Cluster Node Migration Oriented Holistic Trust Management Protocol for Ubiquitous and Pervasive IoT Network

Document Type : Special Issue on Pragmatic Approaches of Software Engineering for Big Data Analytics, Applications and Development


1 Research Scholar, Department of Computer Science and Engineering, Centurion University of Technology and Management, Odisha, India.

2 School of Applied Sciences, Centurion University of Technology and Management, Odisha, India.

3 Department of Computer Science and Engineering, Chaitanya College of science and Technology, Madhapatnam, Kakinada, India.


Smart applications with interconnected intelligent devices for sharing services arise serious security problems to the stability of this IoT complex and heterogeneous environment. Unless security considerations are analyzed and implemented properly in real time then IoT cannot be perceived as a pervasive network for the possible stakeholders. Current state of the art has analyzed trust-based security solutions as additional feature to application layer of the system which can identify and filter out the malicious nodes. In this paper we are proposing holistic trust management with edge computing mechanism to create trustworthy zones comprising different clusters, where Gateway on behalf of clusters will initiate migration of their nodes if falls below the defined Zone trust threshold level. The created zones are self-resilient against any malicious attacks and saves lots processing usage time and energy to address the security issues. By analyzing our proposed algorithm with other contemporary approaches to handle IoT security issues using trust mechanism, this approach is more precise in terms of protecting system against incurring malicious behavior, and also prolong the application operation duration by reducing communication and processing overhead.


Abhijit J, P., & G. Syam Prasad, D. (2018). Trust Based Security Model for IoT and Fog based Applications. International Journal of Engineering & Technology, 7(2.7), 691-695.
Alshehri, M. D., Hussain, F. K., & Hussain, O. K. (2018). Clustering-driven intelligent trust management methodology for the internet of things (CITM-IoT). Mobile networks and applications, 23(3), 419-431.
Behera, T. M., Mohapatra, S. K., Samal, U. C., Khan, M. S., Daneshmand, M., &Gandomi, A. H. (2019). Residual energy-based cluster-head selection in WSNs for IoT application. IEEE Internet of Things Journal, 6(3), 5132-5139.
Chen, J., Tian, Z., Cui, X., Yin, L., & Wang, X. (2019). Trust architecture and reputation evaluation for internet of things. Journal of Ambient Intelligence and Humanized Computing, 10(8), 3099-3107.
Dedeoglu, V., Jurdak, R., Putra, G. D., Dorri, A., & Kanhere, S. S. (2019, November). A trust architecture for block chain in IoT. In Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp. 190-199).
Fernandez-Gago, C., Moyano, F., & Lopez, J. (2017). Modeling trust dynamics in the Internet of Things. Information Sciences, 396, 72-82.
Juneja, A., Juneja, S., Bali, V., & Mahajan, S. Multi-Criterion Decision Making for Wireless Communication Technologies Adoption in IoT. International Journal of System Dynamics Applications (IJSDA), 10(1), 1-15.
Juneja, S., Singh, S., & Bali, V. (2017). Research Paper on Detection of Attacks in Static Wireless Sensor Networks. International Journal of Advanced Research in Computer Science, 8(7), 225-231.
Khanna, T., Nand, P., & Bali, V. (2020). Permissioned Blockchain Model for End-to-End Trackability in Supply Chain Management. International Journal of e-Collaboration (IJeC), 16(1), 45-58.
Krishna, M. B. (2016). Security and trust management for the Internet of Things: an RFID and sensor network perspective. Cyber‐Assurance for the Internet of Things, 137-162.
Maddar, H., Kammoun, W., & Youssef, H. (2018). Effective distributed trust management model for Internet of Things. Procedia Computer Science, 126, 321-334.
Meng, W., Li, W., Su, C., Zhou, J., & Lu, R. (2017). Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. IEEE Access, 6, 7234-7243.
Mohan, A., & Bhanu Bhaskara, D. (2018). Multi-dimensional trust aware routing for clustered IOT framework. International Journal of Engineering & Technology, 7(4.20), 15-21.
Oumaima Ben Abderrahim, Mouhamed Houcine Elhdhili & Leila Saidane, (2016). Trust based Clustering Architecture for the Internet of Things, International Journal of Engineering Research & Technology, 4 (4), 1-5.
Pourghebleh, B., & Hayyolalam, V. (2019). A comprehensive and systematic review of the load balancing mechanisms in the Internet of Things. Cluster Computing, 1-21.
Shah, B., Iqbal, F., Abbas, A., & Kim, K. I. (2015). Fuzzy logic-based guaranteed lifetime protocol for real-time wireless sensor networks. Sensors, 15(8), 20373-20391.
Tragos, E. Z., Bernabe, J. B., Staudemeyer, R. C., Luis, J., Ramos, H., Fragkiadakis, A., Skarmeta, A., Nati, M., & Gluhak, A. (2016). Trusted IoT in the complex landscape of governance, security, privacy, availability and safety. Digitizing the Industry-Internet of Things Connecting the Physical, Digital and Virtual Worlds. River Publishers Series in Communications, 210-239.
Wang, J. P., Bin, S., Yu, Y., & Niu, X. X. (2013). Distributed trust management mechanism for the internet of things. In Applied Mechanics and Materials (Vol. 347, pp. 2463-2467). Trans Tech Publications Ltd.