Introduction
The Internet of Things (IoT) is a new computing pattern that is rapid growth and application with the development of wireless communication technologies [1]. IoT can incorporate seamlessly and transparently a large number of heterogeneous smart devices or end systems, while providing open access to selected subsets of data for the development of a plethora of digital services [2], [3]. Edge computing could optimize cloud computing systems by performing data processing at the edge of the distributed networks, and edge computing services significantly decrease the volumes of data that have to be traveled, cut down the consequent network traffic and the distance of data travelling [4]–[6]. Meanwhile, edge computing also covers a wide range of technologies, including IoT edge computing [7]–[12], mobile edge computing [5], [13]–[16], cloud computing [17]–[20], fog computing [21], [22], distributed data storage [23], [24], autonomic self-healing networks [25], remote cloud services [26], augmented reality [27], and so on [28], [29].
A. Motivation of This Work
The integration of IoT and edge computing is currently a new research hotspot [7]–[12]. However, the lack of trust between IoT edge devices has hindered the universal acceptance of edge computing as outsourced computing services. Trust calculation is currently considered as a survival foundation of distributed applications, such as IoT edge computing [10], ad hoc network [30], P2P computing [31], wireless sensor network [32], cloud computing [33]–[35] and many more [36]–[38]. Unlike traditional authentication mechanism in network security, trust computing mechanism provides dynamic behavior perceiving capability in service providing and it could take precautionary measures against malicious service behaviors from authenticated service providers [33], [34]. While as a complementary technology with traditional network security, trust mechanism solves the problem of providing the corresponding access control by judging quality of the service, and it makes traditional security services more reliable by ensuring that all communicating devices are trustworthy during service cooperation [35].
Various security risks and attacks have been introduced in IoT, including physical attacks on network devices and communication attacks, such as message forging, message tampering and reply attacks [39]. This situation leads to the lack of trust between IoT devices, which has hindered the universal acceptance of IoT edge computing as outsourced computing services. Therefore, IoT edge computing providers should establish trust to alleviate the concerns of numerous users [40]. To ensure the quality of collaborative service behaviors and help to establish trust between IoT edge devices, the trust mechanism is used, which is particularly relevant since devices in edge computing possess very different skill levels and diverse abilities, and there may even be malicious devices who maximize their own benefits. In fact, IoT edge computing is suffering from a variety of malicious behaviors such as fake feedbacks, bad-mouthing attacks and collusive cheating [41]. And how to construct an effective trust computing mechanism to ensure the successful implementation of the task, has become a hot topic in IoT edge computing applications and systems [10]. However, IoT edge computing services are also in the face of numerous serious challenges as well, of which one crucial issue is how to calculate trustworthiness of IoT devices in an edge computing environment.
Several scholars have been attracted by the trust problem of edge computing and some novel studies have been carried out [10], [39]–[44]. Such as, Soleymani et al. [39] proposed a secure trust model based on fuzzy logic in vehicular ad hoc networks in fog computing. Their solution can detect malicious attackers and faulty nodes, and overcomes the uncertainty and imprecision of data in vehicular networks in both line of sight and non-line of sight environments. Huang et al. [40] proposed a distributed reputation management for secure and efficient vehicular edge computing and networks. Numerical results indicate that their model has great advantage in optimizing misbehavior detections and improving cognitive level of misbehaving vehicles. Goh et al. [43] proposed three architectures for trusted data dissemination in edge computing. Their study shows that each scheme offers different security features, and imposes different demands on the edge servers, user machines and interconnecting network. Unfortunately, previous studies have some key limitations. Firstly, almost no study is designed for IoT edge computing to focus on the reliability issue of the trust computing mechanism itself. Secondly, most recent studies, such as [39] and [10], [41]–[44], completely ignore the problem of collusion or retaliation caused by the feedback mechanism itself, although feedback mechanism is undoubtedly a fundamental requirement for a trust calculation system, and this will reduce the reliability of these trust systems drastically. Thirdly, current studies are lack of adaptability in global trust aggregation calculation. Besides, many of previous studies, which using the subjective method for assigning weights to trust decision factors, cannot reflect the adaptability of trust decision process, and may lead to misjudgment of trust calculation. As we see, an universal and expanded trust scheme designed specifically for an IoT edge computing environment is still absent.
B. Our Contributions
Comprehensively considering rapidity, real-time, effectiveness, accuracy, and focusing on those issues of trust calculation in IoT edge computing, in this study, we originally propose a multi-source feedback based trust computing mechanism for IoT edge devices. First, due to the multi-source feedback mechanism is used for global trust calculation, our trust computing mechanism is more reliable to against bad-mouthing attacks caused by malicious feedback providers. Then, we adopt lightweight trust evaluating mechanism for cooperations of network devices in IoT edge computing, which is suitable for large-scale IoT edge computing because it facilitates low-overhead trust computing algorithms. At the same time, we adopt a feedback information fusion algorithm based on objective information entropy theory, which can overcome the limitations of traditional trust schemes, whereby the trust factors are weighted manually or subjectively.
To our best knowledge, based on the most fundamental requirements of IoT edge computing, this work is the first to construct an integration solving scheme for trust computing mechanism which can simultaneously meet effectiveness and reliability from the user’s point of view. The key features of the proposed trust computing mechanism go beyond existing approaches in terms of the following three aspects:
A trustworthy IoT edge computing architecture based on trust computing mechanism with cloud platform. We adopt the idea that GTD (global trust degree) of devices comprises three parts: direct trust (based on direct interaction records between devices), feedback trust from other edge devices and feedback trust from service brokers. The direct trust is a subjective evaluation for the quality of the service provided by edge devices. In IoT edge computing environments, feedback could provide an efficient and effective approach to build a reputation-based trust relationship between IoT edge devices. And our trust mechanism is more reliable because it integrates another important two feedback factors into edge devices evaluation.
A lightweight trust mechanism for cooperations of IoT edge devices. In the proposed multi-source feedback based trust computing mechanism, trust calculation is fully completed by broker layer and device layer, and it does not require the participation of the central network. Feedback is completely produced at the edge of the network, therefore, it would be more efficient to process the trust calculation at the edge of the network. Thus, it is suitable for IoT edge computing because it is low-overhead in trust computing.
A reliable and adaptive algorithm to aggregate overall trust of IoT devices based on objective information entropy theory. Trust in general is the level of confidence in a person or a thing. From the perspective of security and QOS guaranteeing, trust is used as a measure of provider’s competence in providing required service. Thus, as a dynamic and complex concept, trust should involve multidimensional decision-making factors. In this work, we adopt a feedback information fusion algorithm based on objective information entropy theory, which can overcome the limitations of traditional trust schemes, whereby the trust factors are weighted manually or subjectively. Thus, the proposed mechanism obtains better adaptability and higher reliability.
The remainder of the paper is organized as follows. Section II gives an overview of related work. Section III describes the IoT edge computing architecture with trust mechanism. Section IV outlines the details of feedback-based and hierarchical trust computing mechanism. The experimental results are presented in Section V. Section VI concludes the paper and presents directions for improvement.
Related Work
Several research groups both in academia and the industry are working in the area of trust mechanism in edge computing environment. This section will take an in depth look at the recent developments in this area.
Roman et al. [5] gave a survey and analysis of security threats and challenges in mobile edge computing. They analyze the issues of trusted edge computing from what a user would expect with respect to their data in terms of security and privacy. The authors pointed out that trust management is another security mechanism of which trust is great importance for edge paradigms. In this context, the concept of trust goes beyond the idea of “not knowing who I am interacting with,” which is mostly solved by implementing authentication mechanisms and establishing trust relationships between trust domains. The reason is simple: we also have to deal with the concept of uncertainty, or “not knowing how my partner is going to behave.” All entities have a variety of collaborating peers at their disposal: users can have various service providers available in their vicinity, service providers can choose from many infrastructure providers, and so on. However, such peers might not meet our expectations: the service latency might be high, the anomaly detection rate might be low, or the data might be inaccurate. There are even worse situations: peers might behave egoistically or maliciously. It is then necessary to seriously consider the deployment of trust management infrastructures in this context.
Soleymani et al. [39] proposed a secure trust model based on fuzzy logic in vehicular ad hoc networks in fog computing. The authors adopted a fuzzy trust model based on experience and plausibility is proposed to secure the vehicular network. The proposed trust model executes a series of security checks to ensure the correctness of the information received from authorized vehicles. Moreover, fog nodes are adopted as a facility to evaluate the level of accuracy of event’s location. The analyses show that the proposed solution not only detects malicious attackers and faulty nodes, but also overcomes the uncertainty and imprecision of data in vehicular networks in both line of sight and non-line of sight environments.
Huang et al. [40] proposed a distributed reputation management for secure and efficient vehicular edge computing and networks. The authors focus on reputation management to ensure security protection and improve network efficiency in the implementation of vehicular edge computing. A distributed reputation management system (DREAMS) is proposed wherein vehicular edge computing servers are adopted to execute local reputation management tasks for vehicles. The authoe utilize multi-weighted subjective logic for accurate reputation update in DREAMS. To enrich reputation usage in DREAMS, service providers optimize resource allocation in computation offloading by considering reputation of vehicles. Numerical results indicate that DREAMS has great advantages in optimizing misbehavior detection and improving recognition rate of misbehaving vehicles. Meanwhile, the authors demonstrate the effectiveness of their reputation based resource allocation algorithm.
Goh et al. [43] proposed three architectures for trusted data dissemination in edge computing. The authors aim to address the challenges of ensuring data integrity in edge computing. They study three schemes that enable users to check the correctness of query results produced by the edge servers. Two of the schemes are our original contributions, while the third is an adaptation of existing work. Their study shows that each scheme offers different security features, and imposes different demands on the edge servers, user machines, and interconnecting network. In other words, all three schemes are useful for different application requirements and resource configurations. To profile the security properties and resource requirements of the proposed schemes, they compare the schemes against a third scheme that is adapted from existing work. Their study shows that the three schemes present different security and resource tradeoffs, and are useful for different application scenarios and resource configurations.
Pinto et al. [10] proposed IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. The authors demonstrate how IIoTEED can meet the real-time and security requirements of IIoT edge devices, dictated by the three elements of CIA. They propose a TrustZone-based architecture that implements the basic building blocks of a TEE as a lower priority thread of a real-time operating system (RTOS). The RTOS was slightly modified to support trusted applications (TAs) and to schedule the REE only during the idle periods. Experiments demonstrate security is assured while the system’s real-time properties remain nearly intact.
Kim et al. [44] proposed a software update method in trusted connection of IoT networking. The proposed method employs low power wide area network (LPWAN) as long-range IoT networking technology and uses a mobile edge cloud to improve computing efficiency in an access network that consists of IoT devices with insufficient resources. In the proposed method, the mobile edge cloud is integrated into a gateway, and processes sensing data and remote software updates of LPWAN. IoT devices can receive software functions from the mobile edge cloud. The proposed method analyzes statistical information about connections in an access network and determines the LPWAN trusted connections. Then, software updates can be performed over the trusted connection. Using trusted connections leads to an increased packet delivery rate and reduced transmission energy consumption. The proposed method is compared to currently available systems through computer simulation and the proposed method’s efficiency is validated.
As mentioned above, recent studies ignored the problem of collusion or retaliation caused by the feedback mechanism itself, although feedback mechanism is undoubtedly a fundamental requirement for a trust system, and this will reduce the reliability of these trust systems drastically. At the same time, current studies are lack of adaptability in global trust aggregation calculation. Besides, many of previous studies, which using the subjective method for assigning weights to trust decision factors, cannot reflect the adaptability of trust decision process, and may lead to misjudgment of trust calculation. A reliable and lightweight trust mechanism designed specifically for IoT edge devices is still needed.
IoT Edge Computing Architecture With Trust Mechanism
In this section, we first present the IoT edge computing architecture, which is based on multi-source feedback trust computing mechanism. We also discuss the main attack patterns that threaten the establishment of a trust relationship in IoT edge computing applications.
A. Edge Computing Architecture With Trust
Fig. 1 shows the trustworthy edge computing architecture based on multi-source feedback fusion computing mechanism with cloud platform. Edge computing pushes part of the calculation task from cloud data centers to proxy servers at the edge of the network when data processing, and this will bring several potential advantages. Such as, dealing with applications at the edge reduces network latency and produces faster responses to service requests from users; adding edge servers close to device clusters is likely to be a cheaper way to achieve scalability than fortifying the servers in the cloud data center and also could provide more network bandwidth for users; by lowering the dependency on cloud data center, edge computing removes the single point of failure in the infrastructure, and this will reduce its susceptibility to denial of service attacks and improve service availability [43].
IoT edge computing architecture based on multi-source feedback trust computing mechanism with cloud platform.
As shown in Fig. 1, the IoT edge computing architecture based on feedback trust computing mechanism comprises three layers: network layer, broker layer and device layer.
First, about network layer. Network layer is supported by the traditional cloud computing platform. The central server that hosts the master database is located within a professionally managed cloud data center. Cloud computing promises more power, safer data, and easier access to the information and tools needed for success in any industry or organization. In this condition, we can assume that the cloud data center is reliable and always available, while attacks and other risks to the central server are beyond the scope of this work.
Second, about broker layer. Broker layer is used to monitor service behavior of IoT devices and to aggregate feedback from IoT devices. As we know, in an open edge computing environment, there may be a large number of undependable (or malicious) devices and feedback from these undependable devices will yield incorrect evaluation results. However, currently, limited work is focus on a reliable feedback mechanism for an edge computing environment. Hence, we extend traditional feedback mechanisms so that feedback can come from not only devices but also brokers, and then effectively reduce networking risk and improve system reliability. More importantly, different from the traditional feedback aggregation mechanisms, in the proposed trust mechanism, trust aggregating calculation based on feedback information is entirely undertaken by brokers. This can reduce the energy costs of devices, and make the proposed trust mechanism a lightweight scheme from perspective of device energy cost.
And the third, about device layer. Device layer consists of various IoT edge devices. In the process of service coordination, multiple participating devices communicate with the brokers through the Internet via WiFi or cellular access points. Devices are divided into different domains based on their location and features, and each domain is managed by a broker. In the area of wireless computer networking, the broker’s mission can be borne by the base station, and it is a radio receiver/transmitter that serves as the hub of the local wireless network, and may also be the gateway between a wired network and the wireless network. It typically consists of a low-power transmitter and wireless router. After completing a service collaboration, both IoT devices will submit mutual evaluation information to the broker. Before collaborative service of two devices, a device will send a request message to its broker for the trustworthiness of the collaborator.
B. Trust Relationship Analysis in IoT Edge Computing
In the proposed multi-source feedback based trust mechanism, trust calculation is fully completed by broker layer and device layer, and it does not require the participation of the central network. Feedback is increasingly produced at the edge of the IoT network, therefore, it would be more efficient to process the trust calculation at the edge of the network. If all feedback needs to be sent to the cloud for processing, the response time would be too long, not to mention that current network bandwidth and reliability would be challenged for its capability of supporting a large number of IoT devices in one area. In this case, the process of trust calculation needs to be executed at the edge for shorter response time, more efficient executing and less network pressure.
Based on the inherent relationship between IoT devices and brokers, we first study and construct a trust mechanism systematically based on feedback from both devices and brokers first (Fig. 1). In Fig. 1, according to the function of the network devices in edge computing, there are total two kinds of sources involved in feedback providing - devices and brokers, therefore two kinds of entity sets can be formed - a device set (
Definition 1 [Direct Trust About a Deviced_{j}
to Another Deviced_{i}
(Called D-to-D Direct Trust)]:
So-called D-to-D direct trust is a quantified value in the competence of a device to complete the requesting task, which is based on history of interactive records between the two devices.
Definition 2 [Feedback Trust From a Brokerb_{k}
About a Deviced_{j}
(Called B-to-D Feedback Trust)]:
B-to-D feedback trust is a rating based on the broker’s objective calculation. A broker
Definition 3 (Overall Trust From a Deviced_{j}
to Another Deviced_{i}
(Called D-to-D Overall Trust)]:
So-called D-to-D overall trust is a quantified value in the competence of a device (the device is the object of trust evaluation) to complete the requesting task. Trust calculation is based on direct trust, and feedback from its broker.
Definition 3 shows that D-to-D overall trust is a result of fusion calculations by multiple trust factors, including D-to-D direct trust and multiple devices’ feedback information. In traditional trust computing mechanisms, such as in [40], trust mainly comes from D-to-D direct evaluation, which could bring many issues, such as malicious attacks and feedback sparseness. While, in the proposed scheme, trust comes from multiple devices’ feedback information. At the same time, we adopt an efficient, fast and adaptive algorithm to aggregate overall trust of an IoT device based on objective information entropy theory, which can overcome the limitations of traditional trust schemes, whereby the trust factors are weighted manually or subjectively. Hence, this feedback mechanism possesses higher reliability and could effectively reduce networking risk and improve system reliability.
Through analysis of Definitions 1–3, the proposed trust mechanism needs to maintain overall trust for devices. In this work, B-to-D feedback trust is represented by
Algorithm 1 Overall Trust of a Device d_{i}
to Another Device d_{j}
Input: a device set (
Output:
Begin
device
if (
for (z=1 to
end for
end if
End
Different from the traditional feedback aggregation mechanism, from Algorithm 1, within the feedback trust aggregation, the B-to-D feedback trust of a device is evaluated by its broker. Thus each device does not need to maintain the feedback from other devices, which will reduce the communication overhead and eliminate the possibility of a bad-mouthing attack by compromised devices.
Trust and Feedback Calculation
As shown in Definitions 1–3, there are one direct trust relationship and one indirect feedback relationship in the proposed trust computing mechanism. Calculation approaches for these trust factors are different because their properties are fully heterogeneous. In this section, we will present the related computing mechanisms for these trust factors.
A. Trust Factors Calculation
1) D-to-D Direct Trust Calculation
D-to-D direct trust is given by the knowledge of the devices’s nature or past interactions in the service cooperation, without requesting information from a trusted third party (TTP). D-to-D direct trust is generated every time after an interaction takes place. Supposing that \begin{equation} h_{d_{i},d_{j}}(\Delta t)=\{{\tau ^{(1) }_{d_{i},d_{j}},\tau ^{(2) }_{d_{i},d_{j}},\cdots,\tau ^{(z)}_{d_{i},d_{j}},\cdots,\tau ^{(\Delta t)}_{d_{i},d_{j}}}\} \end{equation}
For the sake of risk reduction, D-to-D direct trust is defined as the following risk probabilistic model:\begin{equation} D_{d_{i},d_{j}}(\Delta t)=\frac {\left({\sum h_{d_{i},d_{j}}(\Delta t)^{+}}\right)+1}{\left({\sum h_{d_{i},d_{j}}(\Delta t)^{+}}\right)+\left({\sum h_{d_{i},d_{j}}(\Delta t)^{-}}\right)+2}\quad \end{equation}
2) B-to-D Feedback Trust Calculation
Supposing that there are \begin{align}&\hspace {-1.1pc}f_{b_{k}\rightarrow d_{j}}(\Delta t)\notag \\=&~\left ({\begin{array}{ccccccc} D_{d_{1},d_{1}}(\Delta t) &\quad \cdots &\quad D_{d_{i},d_{1}}(\Delta t)&\quad \cdots &\quad D_{d_{n},d_{1}}(\Delta t) \\ D_{d_{1},d_{2}}(\Delta t) &\quad \cdots &\quad D_{d_{i},d_{2}}(\Delta t)&\quad \cdots &\quad D_{d_{n},d_{2}}(\Delta t) \\ \cdots &\quad \cdots &\quad \cdots &\quad \cdots &\quad \cdots \\ D_{d_{1},d_{j}}(\Delta t) &\quad \cdots &\quad D_{d_{i},d_{j}}(\Delta t) &\quad \cdots &\quad D_{d_{n},d_{j}}(\Delta t) \\ \cdots &\quad \cdots &\quad \cdots &\quad \cdots &\quad \cdots \\ D_{d_{1},d_{n}}(\Delta t) &\quad \cdots &\quad D_{d_{i},d_{n}}(\Delta t)&\quad \cdots &\quad D_{d_{n},d_{n}}(\Delta t) \\ \end{array} }\right)\notag \\ {}\end{align}
Algorithm 2 B-to-D Feedback Trust Calculation Based on Objective Information Entropy Theory
Input: the normalized matrix
Output:
Begin
for (i=1 to
for (j=1 to
According to the definition of information entropy, calculate information entropy of each data in
if (
we can set
end if
end for
end for
According to information entropy theory, we can obtain a series
Calculate the weight of each index through information entropy:
Calculate F-to-D feedback trust:
End
In Algorithm 2, we adopt a feedback information fusion algorithm based on objective information entropy theory, which can overcome the limitations of traditional trust schemes, whereby the trust factors are weighted manually or subjectively. Thus, the proposed trust computing mechanism is more reliable to against bad-mouthing attacks caused by malicious feedback providers.
B. Aggregation of Global Trust
Through Eqs. (1), (2) and Algorithm 2, we get two trust factors, D-to-D direct trust \begin{equation} G_{d_{i},d_{j}}(\Delta t)=\varpi *D_{d_{i},d_{j}}(\Delta t)+(1-\varpi)*F_{b_{k},d_{j}}(\Delta t)\quad \end{equation}
\begin{equation} \varpi =\frac {1}{1+\sqrt {\sum h_{d_{i},d_{j}}(\Delta t)^{-}}} \end{equation}
C. Analysis of Time Complexity and Space Complexity
The proposed trust computing mechanism is a lightweight scheme. Unlike most existing feedback or trust models which rely on broadcast-based strategy to collect feedback from the whole cluster and consequently increasing the system communication overhead significantly, our trust mechanism does not utilize a broadcast-based strategy but instead sets the value of feedback based on the feedback reported by the broker about a specific device. Thus, each device does not need to share trust information with its collaboration devices.
Theorem 1:
Space complexity. Using the proposed trust computing mechanism, the maximum communication overhead which involves in trust information delivering is no more than \begin{equation*} total_{message}(\Delta t)=m*(n+2n)*\delta =3mn\delta \end{equation*}
Proof:
Supposed that the IoT edge computing consists of
According to Fig.2, in B-to-D trust computing based on feedback information, device
Theorem 1. shows that the communication overhead of our trust computing mechanism is linear growth with the number of devices and the number of clusters. This feedback aggregating algorithm is lightweight and need less space overhead, compared with traditional feedback aggregation mechanisms, such as broadcasting mechanism. Given that the feedback between devices need not be considered, this mechanism can significantly reduce network communication overhead, thus improving system resource efficiency. This feedback aggregating mechanism has other advantages such as the effective mitigation of the effect of malicious feedback, thereby reducing the networking risk in an open or hostile edge computing environment.
Theorem 2:
Time complexity. Using the proposed trust computing mechanism, the total time complexity of D-to-D overall trust computing is no more than \begin{equation*} total_{time}(\Delta t)=O(n^{2}) \end{equation*}
Proof:
Supposed that the IoT edge computing consists of
According to Algorithm 2, in a given time window
Theorem 2 shows that the time complexity of the proposed trust computing mechanism is far superior to some existing schemes, such as the fuzzy-based trust mechanism, whose the time complexity is
Experiment-Based Analysis and Evaluation
In this section, we first describe how to set up the experimental methodology in a simulated IoT edge computing environment, including how to deploy the proposed trust scheme on the simulated environment and how to set the experiment configurations. Then, the experimental results are reported.
A. Experimental Methods and Parameters
To validate and analyze the effectiveness of the proposed trust computing mechanism, extensive experiments have been conducted by using the NetLogo event simulator [32], which provides a multi-agent programmable modeling environment, and is implemented in JAVA in the AI community. It can easily model the parallel and independent agents to simulate interacting entities among IoT edge computing environment. For the purpose of comparison, we also add PSM (Personalized Similarity Measure) [40] and DRM (Distributed Reputation Management) [40] into the simulator, because the proposed mechanism, PSM and DRM are independent of any specific routing mechanisms in IoT edge computing environment.
In the proposed trust computing mechanism based on multi-source feedback aggregation, the main threat is caused by malicious feedback from IoT edge devices. We have designed several performance mechanisms for a comprehensive comparison with other trust mechanisms. Due to the restrictions of paper length, we mainly evaluate the performance based on the following two aspects: computational efficiency and reliability under different percent of malicious devices.
In order to make the experiments more close to a real IoT computing environment, two kinds of devices are deployed in the simulator based on their identities totally-edge devices and brokers. The feedback provider (FP) can be one of two types: honest devices (HDs) or malicious devices (MDs). And a HD always provides the correct feedback for any devices, whereas a MD always gives an opposite feedback of the actual data for other devices. In the simulator, the behavior of a broker as a feedback provider can always be trustworthy, because the brokers are managed by some TTP (such as well-known cloud service providers).
The simulation parameters used in the experiments are listed in Table 1. The configuration of simulated computer is CPU 3.4G, memory size 16G and hard disk 1T. There are total 1000 devices deployed in the simulator, and total 20 brokers deployed in the network. The total time-steps of simulation running is 200, and the time-window for trust computing is 20. The percentage of MDs is set to 10%, 20% and 40%. The percentage of collaborative devices (PCD) is set 10%, 20% and 40%, which means the IoT edge computing system correspondingly are idle, busy and highly busy.
B. Evaluation of Computational Efficiency
We use global convergence time (GCT) to evaluate the computational efficiency of the proposed trust mechanism. GCT is the total time of trust aggregation. GCT is useful to evaluate the computational efficiency of the whole network system [31]. Most previous works focused on the system behavior when the system is stable. Here we argue that the convergence time is an important metric to measure how fast the system can reach a stable state, especially in a dynamic and large-scale IoT computing environment.
Figs. 4 to 6 show the compared outcomes of GCT under an IoT edge computing network with 1000 devices. In this group of experiment, we set the percentage of MDs to 10%, 20% and 40%, which respectively indicates that the IoT network environment is relatively honest, dishonest and highly dishonest. In Fig. 4, proportion of MDs is 10%, and PCD is 10%, which means the system is idle and honest. The proposed trust mechanism outperforms PSM and DRM from the viewpoint of GCT. In this relatively honest IoT computing environment, the GCT of the proposed trust mechanism is close to that of PSM and DRM.
In Fig. 5, proportion of MDs is 20%, and PCD is 20%, which means the system is busy and dishonest, in which 20% devices are dishonest and 20% devices requests cooperation with other devices. The same as in Figs. 4, the proposed trust mechanism outperforms PSM and DRM from the viewpoint of GCT. In this dishonest and busy IoT edge computing environment, the GCT of the proposed trust mechanism is obviously less than that of PSM and DRM. With the rapid increase in the network scale, GCT increases regularity in the proposed trust mechanism. This shows that the proposed trust mechanism has better computational efficiency than PSM and DRM in a dishonest and busy IoT computing environment.
In Fig. 6, proportion of MDs is 40%, and PCD is 40%, which means the system is a highly busy and highly dishonest, in which 40% devices are dishonest and 40% devices request cooperation with other devices. From Fig. 6, the proposed trust mechanism outperforms PSM and DRM from the viewpoint of GCT. In this highly dishonest and highly busy IoT computing environment, the GCT of the proposed trust mechanism is only the half that of PSM and DRM. This shows that the proposed trust mechanism has better computational efficiency than PSM and DRM in a highly dishonest and highly busy IoT computing environment.
As mentioned above, the proposed trust computing mechanism is a lightweight scheme. In our trust mechanism, a device does not utilize a broadcast-based strategy to collect feedback information. Feedback trust aggregating task is mainly undertaken by the brokers. One of the advantages of this mechanism is that it can improve system efficiency and decrease global convergence time of trust aggregation. Another reason for performance improvement is that we adopt an efficient, fast and adaptive algorithm to aggregate overall trust of a collaborative device based on objective information entropy theory. This method can also improve system efficiency and decrease global convergence time of trust aggregation.
C. Reliability With Different Percent of MDs
We compute the task failure ratio (TFR) [32] to reflect the reliability of the trust computing systems. A lower value of TFR indicates a higher reliability of the trust mechanism. In this group of experiments, we suppose that most brokers in the IoT edge computing are trustworthy collaborators. And this IoT edge computing environment closely resembles an actual situation, where most brokers are honest and trustworthy. There kinds of edge computing environment are considered in this group experiments:(1) an honest and idle IoT computing environment; (2) a busy and dishonest IoT computing environment; (3) a highly dishonest and highly busy IoT computing environment.
Figs. 7 to 9 show the comparison results of the task failure ratio in different percentages of MDs. In this group of experiments, we suppose that this IoT computing environment is a trustworthy network community, where all of the brokers are honest. We set the percentage of MDs to 10%, 20% and 40%, which respectively indicates that the network environment is honest, dishonest and highly dishonest. Fig. 7 shows an honest and idle network environment, where the percentage of MDs is only 10%. All the three kinds of network environments have a low value of task failure ratio, which are averagely less than 13.21%. These results reflect that the three kinds of network environments exhibit high reliability with few malicious nodes.
In order to evaluate the performance of the trust mechanism in a more dynamic network environment, we gradually increase the proportion of MDs. In Fig. 8, proportion of MDs is 20%, and PCD is 20%, which means the system is dishonest. The results indicate larger differences compared with that when MDs is set to 10%. With the increase of the percentage of MDs, the performance of PSM and DRM mechanism exhibits a marked decline. In Fig. 8, when the proportion of MDs is set to 20%, the task failure ratio of PSM averagely increases to 20.45%, and the task failure ratio of DRM mechanism is up to 24.28%. This shows that the proposed trust mechanism has lower task failure ratio than PSM and DRM in a dishonest and busy IoT computing environment.
In Fig. 9, proportion of MDs is 40%, and PCD is 40%, which means the system is highly busy and highly dishonest, in which 40% devices are dishonest and 40% devices requests cooperation with other devices. From Fig. 9, the proposed trust mechanism outperforms PSM and DRM from the viewpoint of TFR. When the proportion of MDs is set to 40%, the task failure ratio of the proposed trust mechanism is 33.71, and the task failure ratio of PSM increases to 44.21%, and the task failure ratio of DRM is up to 53.37% or higher. These results are consistent with the actual situation, i.e., in a highly dishonest network environment, MDs may conduct bad-mouthing attacks, which can significantly affect the performance of IoT edge computing.
A robust trust mechanism should have a strong ability against malicious feedback behavior from MDs. As mentioned above, in this work, we adopt a feedback information fusion algorithm based on objective information entropy theory, which can overcome the limitations of traditional trust schemes, whereby the trust factors are weighted manually or subjectively. This mechanism can significantly improve the successful implementation of the task and decrease the task failure ratio. At the same time, in D-to-D overall trust aggregating calculation, we adopt an adaptive aggregating approach, which can overcome insignificance in traditional method. This mechanism can also improve the successful implementation of the task and decrease the task failure ratio.
Conclusion
The IoT allows objects to be sensed or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit in addition to reduced human intervention. Edge computing services significantly decrease the volumes of data that have to be traveled, cut down the consequent network traffic and the distance of data travelling, and thereby reducing transmission costs, shrinking latency and improving quality of services. Currently, the integration of IoT and edge computing is a new research hotspot [7]–[12]. However, the lack of trust between IoT edge devices has hindered the universal acceptance of IoT edge computing as outsourced computing services. In order to increase the adoption of IoT edge computing applications, firstly, IoT edge computing architecture should establish trust to alleviate the concerns of numerous users.
In this work, we proposed a reliable and lightweight trust mechanism for IoT edge devices based on multi-source feedback information fusion. First, due to the multi-source feedback mechanism is used for global trust calculation, our trust computing mechanism is more reliable against bad-mouthing attacks caused by malicious feedback providers. Then, We adopt lightweight trust evaluating mechanism for cooperations of network devices in IoT edge computing, which is suitable for large-scale IoT edge computing because it facilitates low-overhead trust computing algorithms. At the same time, we adopt a feedback information fusion algorithm based on objective information entropy theory, which can overcome the limitations of traditional trust schemes, whereby the trust factors are weighted manually or subjectively. And the experimental results show that the proposed trust computing mechanism significantly outperforms existing approaches in both computing speed and reliability.
However, there are still many open issues and much improvement we can apply to the current trust computing mechanism. First, we are interested in combining trust management with incentive mechanism to encourage collaboration between IoT devices. And implementing and evaluating our proposed trust computing mechanism on various IoT computing systems, such as Internet of Vehicles, is another direction for future research.