Abstract
Accurate prediction of the trust relationship is the basis for trusted access and secure interaction between Internet of things nodes. To evaluate the degree of trust, a trust metric is assigned to every node depending on its several attributes. Normal nodes in Internet of things tend to suffer collusion attacks from malicious nodes; thus, the accuracy of the trust measurement decreases. To enhance the security of interaction between massive Internet of things nodes, we propose a multidimensional attribute trust model and a dynamic maintenance mechanism of a trusted group. The proposed model provides a reference for the selection and evaluation of node multidimensional attribute factors to adapt to different Internet of things application scenarios. The dispersion of satisfaction records is used to discover abnormal data and weaken its influence on the calculation of the node’s comprehensive trust evaluation. The construction of trusted groups provides an architectural foundation for the application of group signature that maintains low network overhead. The performance of multidimensional attribute trust model and dynamic maintenance mechanism is verified using Netlogo. Simulation results show the efficiency of the proposed model to classify the malicious nodes and honest nodes, as well as to build a trusted group that could ensure honest nodes occupy the major proportion.
Introduction
IoT (Internet of things) consists of multiple information sensors. These entities interact with others to implement intelligent perception, recognition, and management of objects and process through various network access. It covers scenes in Smart Cyber-Physical Systems 1 that require high connection density such as Smart Transportation 2 , Smart City 3 , Smart Grid 4 , etc. IoT meets people’s needs for digital society and will further open the era of “Internet of Everything.”
Security is one of the main concerns in IoT. The IoT contains terminal devices that have strict requirements on network delay. These devices are related to personal safety, such as a wearable sphygmomanometer connected to the hospital. Attacks on IoT will endanger the personal safety and cause serious consequences. The focus of relevant research about security is mainly divided into two aspects: privacy preservation mechanism and trust evaluation scheme. For the former, scholars have proposed algorithms to conceal the physical status 5 while maintaining a low resource consumption 6 . As for the latter, an efficient and comprehensive interaction mechanism for trusted access of IoT nodes needs to be considered in a targeted manner.
Trusted access depends on an accurate prediction of the trust relationship. Researchers in related fields use different trust metric approaches to quantify the degree of trust between nodes as trust value. Trust value is mainly calculated with either direct or indirect evaluation. Behavioral attributes and weighting factors are considered to ensure the robustness of the trust computing process. Realistic application scenarios require to shorten the recommended trust chain and reduce the cost of trust assessment, and then enable efficient determination of node properties and interactive decision as well.
Trust model can be divided into two types of architectures: centralized and distributed frameworks. The centralized trust model delegated a central node to calculate trust value and manage other nodes. For the distributed trust model, each node completes the trust evaluation of other entities independently. Each node can be both a truster and a trustee. Considering the actual application situation, the trust model is required to minimize the operator’s security management costs and improve access efficiency. However, the evaluation factors of traditional trust models are less considered. Their limitations are greater and result in a greatly reduced practicality. A security strategy that provides corresponding security protection under low latency constraints and has less impact on its performance is required. Therefore, massive IoT nodes require more efficient, fine-grained, and reliable trust modeling. This has become a huge challenge for the security of trust access in IoT.
This article focuses on the multiple environments of IoT and proposes a fine-grained trust model. Also, we comprehensively consider the impact of malicious node attacks and camouflage behavior and the occasional abnormal behavior of normal nodes. The proposed trust model implements efficient prediction as well as interactive decision and management of trust relationships between entities.
There is a contradiction between network security performance and network energy consumption, and the computing and storage capabilities of nodes are limited. The approach to finding a balance between security and energy consumption to ensure the coexistence of performance advantages and security of the IoT requires further research. Considering that certain nodes among the massive IoT nodes of the same nature belong to a group and the group restricts individuals, it is possible to formulate individual trust evaluation rules by introducing group trust specifications. This method of constructing trust groups could also provide new ideas for fast and reliable access between massive IoT nodes. The main contributions of this article are as follows:
We propose a multidimensional attribute factor selection and evaluation method to provide a more comprehensive reference for trust evaluation. Then we adopt the dispersion-based anomaly metric identification method to weaken the impact of the attack on the comprehensive credibility calculation and improve the success rate of node interaction.
We propose a multidimensional attribute trust model (MATM) that combines centralized and distributed trust management to accurately measure the credibility of nodes.
We provide a feasible trustworthy division scheme for massive IoT nodes. Through building a trustworthy group, we could reduce the cost of security verification. We also propose a dynamic maintenance mechanism (DMM) for trusted groups to further ensure reliability and effectiveness.
The rest of the article is organized as follows. Section “Related work” presents some existing related works. Section “Proposed trust model” details the proposed Trust Model. Section “Trusted group” shows the steps to build and maintain a trusted group. In section “Simulated results,” simulation results evaluate the performance of our trustworthy division scheme. The conclusion is given in section “Conclusion.”.
Related work
In this section, we review the existing trust models and observe their limitations and advantages. Trust is a concept derived from human sociology. In recent years, researchers in related research fields have given a variety of trust cognition modeling methods. Mike et al. 7 correlated trust with risks and threats and established a direct link between trust and risk through trust research in multiple contexts.
Researchers built the trust model through their trust cognition and quantification; thus, the models reflected a different performance. Xie and Wei 8 proposed a node dynamic trust evaluation method (IDTEM) for the IoT, characterized node behavior, and suppressed malicious recommendations. But IDTEM requires a detailed distinction between the cooperation modes of devices in specific application scenarios and has poor versatility. Ye et al. 9 expressed the trust relationship between workers and requesters by constructing a crowdsourcing trust network CTN and analyzing threat patterns in the trust vector Worker Trust Vector (WTV) as a global trust score. Hu et al. 10 added the core behavior to describe the behavior characteristics of the entity, and the risk evaluation factor is added during the calculation process, but the semantic model large-scale distributed system trust model (LSDM) proposed in the article does not completely cover the concept of the trust model and gradually falls as the number of nodes increases. Pawar et al. 11 proposed a reputation mechanism for computing cloud service providers, and trust uncertainty is more accurately described based on evidence.
The trust model is designed to complete the framework of trust evaluation. The trust model aims to solve internal attacks and to identify the malicious nodes and improve the reliability of the system. The focus of the research is the approach to improve the trust model on their performance. Based on the model responsible for trust computing and management tasks, the trust model is classified into centralized and distributed. We are going to discuss the limitations and advantages of both.
Centralized trust model
The centralized trust model includes a reputation center (certification center/trust center). Niu et al. 12 proposed a trust model based on the cloud model which unifies the randomness and uncertainty of the trust description and can efficiently carry out trust propagation and merge operations, but the trust cloud synthesis algorithm among them has high computational complexity and low scalability. Mohsenzadeh et al. 13 proposed a trust model based on fuzzy mathematics according to the success and failure interactions between cloud entities based on trust attributes and semantics. This model has a certain capability of collaborative deception identification and tolerance, but the accuracy of discrimination between honest and malicious entities is relatively low. As an extension of cloud computing, fog computing is considered to be a relatively more secure and efficient environment. Therefore, scholars have designed new trust evaluation scheme for the fog computing environment. Al-khafajiy et al. 14 proposed a fog COMputIng Trust manageMENT (COMITMENT) approach to manage the trust level of nodes in fog computing environment, and the approach were able to reduce the malicious attacks.
At present, there are few studies on the centralized trust model, mainly due to its two serious shortcomings:
Poor scalability: Centralized trust assessment requires an authentication mechanism that causes huge overhead and results in a decrease in performance.
Single point of failure: The idea of the centralized trust model is concise, but it depends too much on the reliability and efficiency of the reputation center.
Distributed trust model
A distributed network is a robust mesh network composed of nodes distributed in different locations. Compared with a centralized network, it can effectively avoid single-point failures of important nodes.
Li et al. 15 proposed an opportunistic network safe routing decision method based on trust mechanism, which relies on message carrying to realize the collection of evidence chain and uses trust vectors with signatures and timestamps to effectively feed back the trust degree of nodes. Wu et al. 16 proposed a blockchain-based peer-to-peer (P2P) network trust model. The weight of the indirect trust degree is determined according to the reliability of the indirect trust degree of the evaluation node in the network. It has high flexibility and universality, but the model granularity is relatively coarse. You et al. 17 revised the reliability of the recommended node based on the interaction satisfaction feedback, but its evaluation process relies heavily on local storage and cannot be effectively applied to scenarios where there is no local storage such as cross-domain and strange node interaction.
