Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Trust Modelling and Management for Collaborative and Composite Applications in the Internet of Things

Adewuyi, A (2022) Trust Modelling and Management for Collaborative and Composite Applications in the Internet of Things. Doctoral thesis, Liverpool John Moores University.

[img]
Preview
Text
Thesis.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial.

Download (2MB) | Preview

Abstract

A future Internet of Things (IoT) will feature a service-oriented architecture consisting of lightweight computing platforms offering individual, loosely coupled microservices. Often, an end-user will request a bespoke service that will require a composition of two or more microservices offered by different service providers. This architecture offers several advantages that are key to the realisation of the IoT vision, such as modularity, increased reliability and technology heterogeneity and interoperability. As a result, the adoption of this architecture in the IoT is being extensively researched. However, the underlying complexities of service compositions and the increased security risks inherent in such a massively decentralised and distributed architecture remain key problems. The use of trust management to secure the IoT remains a current and interesting topic; its potential as a basis for service compositions has not been thoroughly researched, however.
Security through trust presents a viable solution for threat management in the IoT. Currently, a well-defined trust management framework for collaborative and composite applications on an IoT platform does not exist. In this thesis, a collaborative application refers to the one that enables collaboration among its users to jointly complete certain tasks, whereas a composite application is the one composed of multiple existing services to deliver integrated functionalities. To estimate reliably the trust values of nodes within a system, the trust should be measured by suitable parameters that are based on the nodes’ functional properties in the application context. Existing models do not clearly outline the parametrisation of trust. Also, trust decay is inadequately modelled in many current models. In addition, trust recommendations are usually inaccurately weighted with respect to previous trust, thereby increasing the effect of bad recommendations.
This thesis focuses on providing solutions to the twin issues of trust-based security and trust-based compositions for the IoT. First, a new model, CTRUST, is proposed to resolve the above stated shortcomings of previous trust models. In CTRUST, trust is accurately parametrised while recommendations are evaluated through belief functions. The effects of trust decay and maturity on the trust evaluation process were studied. Each trust component is neatly modelled by appropriate mathematical functions. CTRUST was implemented in a collaborative download application and its performance was evaluated based on the utility derived and its trust accuracy, convergence, and resiliency. The results indicate that IoT collaborative applications based on CTRUST gain a significant improvement in performance, in terms of efficiency and security.
In a second study, the trust properties of service compositions in the IoT, along with the effect of the service architecture on the security and performance of the composed service, are investigated. Novel approaches are considered in relation to trust decomposition and composition, respectively. Relevant trust evaluation functions are derived to guide the compositions, which are used to extend CTRUST into a new trust model, SC-TRUST. SC-TRUST is implemented in a suitable simulation and the results are evaluated. The model reliably guides service compositions while ensuring utility to the end-user. Overall, the analyses and evaluations support the conclusion that the trust models are effective in terms of performance gain and security. The models are scalable and lightweight such that they could be deployed to secure applications and drive meaningful services and collaborations in the envisaged IoT and Web 3.0 sphere.

Item Type: Thesis (Doctoral)
Uncontrolled Keywords: Internet of Things; Trust Management; Service-oriented architecture; trusted computing; trustworthy service composition; Computational modeling; Collaborative computing; Distributed applications; Security and Privacy protection; Reliability
Subjects: Q Science > QA Mathematics
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science & Mathematics
SWORD Depositor: A Symplectic
Date Deposited: 01 Jun 2022 09:12
Last Modified: 01 Jun 2022 09:13
DOI or Identification number: 10.24377/LJMU.t.00016941
Supervisors: Shi, Q and Cheng, H
URI: https://researchonline.ljmu.ac.uk/id/eprint/16941

Actions (login required)

View Item View Item