The Library
M2M-REP : reputation of machines in the Internet of Things
Tools
Azad, Muhammad Ajmal, Bag, Samiran and Hao, Feng (2017) M2M-REP : reputation of machines in the Internet of Things. In: ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 29 Aug - 01 Sep 2017 ISBN 9781450352574. doi:10.1145/3098954.3098976
Research output not available from this repository.
Request-a-Copy directly from author or use local Library Get it For Me service.
Official URL: http://dx.doi.org/10.1145/3098954.3098976
Abstract
The Internet of Things (IoT) is the integration of a large number of autonomous heterogeneous devices that report information from the physical environment to the monitoring system for analytics and meaningful decisions. The compromised machines in the IoT network may not only be used for spreading unwanted content such as spam, malware, viruses etc, but can also report incorrect information about the physical world that might have a disastrous consequence. The challenge is to design a collaborative reputation system that calculates trustworthiness of machines in the IoT-based machine-to-machine network without consuming high system resources and breaching the privacy of participants. To address the challenge of privacy preserving reputation system for the decentralized IoT environment, this paper presents a novel M2M-REP (Machine to Machine Reputation) system that computes global reputation of the machine by aggregating the encrypted local feedback provided by machines in a fully decentralized and secure way. The privacy of participating machines is well protected such that machines or analyst would not learn any information about the feedback score provided by the participating machines other than the final aggregated statistical score. We present a decentralized reputation aggregation system for two scenarios: a semi-honest (honest-but-curious) setup where machines are trustworthy in providing feedback but are curious to learn sensitive information about the collaborating machines, and the malicious model where machines not only try to learn the sensitive information of participants but also do not follow the protocol specification in providing feedback. We analyzed the security and privacy properties of the M2M-REP system for different adversarial models.
Item Type: | Conference Item (Paper) | ||||
---|---|---|---|---|---|
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||
Publisher: | ACM | ||||
ISBN: | 9781450352574 | ||||
Book Title: | Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17 | ||||
Official Date: | 2017 | ||||
Dates: |
|
||||
Article Number: | 28 | ||||
DOI: | 10.1145/3098954.3098976 | ||||
Status: | Peer Reviewed | ||||
Publication Status: | Published | ||||
Access rights to Published version: | Restricted or Subscription Access | ||||
Conference Paper Type: | Paper | ||||
Title of Event: | ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security | ||||
Type of Event: | Conference | ||||
Location of Event: | Reggio Calabria, Italy | ||||
Date(s) of Event: | 29 Aug - 01 Sep 2017 |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |