An active and verifiable trust evaluation approach for edge computing
- PDF / 2,890,655 Bytes
- 19 Pages / 595.276 x 790.866 pts Page_size
- 1 Downloads / 186 Views
Journal of Cloud Computing: Advances, Systems and Applications
RESEARCH
Open Access
An active and verifiable trust evaluation approach for edge computing Wen Mo1, Tian Wang2, Shaobo Zhang3 and Jinhuan Zhang1*
Abstract Billions of Internet of Thing (IoT) devices are deployed in edge network. They are used to monitor specific event, process and to collect huge data to control center with smart decision based on the collected data. However, some malicious IoT devices may interrupt and interfere with normal nodes in data collection, causing damage to edge network. Due to the open character of the edge network, how to identify the credibility of these nodes, thereby identifying malicious IoT devices, and ensure reliable data collection in the edge network is a great challenge. In this paper, an Active and Verifiable Trust Evaluation (AVTE) approach is proposed to identify the credibility of IoT devices, so to ensure reliable data collection for Edge Computing with low cost. The main innovations of the AVTE approach compared with the existing work are as follows: (1) In AVTE approach, the trust of the device is obtained by an actively initiated trusted detection routing method. It is fast, accurate and targeted. (2) The acquisition of trust in the AVTE approach is based on a verifiable method and it ensures that the trust degree has higher reliability. (3) The trust acquisition method proposed in this paper is low-cost. An encoding returned verification method is applied to obtain verification messages at a very low cost. This paper proposes an encoding returned verification method, which can obtain verification messages at a very low cost. In addition, the strategy of this paper adopts initiation and verification of adaptive active trust detection according to the different energy consumption of IoT devices, so as to reliably obtain the trust of device under the premise of ensuring network lifetime. Theoretical analysis shows that AVTE approach can improve the data collection rate by 0.5 ~ 23.16% while ensuring long network lifetime compared with the existing scheme. Keywords: Edge computing, Data collection, Active trust, Verifiable trust, Trust evolution
Introduction With the development of Internet of Things (IoT), there will be more than 20 billion IoT devices by 2020 [1–3]. Most of these IoT devices are deployed at the edge of the network [4–6]. Due to the huge number of these IoT devices and the development of micro-processing technology, their computing and storage capabilities have greatly improved. For example, the computing and storage capacity of mobile phones now exceeds that of personal computers more than 10 years ago [7–9]. These huge changes have led to extremely huge computing and storage * Correspondence: [email protected] 1 School of Computer Science and Engineering, Central South University, Changsha 410083, China Full list of author information is available at the end of the article
capacity of the edge network, so the current network computing center is transferred from the network cen
Data Loading...