Cargando…

Formal Analysis of Trust and Reputation for Service Composition in IoT

The exponential growth in the number of smart devices connected to the Internet of Things (IoT) that are associated with various IoT-based smart applications and services, raises interoperability challenges. Service-oriented architecture for IoT (SOA-IoT) solutions has been introduced to deal with t...

Descripción completa

Detalles Bibliográficos
Autores principales: Ahmed, Abdelmuttlib Ibrahim Abdalla, Hamid, Siti Hafizah Ab, Gani, Abdullah, Abdelaziz, Ahmed, Abaker, Mohammed
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10059767/
https://www.ncbi.nlm.nih.gov/pubmed/36991903
http://dx.doi.org/10.3390/s23063192
_version_ 1785016953345146880
author Ahmed, Abdelmuttlib Ibrahim Abdalla
Hamid, Siti Hafizah Ab
Gani, Abdullah
Abdelaziz, Ahmed
Abaker, Mohammed
author_facet Ahmed, Abdelmuttlib Ibrahim Abdalla
Hamid, Siti Hafizah Ab
Gani, Abdullah
Abdelaziz, Ahmed
Abaker, Mohammed
author_sort Ahmed, Abdelmuttlib Ibrahim Abdalla
collection PubMed
description The exponential growth in the number of smart devices connected to the Internet of Things (IoT) that are associated with various IoT-based smart applications and services, raises interoperability challenges. Service-oriented architecture for IoT (SOA-IoT) solutions has been introduced to deal with these interoperability challenges by integrating web services into sensor networks via IoT-optimized gateways to fill the gap between devices, networks, and access terminals. The main aim of service composition is to transform user requirements into a composite service execution. Different methods have been used to perform service composition, which has been classified as trust-based and non-trust-based. The existing studies in this field have reported that trust-based approaches outperform non-trust-based ones. Trust-based service composition approaches use the trust and reputation system as a brain to select appropriate service providers (SPs) for the service composition plan. The trust and reputation system computes each candidate SP’s trust value and selects the SP with the highest trust value for the service composition plan. The trust system computes the trust value from the self-observation of the service requestor (SR) and other service consumers’ (SCs) recommendations. Several experimental solutions have been proposed to deal with trust-based service composition in the IoT; however, a formal method for trust-based service composition in the IoT is lacking. In this study, we used the formal method for representing the components of trust-based service management in the IoT, by using higher-order logic (HOL) and verifying the different behaviors in the trust system and the trust value computation processes. Our findings showed that the presence of malicious nodes performing trust attacks leads to biased trust value computation, which results in inappropriate SP selection during the service composition. The formal analysis has given us a clear insight and complete understanding, which will assist in the development of a robust trust system.
format Online
Article
Text
id pubmed-10059767
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100597672023-03-30 Formal Analysis of Trust and Reputation for Service Composition in IoT Ahmed, Abdelmuttlib Ibrahim Abdalla Hamid, Siti Hafizah Ab Gani, Abdullah Abdelaziz, Ahmed Abaker, Mohammed Sensors (Basel) Article The exponential growth in the number of smart devices connected to the Internet of Things (IoT) that are associated with various IoT-based smart applications and services, raises interoperability challenges. Service-oriented architecture for IoT (SOA-IoT) solutions has been introduced to deal with these interoperability challenges by integrating web services into sensor networks via IoT-optimized gateways to fill the gap between devices, networks, and access terminals. The main aim of service composition is to transform user requirements into a composite service execution. Different methods have been used to perform service composition, which has been classified as trust-based and non-trust-based. The existing studies in this field have reported that trust-based approaches outperform non-trust-based ones. Trust-based service composition approaches use the trust and reputation system as a brain to select appropriate service providers (SPs) for the service composition plan. The trust and reputation system computes each candidate SP’s trust value and selects the SP with the highest trust value for the service composition plan. The trust system computes the trust value from the self-observation of the service requestor (SR) and other service consumers’ (SCs) recommendations. Several experimental solutions have been proposed to deal with trust-based service composition in the IoT; however, a formal method for trust-based service composition in the IoT is lacking. In this study, we used the formal method for representing the components of trust-based service management in the IoT, by using higher-order logic (HOL) and verifying the different behaviors in the trust system and the trust value computation processes. Our findings showed that the presence of malicious nodes performing trust attacks leads to biased trust value computation, which results in inappropriate SP selection during the service composition. The formal analysis has given us a clear insight and complete understanding, which will assist in the development of a robust trust system. MDPI 2023-03-16 /pmc/articles/PMC10059767/ /pubmed/36991903 http://dx.doi.org/10.3390/s23063192 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ahmed, Abdelmuttlib Ibrahim Abdalla
Hamid, Siti Hafizah Ab
Gani, Abdullah
Abdelaziz, Ahmed
Abaker, Mohammed
Formal Analysis of Trust and Reputation for Service Composition in IoT
title Formal Analysis of Trust and Reputation for Service Composition in IoT
title_full Formal Analysis of Trust and Reputation for Service Composition in IoT
title_fullStr Formal Analysis of Trust and Reputation for Service Composition in IoT
title_full_unstemmed Formal Analysis of Trust and Reputation for Service Composition in IoT
title_short Formal Analysis of Trust and Reputation for Service Composition in IoT
title_sort formal analysis of trust and reputation for service composition in iot
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10059767/
https://www.ncbi.nlm.nih.gov/pubmed/36991903
http://dx.doi.org/10.3390/s23063192
work_keys_str_mv AT ahmedabdelmuttlibibrahimabdalla formalanalysisoftrustandreputationforservicecompositioniniot
AT hamidsitihafizahab formalanalysisoftrustandreputationforservicecompositioniniot
AT ganiabdullah formalanalysisoftrustandreputationforservicecompositioniniot
AT abdelazizahmed formalanalysisoftrustandreputationforservicecompositioniniot
AT abakermohammed formalanalysisoftrustandreputationforservicecompositioniniot