Sie sind auf Seite 1von 15

SPECIAL SECTION ON SECURITY AND PRIVACY FOR CLOUD AND IOT

Received January 10, 2019, accepted January 25, 2019, date of publication February 1, 2019, date of current version February 22, 2019.
Digital Object Identifier 10.1109/ACCESS.2019.2897095

ARCA-IoT: An Attack-Resilient
Cloud-Assisted IoT System
SABEEN JAVAID 1 , (Member, IEEE), HAMMAD AFZAL 1 , MUHAMMAD BABAR1,2 ,
FAHIM ARIF1 , (Member, IEEE), ZHIYUAN TAN 3 , (Member, IEEE),
AND MIAN AHMAD JAN 4 , (Member, IEEE)
1 Department of Computer Software Engineering, National University of Sciences and Technology (NUST), Islamabad 44000, Pakistan
2 Department of Computing and Technology, Iqra University, Islamabad 44000, Pakistan
3 Schoolof Computing, Edinburgh Napier University, Edinburgh EH11 4DY, U.K.
4 Abdul Wali Khan University Mardan, Mardan 23200, Pakistan

Corresponding author: Sabeen Javaid (sabeen@mcs.edu.pk)

ABSTRACT Putting trust in the world of the Internet of Things, where served and serving entities are
often unknown, is very hard especially when personal and business information is often being exchanged
for providing and consuming services. Moreover, the issues of interoperability and scalability of billions
of heterogeneous things in the IoT systems require more attention. A user-centric model of complex
interconnected things must be designed in a way that not only makes things trustworthy for common people
but it also provides the solution for interoperability and scalability. ARCA-IoT is such a system which not
only identifies the attributes (including quality of service) essential for trust but also presents a user-centric
model that is robust enough to tackle the attacks made by dishonest entities to manipulate the trustworthiness.
For scalability and interoperability, a cloud-assisted environment is introduced in the ARCA-IoT. An intuitive
Naive Bayes approach is used to train the ARCA-IoT in a way that it calculates the probabilities of the
trustworthiness of the entities and then identifies various types of attacks with the support of three proposed
algorithms. The approach is validated with a specifically designed simulated environment. Based on our
simulation results, the ARCA-IoT demonstrates the effectiveness in term of performance metrics such as
accuracy, sensitivity, specificity, and precision. Besides this, the system outperforms the existing related
approaches in terms of a qualitative analysis based on different parametric metrics such as interoperability,
scalability, context-awareness, and a human-like decision.

INDEX TERMS Cloud, context, IoT, QoS, service, social, trust, WoT.

I. INTRODUCTION may have little or no technical knowledge of a ‘thing’, there


In a world being transformed by technology, people are are chances that they may fall prey to malicious entities which
getting connected with each other through different kinds are present in the network. Therefore, the trustworthiness of
of devices for getting the privileges of modern technology. entities becomes significantly important as ordinary people
Internet of Things (IoT) is a remarkable example of this receive and deliver services from/to unknown entities through
transform. It defines a network of various devices, digital and ‘things’. For example, remote health monitoring through IoT
mechanical, that exchange data over the Internet. This net- helps in reading a patient’s vital signs and sending them to
work has the ability to work without human intervention [1] cloud for a medical practitioner to keep track of a patient’s
and unlimited ‘things’ are going to be connected through it. condition. Getting health-related life-critical services for can-
The services provided by these ‘things’ range from smart cer or cardiac patients, for example, must be from trustworthy
businesses to smart homes and from smart health monitor- entities. However, malicious and dishonest entities may be
ing to smart agriculture. However, this complex network of present in the network with different motives. A patient’s life
smart ‘things’ faces many challenges. One of the complex can be in danger if the selected entity is not able to provide
challenges is the trustworthiness of smart ‘things’. Since quality services such as late response in case of emergency.
members of the public, who are main beneficiaries of IoT, Similarly, sensitive data can be used for achieving their mali-
cious objectives because ‘big’ personal and business data is
The associate editor coordinating the review of this manuscript and transmitted among the ‘things’. It is fairly said that ensuring
approving it for publication was Weizhi Meng.
the trustworthiness of ‘things’ with respect to Quality of

2169-3536
2019 IEEE. Translations and content mining are permitted for academic research only.
19616 Personal use is also permitted, but republication/redistribution requires IEEE permission. VOLUME 7, 2019
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
S. Javaid et al.: ARCA-IoT: Attack-Resilient Cloud-Assisted IoT System

Services (QoS) is extremely important, and identification of services are called ‘service providers’ whereas those who
malicious and dishonest entities in the network should be seek and then consume services from service things are
handled with great care. called ‘service seekers’ and ‘service consumers’, respec-
The second challenge faced by IoT is the interoperability of tively. Besides this, it is also important to measure QoS
heterogeneous devices [2]. A survey found that Java is a com- provided by a service provider. For this purpose, feedback is
mon programming language for developing IoT applications taken from service consumers. Moreover, service seekers also
as 61% of the developers use it for building IoT applications. get recommendations from the social network if they do not
However, this trend is a hindrance towards the freedom of have any previous history of that type of service consumption.
choice for the developers because those, who are experts in The contributions of this research are as follows:
other languages, learn Java for IoT applications [3]. Interop- 1) Identification of context and QoS related attributes
erability works as a fuel in IoT innovation. It is estimated that which are considered important for the trustworthiness
by 2025 over $11 trillion in revenue per year will be generated of entities in IoT.
by IoT applications and it is also expected that up to 40% of 2) A cloud-assisted WoT environment is introduced to
the revenue will be generated by those IoT applications which resolve the interoperability issue and enhance the
ensure interoperability [3]. scalability.
World Wide Web and its associated technologies can be 3) ARCA-IoT also provides resilience against ballot stuff-
helpful in resolving the issue of interoperability [2]. Another ing, bad-mouthing, and oscillation attacks. For this,
advantage of integrating ‘things’ with Web technologies is to the Naive Bayes Classifier is used which helps in the
make ‘things’ easy to discover, bookmark and share. [4]. The identification of untrustworthy entities and then the
approach of integrating smart things with the Web is called proposed algorithms for attacks such as ballot stuffing,
Web of Things (WoT). For this purpose, Representational bad-mouthing and oscillation are applied to identify
State Transfer (REST) architectural style [5] is applied to the type of attack.
resources in the physical world. REST abstracts the services 4) The efficiency of the system is tested with a specifically
in a uniform interface and a platform independent universal designed environment. Performance metrics are used
Application Program Interfaces (APIs) [6] for smart things to measure the performance of ARCA-IoT. Moreover,
are built. In short, the purpose of REST is to develop loosely a qualitative analysis of ARCA-IoT based on paramet-
coupled reusable web services. It uses a Uniform Resource ric metrics with already defined systems in the related
Identifier (URI) for web services’identification and encapsu- areas is carried out.
lation on the Web. These qualities make it an ideal candidate The rest of the paper is organized as follows. The related
architecture to build an API for smart things [7]. work in trust management is described in Section II. The
The third issue faced by IoT applications is scalability. It is system model is elaborated in Section III. Section IV presents
an important required ability for IoT applications because the details of ARCA-IoT whereas Section IV discusses the
increasing service requests within limited capacity of IoT effectiveness of ARCA-IoT by describing the experiments.
infrastructure can adversely affect the efficiency of a sys- Section V concludes the research.
tem. The characteristics associated with IoT are limited pro-
cessing and storage capacity with widely distributed small II. BACKGROUND STUDY
‘things’ [8]. The shortcomings of IoT, such as limited pro- In this section, the related work from the literature on trust
cessing and storage capacity, can be overcome by Cloud management, interoperability, and scalability in IoT and
computing as it has virtually unlimited capabilities in terms related areas is discussed. Trust is a subjective phenomenon
of storage and processing power. Thus, cloud and IoT are which is complex to assess and its presence or absence in
two technologies that complement each other and by using an interaction plays a significant role. This is the reason,
them together, it becomes feasible to create on-demand access it has been in focus in various research areas. Consequently,
to a pool of computing resources with the least minimal many trust management systems have been proposed. These
management effort or service provider interaction [8]. systems monitor the activities of the entities to identify dis-
Therefore, to enhance the reliability of IoT applications, honest behavior and irregular activities. However, it is dif-
the level of dishonesty of a smart entity or malicious attack ficult to identify dishonest entities present in a network of
will be first measured or detected by our proposed ARCA-IoT billions of entities, i.e., IoT. A reasonable work has been
using its proposed algorithms and Naive Bayes classifier. done in the area of trust in terms of privacy and security.
As trust is a context-dependent concept [9] and varies from However, it is identified that there are the deficiencies which
one ‘thing’ to another ‘thing’, context-relevant attributes are are not addressed fully in the related work. The state-of-
carefully extracted in ARCA-IoT. the-art related approaches along with these deficiencies are
Then, to enhance i scalability through resource pooling discussed below.
and on-demand features, ii and interoperability (through Angelo et al. [10] proposed a trust model based on Apriori
APIs) cloud computing and web technologies are integrated Learning and Bayesian Classification for pervasive comput-
with ‘things’ as services in the Web, i.e., WoT. It is note- ing. By observing the interactions with other entities and
worthy that in a service-based approach, ‘things’ offering then through Data Mining techniques, the authors proposed

VOLUME 7, 2019 19617


S. Javaid et al.: ARCA-IoT: Attack-Resilient Cloud-Assisted IoT System

two steps for decision making. For extracting the behavioral less social contacts. However, context awareness and QoS
pattern, Apriori algorithm was used whereas for final decision were not given attention in the system.
making, Bayesian classifier was used. An attribute vector to A context-aware trust management system was proposed
show the experience of an entity was defined. These include by Saied et al. [15]. Different phases were suggested for
entity identification, trust score, counting trust, counting information gathering and entity selection. Finally, the selec-
untrust, last time, transaction context (games, e-commerce), tion was based on the competition and best-rated nodes were
direct experience, source entity in tree-based relation and selected. Then after getting services, client nodes gave feed-
level of the hierarchy. Three types of attacks are taken care of back and trust score was updated accordingly. The cognitive
in the system which include the counting-based attack, time- phase which was a learning phase was used as an adap-
based attack, and context-based attack. It is identified that tive process. Simulation results showed that several attacks
QoS based trustworthy evaluation was not carried out in the were stopped by the proposed system. The system provided
system. There was only one parameter for the context-based resistance against off-on attack, bad-mouthing, and selec-
attack which is the type of service. Three common attacks tive behavior. However, this was generic context-aware trust
such as ballot-stuffing, bad-mouthing and oscillation attacks management which did not emphasize the detailed analysis
were also not given attention [10]. The interoperability and of QoS attributes. Moreover, interoperability and scalability
scalability were also not the focus of this research. were also not considered in the system.
Mehmood et al. [11] proposed a system which was based Delsing et al. [16] enabled IoT automation using local
on Naive Bayes Classifier for providing resistance against clouds without the usage of external resources which assured
DDoS attacks in IoT. It was a multi-agent which worked along safety, scalability and multi-stakeholder integration. How-
with Bayesian classifier
 and identified Distributed Denial of ever, QoS based trustworthiness did not get attention in this
Service DDoS attacks. The multi-agents were proposed research. A federated edge-assisted mobile cloud was pro-
to be present throughout the network so that information posed by Farris et al. [17] which enabled service provision
could be gathered and attacks could either be prevented or in IoT applications. The proposed hybrid approach enhanced
tackled. The system only considers the securing computing scalability and the deployment cost was also reduced. How-
in IoT. Moreover, interoperability and scalability were not ever, no attention was given to trustworthiness of the entities
given consideration in this system. present in the network. Stergiou et al. [18] described security
For task automation, a context-aware system [12] was as a big threat in a survey. Moreover, they recognized that
designed for IoT. The objective was to help users in selecting there was a lack of trust in service providers when both
the sensors based on meaningful information and to intro- technologies integrated. In short, it is evident that the focus
duce the sensing-as-a-service concept. For this, four inter- of research community has been on the integration of cloud
nal and two external layers were introduced which fulfilled computing and IoT because these technologies overcome the
the propose of automation and reasoning. However, neither deficiencies of each other, however, trust management in
QoS nor attack identifications, scalability were given atten- cloud-assisted IoT requires more consideration. It is identi-
tion. No human-like decision technique was incorporated fied that less attention was given to trust management while
into the system. Another framework FACT [13] was intro- integrating both technologies.
duced for information distribution in the vehicular network. In view of the above discussion, it is identified that pre-
It checked the authenticity of the information by calculating vious models consider one or two major problems faced
trust values and then found the best path for the delivery. by IoT in a single solution. To the best of our knowledge,
A Trust-Aware Access Control System for IoT (TACIoT) [14] no model has provided a single solution for three major
was introduced which considered four dimensions of trust. problems trustworthiness, scalability, and interoperability
Those were the social relationship, QoS, security aspects, faced by IoT. Trustworthiness in terms of on QoS and context-
and reputation. The secure and reliable communication-based aware parameters specifically related to IoT remain less
system consider access control of IoT application, however, attended in state-of-the-art approaches. Therefore, there is
only four QoS attributes such as availability, throughput, a need to consider trustworthiness
 in terms of QoS and
delay, and successful interaction were considered in the context-aware p arameters , interoperability and scalability
system. No attention was given to context-awareness, inter- for IoT related applications in a single solution. Moreover,
operability and attack identification such as ballot stuffing, a human-like decision technique is required to handle the
bad-mouthing in the system. trustworthiness of these billions of things so that in case
A trust protocol was proposed by Chen et al. [6] which of absence of human-interference, human-like decisions can
worked on adaptive filtering technique. Social relations were be made.
used to get recommendations whereas experience and his-
torical data were also used for trust calculation. Attacks like III. SYSTEM MODEL
opportunistic attack, bad-mouthing, and ballot stuffing were ARCA-IoT is a system that takes up the three challenges

considered in the research. The trust is maintained only at trustworthiness, interoperability, and scalability faced
user’s end which makes it difficult for other users who have by IoT. To design a trustworthy environment, the attributes

19618 VOLUME 7, 2019


S. Javaid et al.: ARCA-IoT: Attack-Resilient Cloud-Assisted IoT System

which play a significant role in identifying trustworthy and heterogeneous platforms and multiple-management domains
untrustworthy ’things’ are identified. The system not only is well managed by the integration of three technologies.
evaluates the service providing entities but also the service
consuming entities for creating a good and balanced trustwor- B. TRUSTWORTHY THINGS
thy environment. Assessing their trustworthiness is necessary In the presence of billions of ‘things’, it is difficult to identify
so that any kind of malicious behavior can be identified in ‘things’ which are trustworthy in terms of providing quality
the system. Therefore, trustworthy ’things’ and the types of services in a given context. This is the reason, the main focus
attacks carried out by untrustworthy entities are considered in of ARCA-IoT is to identify trustworthy and non-trustworthy
the system model. For resolving the issues of scalability and ‘things’.
interoperability, a cloud-assisted environment is introduced Trust being a subjective and complex concept has been
in the system. in the focus of various areas. Deutch defines trust as the
situation when someone faces an ambiguous path that the
A. CLOUD-ASSISTED SOCIAL WOT MODEL outcome is either valuable or destructive [20]. It is identified
In ARCA-IoT, a cloud-assisted social WoT Model is consid- that this outcome depends on the behavior of one another.
ered where entities are connected via a public cloud using Since the level of a destructive outcome is more than that
REST APIs and socially connected via the owners’ social of a valuable outcome, therefore, the trusting choice should
network. Using REST APIs makes entities to be part of the be wise enough. Table 1 defines five key characteristics of
World Wide Web hence introducing Web of Things (WoT) trust which are described as key characteristics in state-of-
in the system. WoT is the term which comes under the the-art [21]. ARCA-IoT also considers these characteristics.
umbrella of IoT. REST APIs help in making the services
abstract whereas for context modeling and messaging, JSON TABLE 1. Attributes of trust.

JavaScript Object Notation is used. It is machine-readable


hence making it possible for things to interact with each other
through the web. The incorporation of these web technologies
also helps to index things like web pages which may also be
bookmarked.
There are two types of entities: users and devices. A user
may have one or many devices. These devices are controlled
by a central device such as a smartphone or a laptop, thus,
a user has better control of the system making it a user-
centric. Each thing has a unique URI for its identification. Keeping the characteristics of trust in view, the system
In the system, entities act as service providers and service helps in identifying trustworthy ‘things’. When an entity con-
consumers. By exploiting the concept of the social web, sumes a service from a service provider then a level of trust
the things/devices of an owner may receive/provide services establishes between them. Hence, binary relation, the first
from/to the things/devices of another owner through their attribute of trust, is fulfilled. However, information about this
central devices if the owners are connected through a social trust level can be disseminated among other entities in the
network. ’Things’ share their respective owner’s social rela- form of recommendations. Trust is dynamic in context. For
tions, the level of cooperation depends upon the authenti- instance, if an entity provides services in a remote health
cation and authorization level granted by an owner to those monitoring system, a trustor who needs services in an IoT
in his social network. In addition, ’things’ can also provide based agriculture system cannot trust in this entity. This is
or receive services to and from other devices which are the reason that ARCA-IoT considers context dependent trust
not in the social network. For this, a service seeking entity in its model. In ARCA-IoT, trust is quantified through various
sends a message for the recommendation of the required parameters of trust and then the aggregated trust value is com-
service provider entity through its central device. Based on puted based on these parameters. A service consumer may
the requirements, the social contacts recommend the potential trust in a service provider but not vice versa, an asymmetric
service providers which are nearer to its location and are property of the trust. This is a significant characteristic of trust
trustworthy. because having trust on each other, for a trustor and a trustee,
Moreover, ARCA-IoT also leverages the concept of cloud is important. The dynamic property of trust is also true in
computing which introduces scalability, high performance, the proposed system as ARCA-IoT recalculates the trust level
and efficiency in the system. It is noteworthy that these are everytime a service is consumed and feedback is provided.
the key elements for the success of IoT [19]. Integrating cloud
computing in ARCA-IoT ensures sharing and maximizing the C. TYPES OF ATTACKS
resources which are the requirements of IoT. To differentiate honest entities from dishonest ones is a com-
It is fairly said that the convergence of three technologies plex problem. It is identified that dishonest ‘things’ may
will bring huge opportunities for IoT, Cloud and the Web. For attack in various ways. Dishonest ‘things’ try to malign the
example, the geographical distribution of IoT devices over purpose of a social WoT environment by providing either

VOLUME 7, 2019 19619


S. Javaid et al.: ARCA-IoT: Attack-Resilient Cloud-Assisted IoT System

TABLE 2. Types of attacks. respective descriptions as well as tells the type of entity that
carries out each of the attacks. In Table 2, a service consumer
is denoted by ‘SC’ and a Service Provider is denoted by ‘SP’.
The detection of these attacks is a tedious task and it is in
the focus of the researchers. At this stage, ARCA-IoT tackles
three common attacks which are bad-mouthing, oscillation
and ballot stuffing. The others will be tackled in the extended
work.

IV. RESILIENT AGENT FOR TRUST MANAGEMENT


The architecture of ARCA-IoT is shown in Fig. 1. The pro-
posed system has a main component called “Resilient Agent”.
It resides on the public cloud to manage the trustworthiness
of both service providing and service consuming entities.
It provides resilience against the attacks, which try to malign
the trustworthiness of an entity, by identifying the malicious
poor quality services or dishonest feedback. Some of these entities. For this purpose, three types of managers which
trust related attacks have been defined in [22] and listed include ‘Service Provider (SP)’, ‘Service Consumer (SC)’,
in Table 2. The table describes the types of attacks, and their and ‘Social Contact’ are the parts of Resilient Agent.

FIGURE 1. The architecture of ARCA-IoT.

19620 VOLUME 7, 2019


S. Javaid et al.: ARCA-IoT: Attack-Resilient Cloud-Assisted IoT System

These managers take care of service providers, service con- maintains the quantified total or global trustworthiness
sumers and social contacts of an entity. Besides this, there is whereas another level maintains local trustworthiness
an ‘Attack Monitoring Analyst’ which analyzes and evaluates for each time a service is provided to a service seeker.
the trustworthiness of an entity. The Attack Monitoring Ana- Local trustworthiness is kept in the central device of a
lyst uses a Naive Bayes Algorithm which classifies an entity service consumer.
either as a trustworthy or as a non-trustworthy. The attributes belonging to identification and capability
In this section, we explain the three types of managers, categories are related to the context of trust. The context-
i.e., Service Provider, Service Consumer and Social Contact, awareness requires the answers of i) Who, ii) What, iii) When,
followed by Attack Monitoring Analyst. and iv) Where [23]. The ‘Who’ describes the identity of an
entity which in this case, for example, is URI. The ‘What’
TABLE 3. Attributes of a service provider.
reflects the type of service and capability. The ‘When’
describes the service timing and the ‘Where’ tells the loca-
tion of an entity. These are the basic concepts of Context
Awareness [23]. The answers of these 4 W’s are being
given through these attributes. For example, the attributes
spURI and spIPAddress describe the term ‘Who’ whereas the
attributes spType, spCapacity, and spStdCompliance tell the
answer of ‘What ’. The attribute spTime reflects the term
‘When’. Finally, the attributes spLong and spLat describe the
term ‘where ’.
A service-provider registers itself by entering the infor-
mation about all the ‘input attributes’ mentioned in Table 3
on a public cloud. Things are accessible through their URIs.
After registration, the service provider can be discovered by
a service-seeker. The trust level ‘TLevel’ is calculated based
on the feedback of the attributes defined in Table 4. The feed-
back for these attributes is given by a service-consumer after
consuming a service. The method of calculation ‘TLevel’ is
described in IV-D.2.
TABLE 4. Attributes of QoS.

A. SERVICE PROVIDER MANAGER



The profiles of each Service Provider SP is maintained and
managed by a Service Provider manager. Various attributes
are identified for maintaining the profiles of each service
provider which are described in Table 3. There are three The individual trustworthy values in the form of feedback
categories defined for the identified attributes. given by each service consumer are also maintained which
1) Identification: This category helps in the identification help in identifying various types of attacks. For this pur-
of a service provider pose, service consumers evaluate service-providers based on
2) Capability: The attributes, in this category, define the quality attributes. These attributes are described in Table 4.
capability in terms of capacity, service timing, process- Some of these attributes are described in [24] whereas the
ing power, and battery level. attributes ‘consumer-care services’ and ‘price-satisfaction’
3) Trust Level: It describes the level of trustworthiness are specifically introduced in ARCA-IoT. Consumer-care
which a service provider is able to establish after pro- service is a pro-active tool that helps in creating happy and
viding services. It is maintained at two levels. One level loyal customers if a service provider deals service consumers’

VOLUME 7, 2019 19621


S. Javaid et al.: ARCA-IoT: Attack-Resilient Cloud-Assisted IoT System

problems with care then quality of service definitely TABLE 6. Attributes of social network.
improves. Similarly, service consumers are concerned about
getting what they require and getting what they have paid for.
Therefore, taking feedback regarding price-satisfaction level
becomes significant.
After consuming a service, the service consumer rates the
service quality for each attribute also called feature ‘F’) on TABLE 7. List of attributes.
a scale from 0 to 1.

TABLE 5. Attributes of service consumer.

The attribute ‘CId’ is the identity of a recommender


whereas ‘CType’ describes the type of social relation. The
service-seeker/service-consumer also keeps the record of
total no of recommendations made by a recommender. A rec-
ommendation is considered valid if a service-seeker decides
to consume that service and QoS is satisfactory. In future,
the preference is given to the recommendations of those rec-
ommenders who have provided more valid recommendations
B. SERVICE CONSUMER MANAGER in the past.
The profile of each service consumer is maintained and mon-
itored by this manager. For this, six attributes are considered D. ATTACK MONITORING ANALYST
for a service consumer which are mentioned in Table 5. These The Attack Monitoring Analyst of ARCA-IoT continuously
attributes help in identifying honest and dishonest service monitors the entities. It separates dishonest entities from hon-
consumers. These attributes are divided into two categories est entities by identifying various attacks. In order to enable
which are identification and trust level. In addition, the type this analyst to do the assigned tasks, it is trained based on a
of attribute whether it is taken as input or derived is also Naive Bayes algorithm which is explained in V-A. However,
mentioned in Table 5. feature scaling and categorization are done before training.
The attributes related to identification category help in Feature scaling and categorization is an important step which
keeping the record of the complete identity of a service should be performed before the classification of entities. The
seeker. Before consuming a service, it is necessary for a need and the process of feature scaling are discussed in the
service consumer to register itself by entering ‘identification subsection IV-D.2. If an entity is proved to be untrustworthy,
attributes’ whereas ‘TLevel’ is calculated based on the evalu- the Analyst assigns the level of untrustworthiness and then
ation of the feedbacks given by a service consumer and then identifies the type of attack. If the entity appears to be trust-
comparing them with the feedbacks of other consumers is worthy, then the record is updated accordingly. The details of
carried out. The detail of the calculation of this attribute is the processes are described in the following subsections.
described in IV-D.2.
1) THE ATTRIBUTES AND THE VECTORS
C. SOCIAL NETWORK MANAGER To identify any potential attack, the attributes mentioned
Three types of social relations are considered in this
 research in Table 7 are considered. These attributes are calculated with
including i) Friends, ii) Social Contact, and iii Commu- the help of input attributes which are mentioned in Table 4.

nity of Interest. These relations are also considered in [6]. Feedback for each attribute also called ‘feature’ of a
The level of cooperation depends upon the authentication service is taken from a service consumer who consumes the
and authorization level granted by an owner to those in his service. The record of the feedback for each feature of a
social network. Four attributes are identified to keep the service is kept as Fi . The feedbacks about each feature is
record of the recommendations made by social relations. then used collectively to measure the overall quality of a
These attributes are described in Table 6 which are stored service. Similarly, Fij helps in evaluating the trustworthiness
locally in a service consumer’s local database and act as of feedback, for a feature, given by a service consumer. For
a history. It helps a service consumer in identifying which this, a comparison is made with µFBi . The details of FSij and
recommender’s recommendations are proved to be correct. FCij are described in the following sub-section IV-D.2.

19622 VOLUME 7, 2019


S. Javaid et al.: ARCA-IoT: Attack-Resilient Cloud-Assisted IoT System

2) FEATURE SCALING AND CATEGORIZATION in ARCA-IoT. These help in identifying to which level an
Feature scaling helps in standardizing the features of data entity is trustworthy. Equation (5) reflects how much trust
before using them in any machine learning algorithm. It is score is required to be trustworthy at an appropriate level.
also called the normalization of data. It is important to stan- 1) Untrustworthy
dardize the range of features so that the objective function can 2) Partially UnTrustworthy
be achieved. In ARCA-IoT, it is done using (1) as described 3) Fairly Trustworthy
in [25]. It scales the data in a range from 0 to 1. 4) Good Trustworthy
 5) Fully Trustworthy
Fij − Min Fi
FSij = (1) 
Untustworthy, if T = 0 AND T < 0.25
 
Max Fi − Min Fi 


Partially UnTustworthy, if T >= 0.25 AND

where ‘i’ represents feature no and service consumer ‘j’s



 < 0.5

evaluation. The arithmetic mean of SP and SC is calculated

 T
separately. It will help in evaluating the trustworthiness of SP TLevel = Fairly Tustworthy, if T >= 0.5 AND T <
and SC separately which is elaborated in IV-D.3.

 0.75
Good Tustworthy, if T >= 0.75 AND T <


1) The arithmetic mean of all the feedbacks for each fea-


1


ture of a service is calculated using (2).


Fully Tustworthy, if T = 1
n
1 X (5)
µFBi =

FSl (2)
n
l=1 where T is calculated in (6).
where FSl represents the feedback given for the fea- n
ture i. 1 X 
T = FCm (6)
2) The arithmetic mean of the feedbacks of all the features n
m=1
of a service given by a SC ‘j’ after consuming that
where the mean of FC for all the features of a service is
service is calculated as described in (3).
calculated after its consumption. By calculating the mean
n
1 X based on feedback categories, it becomes easy to assess the
µFBj =

FSl (3)
n trustworthiness of both service consumer and the service
l=1
provider. If T lies within the range of 0 and 0.25 then it is
where FSl represents the feedback given by SC j. further evaluated if it an attack or not. The algorithms for the
After feature scaling, categorization of feedback given by identification of various attacks are described in the following
SC ‘j’ for each feature is carried out. Equation (4) com- sub-section.
pares the feedback given by ‘j’ for the feature ‘i’ and then
assigns it the flag values as described in (4). If the difference 3) ALGORITHMS FOR TACKLING THREE ATTACKS
between the mean feedback and the feedback given by SC ‘j’ The algorithms to tackle three attacks, which are bad-
is 0 then it is assigned the value 1 i.e., trustworthy. If the mouthing, ballot-stuffing, and oscillation, are devised here.
difference between the mean feedback and the feedback given
1) Bad Mouthing: It is mentioned before that bad
by SC ‘j’ is ±0.2 then it is assigned the value 0.75 because it
mouthing is carried out by service consumers. When-
a minor difference. However, if the difference is ±0.4 then it
ever a required service is provided to a malicious or
is assigned the value 0.5 and 0.25 is assigned for ±0.6. For a
dishonest node. It deliberately provides bad recom-
difference, greater than ±0.6, it is assigned 0 which declares
mendations for an honest service providing node. The
the entity as a dubious entity.
purpose is to minimize the selection chances of that
1, if FSij = µFBi


 node. This behavior badly affects the trustworthiness
0.75, if (FSij − µFBi ) <= 0.2 ||


 concept. Therefore, the presence of such kind of dis-



 (µFBi − FSij ) <= 0.2 honest nodes needs to be identified to run the sys-



 0.5, if ((FSij − µFBi ) > 0.2 AND tem unbiasedly. For this, an algorithm 1 is proposed.


 (FS − µFBi ) < 0.4) || As soon as a service consumer ‘j’ starts giving feedback
 ij

 about the features of a service consumed by it. The
FC = ((µFBi − FSij > 0.2) AND (4) system compares the given feedback with the mean
 (µFBi − FSij < 0.4)
 feedback of that feature if it is below than the mean
0.25, if ((FSij − µFBi ) > 0.4 AND



 feedback of the feature of that service then the feed-
(FSij − µFBi ) < 0.6) ||


 back given by the service consumer ‘j’ is considered
((µFBi − FSij > 0.4) AND


 dubious. Then the system assesses whether it is a bad-
(µFBi − FSij < 0.6)


 mouthing attack or not. For this, it counts how many
0, Else

times the feedbacks, given by service consumer ‘j’, are
Following five classes were defined to predict the lev- less than the mean feedbacks of the services consumed
els of trustworthiness or untrustworthiness of the entities by ‘j’. If the percentage of the lower feedbacks given by

VOLUME 7, 2019 19623


S. Javaid et al.: ARCA-IoT: Attack-Resilient Cloud-Assisted IoT System

Algorithm 1 Assessing Bad Mouthing Attack Algorithm 3 Assessing Oscillation


Get the value of µFBi and FSij Get the value of µFBi and FSij
if FSij < µFBi then

if FSij < µFBi AND j ! = Bad Mouth then
for each FSij < µFBi in the past do Punishment = - β *µFB i
count++

else if FSij > µFBi AND j ! = Ballot Stuffer then
end for
Reward= β * µFBi
    
if count
totalµFB ∗100 > 50 AND total FBj >10
else
then
Neither reward nor punishment
j= Bad Mouth
end if
else
j = Not a Bad Mouth
end if
end if creates a good reputation by providing quality ser-
vices and then on and off, it provides bad services.
To identify this, an algorithm 3 is used. It is based on
punish and reward method. If any service consumer
‘j’ is greater than fifty percent of the total feedbacks of
gives feedback lower than the mean feedback for this
‘j’ and the service consumer ‘j’ has given more than ten
service provider and it is identified that this is not bad
feedbacks then this service consumer ‘j’ is declared an
mouthing then the service provider gets punishment
entity which is involved in “bad-mouthing”. The mini-
for providing a poor service. Hence, a service provider
mum threshold ten is considered so that newly entered
gets negative feedback for each low-quality service
service consumers can’t be declared as malicious.
which is aggregated into its total trust score resultantly
2) Ballot-Stuffing: Whenever a service consumer gives
decreasing its good reputation. If a service provider
feedback after consuming a service, it tries to increase
provides good service and the feedback is higher than
the good reputation of a service provider by provid-
the mean feedback and if the service consumer is not
ing an unfairly high rating. Hence, the presence of
a ballot-stuffer then positive feedback is aggregated in
such kind of dishonest nodes in the system also brings
the service provider’s trust score hence increasing the
imbalance to the system. To tackle this kind of behav-
good reputation. In ARCA-IoT, the variable β is set to
ior, another algorithm 2 is presented in ARCA-IoT.
5% which means 5% of the mean feedback of a feature
Whenever a service consumer ‘j’ gives feedback for a
of a service provider will be added to or deducted from
feature, it is compared with mean FB of that feature.
mean feedback as a reward or a punishment. The pur-
If it is greater than the mean feedback then the sys-
pose of setting the large value of β is to keep a service-
tem considers this feedback as dubious. The system
provider careful in providing services. However, it can
checks the history of feedbacks given by the service
be adjusted to some other value as well.
consumer ‘j’. If fifty percent of the feedbacks given by
The flowchart in Fig. 2 summarizes the evaluation process
‘j’ is greater than the mean feedback of each feature
for the trustworthiness of the entities where information of
of various services consumed by ‘j’ and the service
both service providers and service consumers is analyzed
consumer ‘j’ has given more than ten feedbacks then
first. A decision is made about the trustworthiness of both
it is considered as “ballot-stuffer”entity.
entities with the help of a Naive Bayes Classifier. If an entity
is trustworthy then the categorization of trustworthiness is
Algorithm 2 Assessing Ballot Stuffing Attack made. If it is assessed as non-trustworthy then the system
Get the value of µFBi and FSij categorizes the attack and takes appropriate action.
if FSij > µFBi then
for each FSij > µFBi in the past do V. EVALUATION OF SMART TRUSTWORTHINESS
count++ IDENTIFICATION
endfor     The efficiency of the proposed model is demonstrated with
if count
totalµFB ∗100 > 50 AND total FBj >10 a specifically designed simulated environment. In addition,
then a qualitative analysis based on parametric metrics is also
j= Ballot Stuffer carried out.
else Two groups of experiments were conducted.
j= Not a Ballot Stuffer 1) Group A: In this group of experiments, bad-mouthing
end if attacks were carried out by a group of service con-
end if sumers
2) Group B: In these experiments, ballot-stuffing attacks
3) Oscillation Attack: As mentioned in Table 2, this attack were carried out to assess the performance of
is related to service providers. The service provider ARCA-IoT.

19624 VOLUME 7, 2019


S. Javaid et al.: ARCA-IoT: Attack-Resilient Cloud-Assisted IoT System

FIGURE 2. Flowchart of the proposed model for trustworthiness.

A specifically designed environment was implemented in Each evaluation for each QoS constraint is then categorized
.NET platform which is explained below. using (4) to assess the trustworthiness of service consumers
1) Public Cloud: Microsoft Azure was used as a public and service provider as well. By categorizing each evaluation,
cloud where Resilient Agent resides. In addition, REST it will be easy to calculate the trustworthiness of SC and SP
APIs along with training data are also deployed here. using (5).
2) Service Consumer: It plays the role of a service seeker The Naive Bayes Classifier works on the assumption that
and seeks a service provider. After that, it gives feed- a feature present in a class is not related to other features
back. Keeping in view the types of attack models, three present. It is significant to note that all the properties con-
types of service consumers are implemented. 1) Honest tribute independently to the probability no matter if the fea-
service consumers 2) Service consumers for ballot- tures depend on each other. Equation for Naive Bayes is
stuffing 3) Service consumers for bad-mouthing (7) where c represents the class of trustworthiness and f
3) Service Provider: This entity plays the role of a ser- reflects the feature. The probabilities for each factor given the
vice provider. Two types of service providers are category of trustworthiness are calculated. The data is then
implemented. 1) Honest service providers 2) Service adjusted with Laplacian smoothing (8) so that zeros become
providers for oscillation attack more or less arbitrary small values as the observed zeros are
4) Social Entity: This is also called recommender entity wrong, therefore, there is a need to adjust them using a priori
as explain in IV-C. It supports in conducting the knowledge.
experiments.
 
 P f |c P c
P c|f =  (7)
P f
A. TRAINING THE MODEL 
 count f & c + 1
A dataset [26] was used for training the model so that it can P f |c =  (8)
differentiate between trustworthy and untrustworthy ‘things’. count c + no of classes
Since the capacity and time attributes of context level were The process of Naive Bayes is summarized in Fig. 3. After
not present in the dataset, therefore, the values of capacity feature selection in Phase I, preprocessing is done on raw
and time were generated randomly in the dataset. Initially, data using mathematical models mentioned in IV-D.2. After
the system was trained using Naive Bayes Algorithm on categorizing the dataset, Naive Bayes classifier classifies the
338*1000 matrix which is the evaluation for 1000 services by training dataset. The classifying model is then tested on
338 service consumers. The evaluations
 of QoS constraints testing data. Finally, the model is prepared to predict the
throughput and response time by service consumers are trustworthiness of the entities. Initially, two QoS attributes
statistically normalized within the range of 0 and 1 using (1). throughput and response time are considered whereas for

VOLUME 7, 2019 19625


S. Javaid et al.: ARCA-IoT: Attack-Resilient Cloud-Assisted IoT System

FIGURE 3. Naive Bayes training.

TABLE 8. Confusion matrix. TABLE 9. Performance metrics.

simplicity, capacity and time are defined in three categories.


The service capacity of a service provider is considered as
low, medium and high. The service timings are morning, noon
and evening.

B. PERFORMANCE METRICS
To assess the effectiveness of a proposed model for a
classification problem of machine learning, the confusion
matrix is one of the intuitive metrics used for this purpose
in related approaches [9]. This matrix, which is shown in
Table 8, is used for evaluating the accuracy of ARCA-IoT.
An entity is either trustworthy or untrustworthy. For simplic-
ity, the classes defined in section IV-D.2 are here considered
as two main classes. For this, TLevel less than 0.5 is con- C. EXPERIMENTS
sidered as untrustworthy and greater than or equal to 0.5 is Two types of experiments based on two scenarios are
considered as Trustworthy. Following terms are used to define carried out.
the confusion matrix as described in [27].
1) True Positive (TP): When an entity is actually honest 1) SCENARIO 1
and ARCA-IoT also classifies it as dishonest. In this scenario, the requests for the required services are put
2) True Negative (TN): When an entity is actually dishon- up in the system by the group of services seekers. With the
est and ARCA-IoT also classifies it as dishonest. requests, the service consumers also enter the required service
3) False Positive (FP): When an entity is actually dishon- type, service timing, and capacity. ARCA-IoT suggests those
est but ARCA-IoT classifies it as honest. top-quality service providers which match the criteria of the
4) False Negative (FN): When an entity is actually honest service seekers. For this, ARCA-IoT checks the database of
but ARCA-IoT classifies it as dishonest. the service seekers and also sends the requests to the social
Diab and Sartawi [28] refer a commonly used performance circle of the service seekers. After getting the suggestion
metrics to represents results in machine learning. The descrip- from ARCA-IoT, service seekers consume the required ser-
tion of these metrics is given in Table 9. vices and then give feedback as service consumers which

19626 VOLUME 7, 2019


S. Javaid et al.: ARCA-IoT: Attack-Resilient Cloud-Assisted IoT System

FIGURE 4. Trust assessment accuracy for bad mouthing.


FIGURE 7. Trust assessment specificity for bad mouthing.

FIGURE 5. Trust assessment precision for bad mouthing.


FIGURE 8. Trust assessment AUC for bad mouthing.

FIGURE 9. Trust assessment accuracy for bad mouthing.


FIGURE 6. Trust assessment sensitivity for bad mouthing.

2) SCENARIO 2
in this scenario are the bad-mouth and honest entities. The After getting suggestions, in the way used in Scenario 1, from
system evaluates the feedback everytime it is given by a ARCA-IoT service consumers give feedback about the qual-
service seeker whether it is honest or not. Fig. 4 shows trust ity of the services. In this scenario, the ballot stuffing entities
estimation Accuracy for measuring correctly identifying the take part. Fig. 9 - 13 display the performance metrics for
entities including Bad-Mouth. Fig. 5 depicts to which extent ARCA-IoT based on its assessment for Ballot Stuffing. The
ARCA-IoT identifies trustworthy entities with respect to all metrics show that the performance reaches to higher score
positive entities. Similarly, Fig. 6 reflects the assessment of after few transactions which in short display that ARCA-IoT
correct identification of trustworthy entities which is also has successfully identified the malicious and dubious acts of
known as Recall. Fig. 7 shows to which extent ARCA-IoT Ballot stuffer which it learns from the proposed Naive-Bayes
recognized the Bad-Mouthing Entities. The graphical assess- model. It is observed that ARCA-IoT achieves higher accu-
ment for AUC is displayed in Fig. 8. The results of this racy score as soon as the number of transactions increases
scenario show that ARCA-IoT has successfully identified the depicting in Fig. 9. Precision which is also known as Positive
honest and dishonest entities. The performance improves as Predictive value is displayed in Fig. 10. The sensitivity which
soon as the number of transaction increases. is also called True positive rate and Fig. 11 shows the rate

VOLUME 7, 2019 19627


S. Javaid et al.: ARCA-IoT: Attack-Resilient Cloud-Assisted IoT System

FIGURE 13. Trust assessment accuracy for ballot stuffing.