The trust model has multiple application scenarios. Ma and Li 18 proposed an edge node credibility evaluation model based on integrated trust. This model can realize efficient edge calculation based on integrated trust and effectively process the massive data generated by network edge devices, but it lacks an accurate trust calculation process. Hasrouny et al. 19 proposed a hybrid trust model (HTM) and a malicious behavior detection system (MDS). Based on vehicle behavior, trust measurement can effectively distinguish between malicious vehicles and honest vehicles, but this model is only applicable to VANET and is difficult to transplant. Jiang et al. 20 proposed a trust model for distributed wireless sensor networks. In the calculation process of direct trust, various factors such as communication trust, energy trust, and data trust are considered to define trust reliability and familiarity. However, the model’s weight judgment on direct trust and recommended trust has certain limitations.
Moreover, there are several improvement methods to the existing trust model. The EigenTrust model 21 is optimized using evolutionary game theory to model peer entities, and trading behaviors more accurately reflect the actual situation. Cho and Chen 22 proposed a data-driven method used to reduce the resource consumption when selfish or malicious nodes exist. And the proposed trust framework is evaluated using random Petri nets, which makes the framework achieve a better node trust assessment accuracy and can be effectively used in delay-tolerant networks. Wang and Liu 23 proposed a Bayesian modeling method aimed at the online detection of fault-tolerant dynamic event areas in wireless sensor networks. The concepts of virtual community and trust index can be used as a reference for the construction of trusted groups in this article. Tariq et al. 24 proposed an energy-efficient, software-defined-network-based Mobile Code-driven Trust Mechanism (MCTM) in order to solve the trust evaluation problems on Software-Defined Network (SDN) for SNs.
As the trust model continues to evolve, more factors are considered in the trust evaluation. This finally constitutes a trust framework with a mixture of multiple mechanisms. GeTrust 25 is a P2P network trust model based on guarantee; the service node selects the guarantee node and provides reputation mortgage for the service. It combines the incentive mechanism and anonymous reputation management strategy and effectively improves the transaction success rate. Jayasinghe et al. 26 proposed an effective modular hybrid trust framework, establishing trust based on entity reputation. Truong et al. 27 used third-party opinions, experience, and direct observation as three trust indicators. It can clarify the concept of trust in the social IoT ecosystem and establish a reliable social network between the entities based on the owner, but it lacks practicality.
Table 1 shows the comparison between different trust models in related works and the properties of our proposed model.
Comparison between different trust models in related works.
Research on IoT is mainly focused on the development of communication transmission technology or trust modeling of specific networks and lacks trust models designed for the access characteristics of massive IoT nodes. The consideration of the attributes, factors, and weights that affect trust is incomplete. Hence, trust evaluation, trust management, social community construction, and feedback control are integrated to realize a comprehensive consideration and evaluation of trust. Based on the trust value calculation and with the concept of the trusted group, there is a flexible approach to finish the dynamic trust evaluation of massive IoT nodes. The approach should fasten the ability of trusted access and real-time autonomous feedback, which also provides new ideas for the research on the security solutions of massive IoT nodes. This will help to promote the stable operation of IoT and have important theoretical and practical significance for the development of IoT applications.
Proposed trust model
In this article, we propose an MATM to cover various IoT scenes and enhance the reliability of trust evaluation results. The description of related notations is shown in Table 2.
Notations in the trust model.
Direct trust value
Suppose that
Multidimensional trust evaluation factor selection
The multidimensional trust evaluation result set of an IoT node can be described as a triple
Among them,
where
Similarly, suppose that the access permission granted by the node
where
Among the triples,
The
Identity verification: Whether the node has completed identity verification.
Data packet forwarding rate: During the interaction, the terminal node
Data packet repetition rate: The data packet repetition rate is also an important reference indicator for judging whether the node’s behavior is abnormal. When the data packet repetition rate is low, the node tends to be credible, and its satisfaction in forwarding data packet repetition rate will increase as the repetition rate decreases. As the repetition rate gradually approaches and exceeds the threshold of the service’s tolerable repetition rate, the more likely the node to behave abnormally, the more likely it will be considered as a malicious node.
Packet content: The behavior of a node is monitored by its neighbors, so the phenomenon observed by the monitoring node can be deduced, that is, whether the node has tampered with the contents of the data packet. If the node does take malicious actions and illegally steals or tampers with information, it should reduce its credibility accordingly.
Transmission delay: The transmission delay should fluctuate within the minimum range allowed by the network architecture. If the transmission delay of the node
Residual energy: Due to the resource limitation of the IoT node itself, the node may not be able to provide effective forwarding services because it has consumed all the energy. To avoid determining such normal nodes as malicious nodes, the impact of the remaining energy of the node on the ability to forward data packets should be considered. The node detects its remaining energy and records, as well as sends the node’s maximum energy and remaining energy to its neighbors. The influence of the remaining energy of the node will be quantified as the remaining energy influence factor.
Life cycle: The subject node collects the most recent moments of neighboring nodes joining and exiting the system. Also, it calculates the survival time of each neighbor and the trust quantization value of the target node’s lifetime.
The
This can include the following:
Activeness: Periodically calculate the number of messages received from a node according to system attributes. The number should be equal to 1. If the number of messages sent during this period is greater than 1, it is required to consider whether it is a malicious node attack (Denial of Service (DoS) or other). If the number of messages is 0, consider whether it is marked as an inactive node (denying service or leaving the transmission radius).
Signal strength: Signal strength helps to determine the location of the node.
Direction: The direction of node movement is used to judge the tendency of a node to enter or leave a group.
The number of trusted neighbor nodes: The number of neighbor nodes whose global trust value has achieved a certain threshold within the transmission radius of the node.
In practical applications, considering the network overhead and node energy constraints, the above attribute factors should be selected for evaluation according to the specific preferences of the network.
Interaction satisfaction calculation
Interaction satisfaction refers to the evaluation made by the subject node according to the multidimensional attribute factors of the object node after interaction. According to the source of satisfaction data during trust calculation, it is divided into subjective service satisfaction and historical service satisfaction. Satisfaction value ranges from [0,1]. 0 means entirely dissatisfied and 1 means absolutely satisfied.
The interaction satisfaction of the terminal node
Considering that the node has certain self-interest preferences, the evaluation value of each trust aspect has a different impact on the overall trust evaluation. The weight coefficient
History interaction satisfaction
After the interaction satisfaction calculation is completed, the node will store the calculated interaction satisfaction and update the historical interaction satisfaction record vector, which is described as
where
According to the cognitive habits in human psychology, trust relationships are time-sensitive, and their credibility dynamically decays with time. In the locally stored historical trust record vector
where
The historical trust value is derived from the historical satisfaction record vector
Direct trust value and dispersion
The direct trust value represents the evaluation of the subject node’s credibility based on the interaction result with the object node, generally based on the comprehensive consideration of the interaction satisfaction and historical interaction satisfaction. The node-to-node direct trust value is calculated by the following equation
where
Nodes may provide unstable services. Therefore, after calculating the direct trust value, the dispersion direct trust value relative to historical interaction satisfaction should also be calculated. These are used as the trust evaluation made by the subject node for itself and as the reference of subsequent reward and punishment mechanism. Referring to the work of You et al., 17 the dispersion could be calculated as
The structure of the database table where the principal node is stored locally is shown in Table 3:
Local storage database table structure.
Proof of trust
After the end of the trust evaluation calculation process, the subject node generates a trust certificate about the object node and broadcasts it to the neighbor nodes. The proof of trust is expressed as
Among them,
Recommend trust value
After the initialization is completed, the interaction between nodes needs to calculate the recommended trust value based on the direct trust value provided by the neighbors. At the same time, the dispersion of the recommended trust value is calculated to assign the weight of the direct trust value and the recommended trust value, and the interactive decision is made according to the result
Similarly, we calculate the dispersion of the recommended trust value to evaluate the reliability of the recommended trust value. Determine the proportion of the direct trust value and the recommended trust value in the comprehensive calculation
Total trust value
The node’s total trust value is the judgment basis for the interactive decision between nodes, which is calculated by the following equation
where
The subject node comprehensively calculates the total trust value of the object node based on the interaction history record stored by itself and the recommended trust value sent by the neighbor nodes. This value determines whether to interact with the node.
Global trust value
We screen the feedback behavior of malicious nodes and collect the direct trust value data of other nodes to the target node. The global trust value of the node could be calculated as follows
When the global trust value
This model introduces multidimensional attribute factors and evaluates trust by service satisfaction, dispersion of direct trust value, and total trust value of nodes based on users’ behaviors. These factors are used to fine-grain the trust measurement of nodes. This model is designed to improve the trust access efficiency of massive IoT nodes and the trusted group. This approach is able to adapt to dynamic network changes and make up for the limitations and deficiencies of the traditional trust model.
