skip to main content
10.1145/3098954.3098976acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
short-paper

M2M-REP: Reputation of Machines in the Internet of Things

Published: 29 August 2017 Publication History

Abstract

The Internet of Things (IoT) is the integration of a large number of autonomous heterogeneous devices that report information from the physical environment to the monitoring system for analytics and meaningful decisions. The compromised machines in the IoT network may not only be used for spreading unwanted content such as spam, malware, viruses etc, but can also report incorrect information about the physical world that might have a disastrous consequence. The challenge is to design a collaborative reputation system that calculates trustworthiness of machines in the IoT-based machine-to-machine network without consuming high system resources and breaching the privacy of participants. To address the challenge of privacy preserving reputation system for the decentralized IoT environment, this paper presents a novel M2M-REP (Machine to Machine Reputation) system that computes global reputation of the machine by aggregating the encrypted local feedback provided by machines in a fully decentralized and secure way. The privacy of participating machines is well protected such that machines or analyst would not learn any information about the feedback score provided by the participating machines other than the final aggregated statistical score. We present a decentralized reputation aggregation system for two scenarios: a semi-honest (honest-but-curious) setup where machines are trustworthy in providing feedback but are curious to learn sensitive information about the collaborating machines, and the malicious model where machines not only try to learn the sensitive information of participants but also do not follow the protocol specification in providing feedback. We analyzed the security and privacy properties of the M2M-REP system for different adversarial models.

References

[1]
D. Evans, "The internet of things how the next evolution of the internet is changing everything," White Paper Cisco Internet Business Solutions Group (IBSG), 2011.
[2]
G. Intelligence, "Cellular m2m forecasts: unlocking growth cellular m2m connections forecast to reach 1 billion by 2020," 2015.
[3]
B. TECH, "Fridge sends spam emails as attack hits smart gadgets," 2014.
[4]
X. Lin, "Cat: Building couples to early detect node compromise attack in wireless sensor networks," in GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, Nov 2009, pp. 1--6.
[5]
M. Nitti, R. Girau, and L. Atzori, "Trustworthiness management in the social internet of things," IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 5, pp. 1253--1266, May 2014.
[6]
Z. Yan, W. Ding, V. Niemi, and A. V. Vasilakos, "Two schemes of privacy-preserving trust evaluation," Future Generation Computer Systems, vol. 62, pp. 175--189, 2016.
[7]
D. Niyato, L. Xiao, and P. Wang, "Machine-to-machine communications for home energy management system in smart grid," IEEE Communications Magazine, vol. 49, no. 4, pp. 53--59, April 2011.
[8]
I. Stojmenovic, "Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyber-physical systems," IEEE Internet of Things Journal, vol. 1, no. 2, pp. 122--128, April 2014.
[9]
C. Efthymiou and G. Kalogridis, "Smart grid privacy via anonymization of smart metering data," in 2010 First IEEE International Conference on Smart Grid Communications, Oct 2010, pp. 238--243.
[10]
A. Narayanan and V. Shmatikov, "De-anonymizing social networks," in Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, ser. SP '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 173--187.
[11]
M. Joye and B. Libert, A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 111--125.
[12]
A. Michalas and N. Komninos, "The lord of the sense: A privacy preserving reputation system for participatory sensing applications," in 2014 IEEE Symposium on Computers and Communications (ISCC), June 2014, pp. 1--6.
[13]
E. Pavlov, J. S. Rosenschein, and Z. Topol, Supporting Privacy in Decentralized Additive Reputation Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 108--119.
[14]
N. Rishab and R. Karthik, "Fuzzy privacy preserving peer-to-peer reputation management," IACR Cryptology ePrint Archive, 2009.
[15]
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The eigentrust algorithm for reputation management in p2p networks," in Proceedings of the 12th International Conference on World Wide Web, ser. WWW '03. New York, NY, USA: ACM, 2003, pp. 640--651.
[16]
O. Hasan, L. Brunie, E. Bertino, and N. Shang, "A decentralized privacy preserving reputation protocol for the malicious adversarial model," IEEE Transactions on Information Forensics and Security, vol. 8, no. 6, pp. 949--962, June 2013.
[17]
O. Hasan, L. Brunie, and E. Bertino, "Preserving privacy of feedback providers in decentralized reputation systems," Comput. Secur., vol. 31, no. 7, pp. 816--826, Oct. 2012.
[18]
S. Clauß, S. Schiffner, and F. Kerschbaum, "K-anonymous reputation," in Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ser. ASIA CCS '13. New York, NY, USA: ACM, 2013, pp. 359--368.
[19]
F. Hao, P. Y. A. Ryan, and P. Zielinski, "Anonymous voting by two-round public discussion," IET Information Security, vol. 4, no. 2, pp. 62--67, June 2010.

Cited By

View all
  • (2024)Secure Rating Computation on Weighted Signed Network for Supply Chain NetworkJournal of Information Processing10.2197/ipsjjip.32.71032(710-718)Online publication date: 2024
  • (2024)A Systematic Review of Blockchain-Based Privacy-Preserving Reputation Systems for IoT ApplicationsDistributed Ledger Technologies: Research and Practice10.1145/36741563:4(1-40)Online publication date: 20-Jun-2024
  • (2024)Reputation Systems for Supply Chains: The Challenge of Achieving Privacy PreservationMobile and Ubiquitous Systems: Computing, Networking and Services10.1007/978-3-031-63989-0_24(464-475)Online publication date: 19-Jul-2024
  • Show More Cited By

Index Terms

  1. M2M-REP: Reputation of Machines in the Internet of Things

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security
    August 2017
    853 pages
    ISBN:9781450352574
    DOI:10.1145/3098954
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 August 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Decentralized Reputation
    2. Machine 2 Machine
    3. Privacy Protection
    4. Secure Computation
    5. Trust

    Qualifiers

    • Short-paper
    • Research
    • Refereed limited

    Conference

    ARES '17
    ARES '17: International Conference on Availability, Reliability and Security
    August 29 - September 1, 2017
    Reggio Calabria, Italy

    Acceptance Rates

    ARES '17 Paper Acceptance Rate 100 of 191 submissions, 52%;
    Overall Acceptance Rate 228 of 451 submissions, 51%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Secure Rating Computation on Weighted Signed Network for Supply Chain NetworkJournal of Information Processing10.2197/ipsjjip.32.71032(710-718)Online publication date: 2024
    • (2024)A Systematic Review of Blockchain-Based Privacy-Preserving Reputation Systems for IoT ApplicationsDistributed Ledger Technologies: Research and Practice10.1145/36741563:4(1-40)Online publication date: 20-Jun-2024
    • (2024)Reputation Systems for Supply Chains: The Challenge of Achieving Privacy PreservationMobile and Ubiquitous Systems: Computing, Networking and Services10.1007/978-3-031-63989-0_24(464-475)Online publication date: 19-Jul-2024
    • (2022)Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A SurveyACM Computing Surveys10.1145/349023655:2(1-37)Online publication date: 18-Jan-2022
    • (2022)REPUTABLE–A Decentralized Reputation System for Blockchain-Based EcosystemsIEEE Access10.1109/ACCESS.2022.319403810(79948-79961)Online publication date: 2022
    • (2019)TrustVote: Privacy-Preserving Node Ranking in Vehicular NetworksIEEE Internet of Things Journal10.1109/JIOT.2018.28808396:4(5878-5891)Online publication date: Aug-2019
    • (2019)COLIDE: a collaborative intrusion detection framework for Internet of ThingsIET Networks10.1049/iet-net.2018.50368:1(3-14)Online publication date: Jan-2019
    • (2019)Computing over encrypted spatial data generated by IoTTelecommunications Systems10.1007/s11235-018-0479-470:2(193-229)Online publication date: 1-Feb-2019
    • (2018)A novel framework for collaborative intrusion detection for M2M networks2018 9th International Conference on Information and Communication Systems (ICICS)10.1109/IACS.2018.8355434(12-17)Online publication date: Apr-2018
    • (2018)Interval evaluation of trust and reputation for Internet of Things2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)10.1109/DESSERT.2018.8409123(179-183)Online publication date: May-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media