FIGURE 10. Trust assessment precision for bad mouthing.

TABLE 10. Comparison with related systems.

FIGURE 11. Trust assessment accuracy for ballot stuffing.

contribute to the novelty of ARCA-IoT are considered here


for the comparison. It is fair to say that to the best of our
knowledge, there was a lack of system in related work that
considers all of the mentioned criteria. Interoperability which
is a major issue in the way of growth of IoT as described
FIGURE 12. Trust assessment accuracy for ballot stuffing.
in [3] has not got much attention of the researchers. People
pay for services and in return expect quality service from
of identification of positive entities increases when the no service providers. It can be said that not considering the QoS
of transaction increases. Similarly, the rate of identification attributes specifically related to IoT in trust management is
of negative entities also increases after a few numbers of really a matter of concern. This is the reason, trust manage-
transactions as shown in Fig. 12. Fig. 13 displays the perfor- ment in ARCA-IoT has focused on these attributes. Trusting
mance of ARCA-IoT by testing the classifier over a range of on someone who is unknown is not easy, therefore, it is
sensitivities/specificities. better to take recommendations from the social network and
For oscillation attack, it is identified whenever a service this area is in the limelight of the research community. That
provider does not provide quality service and ARCA-IoT is why it is not ignored in ARCA-IoT. Context Awareness
evaluates that the service consumer is not a dishonest entity specifically related to IoT is less considered in state of the
then it successfully applies the punishment and reward crite- art. ARCA-IoT has made it sure by the contribution of new
ria defined in Algorithm 3. attributes in literature. In the absence of human interaction
where ’things’ autonomously communicate with each other,
D. COMPARISON WITH EXISTING SYSTEM these ’things’ must be capable enough to make a human-like
The comparison of ARCA-IoT with related trust management wise decision so that malicious entities present in the network
system is carried out in Table 10. The key criteria which can be avoided.

19628 VOLUME 7, 2019


S. Javaid et al.: ARCA-IoT: Attack-Resilient Cloud-Assisted IoT System

VI. CONCLUSION AND FUTURE WORK [13] K. Rostamzadeh, H. Nicanfar, N. Torabi, S. Gopalakrishnan, and
In this paper, three challenges faced by IoT world are dis- V. C. M. Leung, ‘‘A context-aware trust-based information dissemination
framework for vehicular networks,’’ IEEE Internet Things J., vol. 2, no. 2,
cussed which are interoperability, scalability, and trustwor- pp. 121–132, Apr. 2015.
thiness. A solution called ARCA-IoT is proposed to take up [14] J. B. Bernabe, J. L. H. Ramos, and A. F. S. Gomez, ‘‘TACIoT: Multidimen-
these challenges. ARCA-IoT leverages the concept of the sional trust-aware access control system for the Internet of Things,’’ Soft
Comput., vol. 20, no. 5, pp. 1763–1779, 2016.
cloud and the Web technologies for the facilitation of interop- [15] Y. B. Saied, A. Olivereau, D. Zeghlache, and M. Laurent, ‘‘Trust manage-
erability and scalability. Serving ’things’ named SP make use ment system design for the Internet of Things: A context-aware and multi-
of web services and provide services to service seeking enti- service approach,’’ Comput. Secur., vol. 39, pp. 351–365, Nov. 2013.
[16] J. Delsing, J. Eliasson, J. van Deventer, H. Derhamy, and P. Varga,
ties. For trustworthiness, it is identified that trust is dynamic ‘‘Enabling IoT automation using local clouds,’’ in Proc. IEEE 3rd World
in context. Therefore, ten context related attributes for SP are Forum Internet Things (WF-IoT), Dec. 2016, pp. 502–507.
considered in the proposed system to make the system context [17] I. Farris, L. Militano, M. Nitti, L. Atzori, and A. Iera, ‘‘Federated edge-
assisted mobile clouds for service provisioning in heterogeneous IoT envi-
aware for providing the service. Besides this, the attributes for ronments,’’ in Proc. IEEE 2nd World Forum Internet of Things (WF-IoT),
maintaining the quality of service are also identified. How- Dec. 2015, pp. 591–596.
ever, it is discovered that malicious and dishonest entities try [18] C. Stergiou, K. E. Psannis, B.-G. Kim, and B. Gupta, ‘‘Secure integration
of IoT and cloud computing,’’ Future Gener. Comput. Syst., vol. 78,
to maneuver the trustworthiness level of others. To intercept pp. 964–975, Jan. 2018.
their attacks, Naive Bayes classifier along with three pro- [19] A. R. Biswas and R. Giaffreda, ‘‘IoT and cloud convergence: Opportunities
posed algorithms are integrated into the system. Experimental and challenges,’’ in Proc. IEEE World Forum Internet Things (WF-IoT),
Mar. 2014, pp. 375–376.
results show that ARCA-IoT has successfully identified such [20] M. Deutsch, ‘‘Cooperation and trust: Some theoretical notes,’’ in Proc.
entities. This is proved through performance metrics that Nebraska Symp. Motivat., M. R. Jones, Ed. Lincoln, NE, USA: Nebraska
the results are quite successful. Moreover, the comparative Univ. Press, 1962, pp. 275–320.
[21] P. Hasan, ‘‘Privacy preserving reputation systems for decentralized,’’ Inst.
analysis based on parametric metrics also reflects the novelty Nat. des Sci. Appliquees de Lyon, Villeurbanne, France, Tech. Rep., 2010.
of the proposed system. [22] A. Jøsang, R. Ismail, and C. Boyd, ‘‘A survey of trust and reputation
In future, the resilience against more attack models will systems for online service provision,’’ Decision Support Syst., vol. 43,
no. 2, pp. 618–644, Mar. 2007.
be incorporated into the system. More attributes related to [23] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, ‘‘Context
context awareness and quality of service will be identified to aware computing for the Internet of Things: A survey,’’ IEEE Commun.
establish trustworthiness in cloud-assisted IoT environment. Surveys Tuts., vol. 16, no. 1, pp. 414–454, 1st Quart., 2014.
[24] L. Garcés, A. Ampatzoglou, P. Avgeriou, and E. Y. Nakagawa, ‘‘Quality
attributes and quality models for ambient assisted living software sys-
REFERENCES tems: A systematic mapping,’’ Inf. Softw. Technol., vol. 82, pp. 121–138,
[1] L. Tan and N. Wang, ‘‘Future Internet: The Internet of Things,’’ in Proc. Feb. 2017.
IEEE 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE), vol. 5, [25] I. B. Mohamad and D. Usman, ‘‘Standardization and its effects on K-means
Aug. 2010, pp. V5-376–V5-380. clustering algorithm,’’ Res. J. Appl. Sci., Eng. Technol., vol. 6, no. 17,
[2] S. Javaid, H. Afzal, F. Arif, and N. Iltaf, ‘‘Trust management for SOA based pp. 3299–3303, 2013.
social WoT system,’’ in Proc. IEEE 20th Int. Conf. Adv. Commun. Technol. [26] WS-Dream Team. (2018). Towards open source Datasets. [Online]. Avail-
(ICACT), Feb. 2018, pp. 387–392. able: http://wsdream.github.io/
[3] Interoperability Internet Things, NDP Analystics, Washington, DC, USA, [27] S. Turgut, M. Daǧtekin, and T. Ensari, ‘‘Microarray breast cancer data
Dec. 2017. [Online]. Available: www.ndpanalytics.com/s/Interoperability- classification using machine learning methods,’’ In Proc. IEEE Electr.
and-IoT-120617-Final.pdf Electron., Comput. Sci., Biomed. Eng. Meeting (EBBT, Apr. 2018,
[4] D. Guinard, V. Trifa, and E. Wilde, ‘‘A resource oriented architecture for pp. 1–3.
the Web of things,’’ in Proc. IEEE Internet Things (IOT), Nov./Dec. 2010, [28] S. Diab and B. Sartawi. (2017). ‘‘Classification of questions and learning
pp. 1–8. outcome statements (LOS) into blooms taxonomy (BT) by similarity mea-
[5] A. Kamilaris, ‘‘Enabling smart homes using Web technologies,’’ surements towards extracting of learning outcome from learning materia.’’
Ph.D. dissertation, 2013. [Online]. Available: https://arxiv.org/abs/1706.03191
[6] I.-R. Chen, J. Guo, and F. Bao, ‘‘Trust management for SOA-based IoT
and its application to service composition,’’ IEEE Trans. Services Comput.,
vol. 9, no. 3, pp. 482–495, May/Jun. 2016.
[7] D. Guinard, ‘‘A Web of things application architecture: Integrating the real-
world into the Web,’’ Ph.D. dissertation, ETH Zürich, Zürich, Switzerland,
2011.
[8] A. Botta, W. de Donato, V. Persico, and A. Pescap, ‘‘Integration of cloud
computing and Internet of Things: A survey,’’ Future Gener. Comput. Syst.,
vol. 56, pp. 684–700, Mar. 2016.
[9] S. Javed, H. Afzal, F. Arif, and A. Majeed, ‘‘Reputation management sys-
tem for fostering trust in collaborative and cohesive disaster management,’’
Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 7, pp. 347–357, 2016. SABEEN JAVAID received the M.S. degree in
[10] G. D’Angelo, S. Rampone, and F. Palmieri, ‘‘Developing a trust model computer software engineering from the National
for pervasive computing based on Apriori association rules learning and
University of Sciences and Technology (NUST),
Bayesian classification,’’ Soft Comput., vol. 21, no. 21, pp. 6297–6315,
Islamabad, Pakistan, where she is currently pur-
2017.
[11] A. Mehmood, M. Mukherjee, S. H. Ahmed, H. Song, K. M. Malik, suing the Ph.D. degree with the Department of
‘‘NBC-MAIDS: Naïve Bayesian classification technique in multi-agent Computer Software Engineering, Military Col-
system-enriched IDS for securing IoT against DDoS attacks,’’ J. Super- lege of Signals. Her research interests include
comput., vol. 74, no. 10, pp. 5156–5170, 2018. Web services, trust management, Web of Things,
[12] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, ‘‘CA4IOT: and the Internet of Things. She is also an
Context awareness for Internet of Things,’’ in Proc. IEEE Int. Conf. Green IEEE member. She was a recipient of the IEEE
Comput. Commun. (GreenCom), Nov. 2012, pp. 775–782. Outstanding Volunteer Award.