Trusted group
The trusted group in IoT is a collection of nodes that satisfy certain rules. The user nodes in the network can be regarded as the mapping of creatures in nature. Creatures with certain properties will form a group. In the community, the default rules regulate the behavior of the individual. The individual should not disturb the normal survival order of the community because of their own interests. Otherwise, they will be punished by the community or directly expelled from the community. Following this mode, the trusted group is built based on the result of trust modeling. Arbitrary operations are banned in the trusted group. User nodes are required to output under the constraints of the group. Once the trusted group builds, the group will use a DMM to ensure the credibility of group members.
The process of establishing a trusted group in this article could be summarized as follows:
Evaluates the node and calculates the direct trust value by calculating the service satisfaction based on the multidimensional attribute evaluation factor.
Collects the direct trust value of the neighboring node to calculate the global trust value of the node.
Follows the group access limitation and constraints on individual nodes and maintains the dynamic credibility of the entire group.
Construction of a trusted group
The node enters the system and obtains an initial trust value of 0.5 (i.e. it cannot be judged as trustworthy or untrustworthy). Every node that enters the system must try to become a member of a trusted group. When nodes
Trust evaluation is the foundation for the establishment of a trusted group. As shown in Figure 1, nodes obtain feedback on their trust value through interaction. The trusted group initialization node collects trust data and calculates its total trust value to determine whether to allow a new member to join.

Trust evaluation process.
When there enters a new member, the initialization node gives its group signature key. When an old member in the group exits, the initialization node generates a new group public key and broadcasts it to the group members. The members of the group use the same group public key to verify the signature generated by any group member using the group signature key, reducing the verification delay and overhead while also ensuring anonymity.
The construction of the trusted group satisfies the needs of massive IoT nodes to reduce verification overhead. It provides new ideas for fast trusted access between massive nodes.
DMM of the trusted group
Trust value decay mechanism
When the target node does not have any activity within a certain time window
Historical statistics based on node feedback behavior
When the error of the recommended trust value feedback by the node is beyond the set threshold
We use the beta probability density function to represent the posterior probability of binary events
where
Reward and punishment mechanism
Let
Effective feedback behavior is required to ensure that the dispersion of the trust value is within the tolerance threshold. Referring to the work of You et al., 17 the punishment factor according to the specific conditions of its feedback could be calculated as follows
where
When the direct trust value returned by the node is valid (
where
DMM algorithm
To ensure the real-time credibility of the group, the above-mentioned time decay mechanism and the reward/punishment mechanism constitute a dynamic maintenance mechanism of the trusted group.
The DMM algorithm is as follows:
Through the above mechanism, the global trust value of the group members in the trusted group can be updated in real time. This mechanism effectively removes the member nodes with bad behavior and ensures the validity and correctness of the trusted group.
Simulated results
To prove the correctness of the model mentioned in this article, based on the research in the previous section, a virtual network environment was constructed using the simulation software Netlogo. In the simulation process, the node interaction behavior is simulated first, and a trusted group is constructed. When the initialization is successful, the node interaction result evolution simulation is performed according to the trust model.
Experimental environment and settings
There are three types of nodes in the network:
Honest nodes: Always provide high-quality services and correct feedback as much as possible.
Malicious nodes: Always provide low-quality services and exaggerated feedback value to members of the malicious team. For the nodes outside the team (honest nodes and dynamic nodes), the value of trust is defamatory.
Dynamic nodes: The quality of service provided by such nodes dynamically changes with time and may act as honest nodes. The behavior of this type of nodes may be like malicious or honest. At the same time, correct feedback is made.
In detail, malicious nodes not only provide low-quality services, which interferes with the normal operation of the system as well as the feedback information. The feedback trust value of malicious nodes to the member of their malicious team is always 1. The feedback trust value to the members outside the malicious team is 0. The dispersion of feedback of the direct trust value is always submitted as 1 by the malicious node.
Honest nodes always provide high-quality services as much as possible and give correct feedback to interactive nodes when interacting.
The dynamic node will randomly behave like a malicious node or an honest node and will not be regarded as a part of the team by the malicious node. The existence of dynamic nodes will make the simulation experiment environment closer to the actual application environment.
Table 4 shows the parameter settings of the simulation experiment.
Simulation experiment parameter setting.
Simulation results
Interaction success rate
The success rate of node interaction is an important indicator for evaluating the performance of a trust model. To verify the effectiveness of our proposed model (MATM), the IDTEM model of the recent research literature 8 and the classic EigenTrust model 29 were subjected to the same simulation experiment. The experimental results are shown in Figure 2.

Node interaction success rate changes with the proportion of malicious nodes.
