

  • Chapter
  • First Online:
Security Issues and Privacy Threats in Smart Ubiquitous Computing

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 341))

Abstract

The main purpose of game theory approach is to provide security- and confidence-based routing to find confidence-based secure route from initiator to destination which will satisfy some quality-of-service constraints. By applying this methodology, the utility capacity of each node is settled dependent on the verification and amassed throughput. By checking the past estimations, the utility capacity is redesigned with a punishment esteem and dependent on the refreshed utility capacity, the assault node is perceived. At the point when a middle of the road node gets a packet, it will choose its next jump dependent on the steering section. What is more, simultaneously, it will likewise affirm whether its potential next jump’s trust bigger than the trust esteem or not. If not, which indicates that the following jump is certainly not a dependable node (i.e., suspect or vindictive node) and a safe way trust-ready occasion will be enacted. The complete objective of the framework is in light of the abrupt or concealed noxious node in the steering way, so as to keep up the effectiveness of directing. Contrasted and other trust course support frameworks of this new proposed secure way trust-ready framework could diminish the directing overhead and course revelation recurrence. The fundamental reasons are: (1) this new framework is increasingly qualified to the “trust” standard, goal, way ID instead of just goal; (2) the previous bounce of every way in the forerunner list is utilized to oversee the engendering scope of the course blunder message.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nabil, D., Tandjaoui, D., Romdhani, I., Medjek, F.: Trust Management in Internet of Things. https://doi.org/10.4018/978-1-5225-5736-4.ch007 (2018)

  2. Li, C., Wang, G., Quot: A Light-weight commodity integrity detection Algorithm based on Chinese remainder heorem, &quot. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool (2012)

    Google Scholar 

  3. Thoma, C., Cui, T., Franchetti, Franz: Secure Multiparty Computation Based Privacy Preserving Smart Metering System. Carnegie Mellon University, Pittsburgh (2018). Journal contribution

    Google Scholar 

  4. Portêlo, J., Raj, B., Trancoso, I.: Attacking a privacy preserving music matching algorithm. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, 2012, pp. 1821–1824. https://doi.org/10.1109/icassp.2012.6288255

  5. Samaniego, M., Deters, R.: Zero-trust hierarchical management in IoT. In: 2018 IEEE International Congress on Internet of Things (ICIOT), San Francisco, CA, 2018, pp. 88–95

    Google Scholar 

  6. Burak Can, A., Bhargava, B.: SORT: A Self-ORganizing Trust model for peer-to-peer systems. IEEE Trans. Depend. Secure Comput., 14–27 (2013)

    Google Scholar 

  7. Kittur, A.S., Roshan Pais, A.: A trust model based batch verification of digital signatures in IoT. J. Ambient Intell. Hum. Comput. Springer (2019)

    Google Scholar 

  8. Chen, J.A.: Trust architecture and reputation evaluation for internet of things. J. Ambient Intell. Hum. Comput., 3099–3107 (2019)

    Google Scholar 

  9. Govil, M.C., Sharma, A.: A framework to manage trust in Internet of Things. In: 2016 International Conference on Emerging Trends in Communication Technologies (ETCT), 2016, pp. 1–5

    Google Scholar 

  10. Yan, Z., Zhang, P.: A survey on trust management for Internet of Things. ScienceDirect J. Netw. Comput. Appl., 120–134 (2014)

    Google Scholar 

  11. Malik, S., Dedeoglu, V., Kanhere, S.S., Jurdak, R.: TrustChain: trust management in Blockchain and IoT supported supply chains. In: 2019 IEEE International Conference on Blockchain (Blockchain). IEEE (2019)

    Google Scholar 

  12. Hashemi, S.Y., Aliee, F.S.: Dynamic and comprehensive trust model for IoT and its integration into RPL. J. Supercomput. (2018). https://doi.org/10.1007/s11227-018-2700-3

    Article  Google Scholar 

  13. Reddy, V.B., Negi, A., Venkataraman, S., Venkataraman, V.R.: A similarity based trust model to mitigate badmouthing attacks in Internet of Things (IoT). In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 2019, pp. 278–282

    Google Scholar 

  14. Borkar, G.M., Mahajan, A.R.: A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel. Netw. 23, 2455–2472 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gautam M. Borkar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kulkarni, N., Borkar, G.M., Marathe, N. (2021). Game Theory Approach for Trust Management in the Realm of IoT. In: Mahalle, P.N., Shinde, G.R., Dey, N., Hassanien, A.E. (eds) Security Issues and Privacy Threats in Smart Ubiquitous Computing. Studies in Systems, Decision and Control, vol 341. Springer, Singapore. https://doi.org/10.1007/978-981-33-4996-4_9

Download citation

Publish with us

Policies and ethics