VOLUME 7, 2019 19629


S. Javaid et al.: ARCA-IoT: Attack-Resilient Cloud-Assisted IoT System

HAMMAD AFZAL received the M.Sc. degree in ZHIYUAN TAN received the Ph.D. degree from
advanced computing sciences from the Univer- the University of Technology Sydney, Australia,
sity of Manchester, U.K., and the Ph.D. degree in 2014. He has a research background in net-
from the School of Computer Science, University work security and pattern recognition. He has been
of Manchester, in 2009, under the supervision a Postdoctoral Researcher with the University of
of Dr. G. Nenadic in the Text Mining Group. Twente, since 2014. He is currently a Lecturer with
He was with the Digital Enterprise Research Insti- the School of Computing, Edinburgh Napier Uni-
tute, National University of Ireland, Galway, as a versity. He has published over 40 quality scholarly
Research Assistant, in 2009. He is currently the articles. His most recent research achievements
Head of the Center of Data and Text Engineering have been published in several highly-cited IEEE
and Mining Group, National University of Sciences and Technology. His Transactions and Elsevier journals, including the IEEE TRANSACTIONS ON
current research interests include machine learning, text, and data mining COMPUTERS, the IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
systems. He received the Program Prize of the year from the Department of the IEEE TRANSACTIONS ON CLOUD COMPUTING, Future Generation Computer
Computation for acquiring highest grades in M.Sc. courses. Systems, and Computer Networks. His research contribution on network
security is internationally recognized. According to Google Scholar, he has
an H-Index of 13 and his research articles have received over 830 citations
MUHAMMAD BABAR received the bache-
since 2010. Moreover, he has earned various research awards, including the
lor’s degree (Hons.) in computer sciences from
National Research Award, 2017, (The Research Council of the Sultanate of
the University of Peshawar, Pakistan, in 2008,
Oman), and the IEEE Outstanding Service Award, over the past years.
the M.Sc. degree from the National University
Sciences and Technology (NUST), Islamabad,
Pakistan, in 2012, and the Ph.D. degree from
the Signals College, NUST. He has published
his research work in various IEEE, Elsevier,
and ACM/Springer International reputed journals.
His research interests include big data analytics,
the Internet of Things (IoT), smart city design and planning, and social Web
of Things.

FAHIM ARIF receives the bachelor’s degree in


telecommunication from the College of Telecom- MIAN AHMAD JAN received the Ph.D. degree
munication Engineering, UET, Lahore, in 1995, from the Faculty of Engineering and Information
and the M.Sc. degree in computer software engi- Technology, University of Technology Sydney.
neering from the National University of Sciences He has joined Abdul Wali Khan University
and Technology (NUST), Islamabad, in 2003. Mardan, Pakistan, as an Assistant Professor,
He was an International Research Scholar with the in 2016. His research interests include wireless
System and Computer Engineering Department, sensor network clustering protocols, congestion
Carleton University, Ottawa, Canada, in 2007, and control, the Internet and Web of Things, and effi-
participated in numerous research and academic cient network intrusion detection techniques. He
activities. He received NUST Endowment Fund Scheme Scholarship for has published his research in top ranked Elsevier,
NUST, in 2003, and International Research Support Initiative Program Fund IEEE Transactions and Conference in these areas of research. He was a
from HEC, in 2007. He is a Principal Investigator for a project funded recipient of various research awards such as UTS International Research
by NUST. Recently, his biography has been published Who’s Who in the Scholarship and CSIRO Top-up Scholarship. He was also a recipient of the
World (South Asian Publication, 2008 Edition) and received Star Laureate, Best Researcher Award, for the year 2014, at the University of Technology
2008, in recognition to his contributions to knowledge and research. Sydney, Australia.

19630 VOLUME 7, 2019

Das könnte Ihnen auch gefallen