As shown in Figure 2, the EigenTrust model is a classic trust management model and is a lack of consideration of other influencing factors, thus has the poorest performance on interaction success rate among the three models. The IDTEM model aims to suppress the malicious recommendation, and the interaction success rate results in a gentle decline. The proposed model in this article comprehensively evaluates the trust of nodes by
Multidimensional attribute;
Dispersion of trust value;
Time decay.
Our trust model has significant advantage on interaction success rate, especially in low percentage of malicious nodes. As the proportion of malicious nodes increases, the impact of the exaggerated collaborative attacks and defamation attacks on the network environment is more obvious. These attacks result in the decline of the interaction success rate with the increase in the proportion of malicious nodes. However, our proposed trust model MATM still maintains the highest success rate among the compared models.
The efficiency of the proposed model
Since the global trust value of a node is the main basis for judging the identity of a node, the simulation makes a statistical calculation of the average global trust value of various nodes, as shown in Figure 3.

The average global trust value of honest, malicious, and dynamic nodes when
The average global trust value is unified as a value from 0 to 1. It can be seen from Figure 3 that in the case where the malicious nodes account for a relatively low percentage (10%, 20%), the average global trust value of honest nodes is the highest, the value maintained above 0.8 after stabilization. Because of the instability of dynamic nodes, the average global trust value of dynamic nodes is below 0.7. As for the malicious nodes, the value is at a low level below 0.2, indicating the correctness of the trust assess method and the interactive decision of MATM.
When the malicious nodes account for 30%, the average global trust value of honest nodes will reduce to 0.7 due to the exaggeration/collaborative attacks and defamation attacks of malicious nodes. As for the dynamic nodes, they are greatly affected and entering a low trust value of 0.1–0.2. The average global trust value of malicious nodes has increased slightly, but it remains within the low trust value range of 0.2–0.3. In the case where malicious nodes account for 40%, the average global trust value of honest nodes remains above 0.55, while the value of malicious nodes is stable at 0.3–0.4. Dynamic nodes have their own behavior and are attacked by malicious nodes, resulting in the lowest average value.
Simulation results show that after a certain round of interaction, the credibility of various nodes will tend to be stable. At the same time, when the proportion of malicious nodes continues to increase, this model can still ensure that the average global trust value of honest nodes is above 0.5. It tends to be trusted as the average global trust value of malicious nodes is below 0.5.
The efficiency of the trusted group
To verify the validity of the trusted group, we also output the identification of members in the trusted group. As shown in Figure 4, malicious nodes account for 10%, 20%, 30%, and 40% of all nodes (

The proportion of malicious and honest nodes in the trusted group when
Figure 4 demonstrates the correlation of the proportion of malicious nodes and the group composition. When the proportion of malicious nodes is relatively low (10%, 20%), more than 90% of the trusted group members are honest nodes. As the proportion of malicious nodes increases, the coordinated attacks of malicious nodes interfered with the acceptance of the trusted group. But the trusted group can still maintain more than 75% of the honest nodes. It illustrated that the trusted group has the effectiveness of application in the system.
Conclusion
We proposed an MATM for the IoT trustworthiness relationship depending on the associate attributes of nodes. The trust relationship prediction is based on the trust value provided by nodes in a certain transmission radius. We adopted trust value dispersion in trust computing to protect normal nodes from collusion attacks by malicious nodes. According to the trust degree computed by the trust modeling process, we built the trusted group and selected the TL for the trust group to support the management of nodes. We designed a DMM that includes time decay, reward, and punishment strategies to update the trusted group with comprehensive trust status. This mechanism effectively guarantees the reliability and stability of trusted groups. Simulation results show that MATM could effectively screen malicious nodes from normal nodes, as well as respond to invalid feedback from malicious nodes. Compared with some existent trust model, our proposed model has better performance in interaction success rate. We also showed by simulation the efficiency of the trusted group and ensure that the honest nodes account for the majority of the trusted group. This article aims at resolving problems about incomplete consideration and large overhead under the traditional IoT security strategy.
Future work will distinguish the behavior of malicious nodes in detail and improve the performance of our proposed trust model. The selection of trusted group management nodes in the network environment and the calculation of comprehensive credibility will be further optimized to improve the trust evaluation scheme for trusted groups.
Footnotes
Handling Editor: Peio Lopez Iturri
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This research was supported by National Key Research and Development Project (2019YFB2102303), National Natural Science Foundation of China (61971014) and Henan Key Research and Development Project (202102310522).
