Home > Research > Publications & Outputs > Information Management for Trust Computation on...

Electronic data

  • FGCS2022

    Accepted author manuscript, 451 KB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

  • FGCS2022

    Accepted author manuscript, 556 KB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

Links

Text available via DOI:

View graph of relations

Information Management for Trust Computation on Resource-constrained IoT Devices

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Information Management for Trust Computation on Resource-constrained IoT Devices. / Bradbury, Matthew; Jhumka, Arshad; Watson, Tim.
In: Future Generation Computer Systems, Vol. 135, 31.10.2022, p. 348-363.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Bradbury, M, Jhumka, A & Watson, T 2022, 'Information Management for Trust Computation on Resource-constrained IoT Devices', Future Generation Computer Systems, vol. 135, pp. 348-363. https://doi.org/10.1016/j.future.2022.05.004

APA

Vancouver

Bradbury M, Jhumka A, Watson T. Information Management for Trust Computation on Resource-constrained IoT Devices. Future Generation Computer Systems. 2022 Oct 31;135:348-363. Epub 2022 May 25. doi: 10.1016/j.future.2022.05.004

Author

Bradbury, Matthew ; Jhumka, Arshad ; Watson, Tim. / Information Management for Trust Computation on Resource-constrained IoT Devices. In: Future Generation Computer Systems. 2022 ; Vol. 135. pp. 348-363.

Bibtex

@article{2b020c56a52447a98e1b565a8cb1b712,
title = "Information Management for Trust Computation on Resource-constrained IoT Devices",
abstract = "Resource-constrained Internet of Things (IoT) devices are executing increasingly sophisticated applications that may require computational or memory intensive tasks to be executed. Due to their resource constraints, IoT devices may be unable to compute these tasks and will offload them to more powerful resource-rich edge nodes. However, as edge nodes may not necessarily behave as expected, an IoT device needs to be able to select which edge node should execute its tasks. This selection problem can be addressed by using a measure of behavioural trust of the edge nodes delivering a correct response, based on historical information about past interactions with edge nodes that are stored in memory. However, due to their constrained memory capacity, IoT devices will only be able to store a limited amount of trust information, thereby requiring an eviction strategy when its memory is full of which there has been limited investigation in the literature. To address this, we develop the concept of the memory profile of an agent and that profile's utility. We formalise the profile eviction problem in a unified profile memory model and show it is NP-complete. To circumvent the inherent complexity, we study the performance of eviction algorithms in a partitioned profile memory model using our utility metric. Our results show that localised eviction strategies which only consider one specific type of information do not perform well. Thus we propose a novel eviction strategy that globally considers all types of trust information stored and we show that it outperforms local eviction strategies for the majority of memory sizes and agent behaviours. In this paper, we develop a concept of information utility to a trust model and formalise the problem of information eviction, which we prove to be NP-complete. We then investigate the usefulness of different eviction strategies to maximise the utility of information stored to enable trust-based task offloading.",
keywords = "Trust, Information management, IoT, Resource-constraints, Edge nodes, Offloading",
author = "Matthew Bradbury and Arshad Jhumka and Tim Watson",
year = "2022",
month = oct,
day = "31",
doi = "10.1016/j.future.2022.05.004",
language = "English",
volume = "135",
pages = "348--363",
journal = "Future Generation Computer Systems",
issn = "0167-739X",
publisher = "Elsevier",

}

RIS

TY - JOUR

T1 - Information Management for Trust Computation on Resource-constrained IoT Devices

AU - Bradbury, Matthew

AU - Jhumka, Arshad

AU - Watson, Tim

PY - 2022/10/31

Y1 - 2022/10/31

N2 - Resource-constrained Internet of Things (IoT) devices are executing increasingly sophisticated applications that may require computational or memory intensive tasks to be executed. Due to their resource constraints, IoT devices may be unable to compute these tasks and will offload them to more powerful resource-rich edge nodes. However, as edge nodes may not necessarily behave as expected, an IoT device needs to be able to select which edge node should execute its tasks. This selection problem can be addressed by using a measure of behavioural trust of the edge nodes delivering a correct response, based on historical information about past interactions with edge nodes that are stored in memory. However, due to their constrained memory capacity, IoT devices will only be able to store a limited amount of trust information, thereby requiring an eviction strategy when its memory is full of which there has been limited investigation in the literature. To address this, we develop the concept of the memory profile of an agent and that profile's utility. We formalise the profile eviction problem in a unified profile memory model and show it is NP-complete. To circumvent the inherent complexity, we study the performance of eviction algorithms in a partitioned profile memory model using our utility metric. Our results show that localised eviction strategies which only consider one specific type of information do not perform well. Thus we propose a novel eviction strategy that globally considers all types of trust information stored and we show that it outperforms local eviction strategies for the majority of memory sizes and agent behaviours. In this paper, we develop a concept of information utility to a trust model and formalise the problem of information eviction, which we prove to be NP-complete. We then investigate the usefulness of different eviction strategies to maximise the utility of information stored to enable trust-based task offloading.

AB - Resource-constrained Internet of Things (IoT) devices are executing increasingly sophisticated applications that may require computational or memory intensive tasks to be executed. Due to their resource constraints, IoT devices may be unable to compute these tasks and will offload them to more powerful resource-rich edge nodes. However, as edge nodes may not necessarily behave as expected, an IoT device needs to be able to select which edge node should execute its tasks. This selection problem can be addressed by using a measure of behavioural trust of the edge nodes delivering a correct response, based on historical information about past interactions with edge nodes that are stored in memory. However, due to their constrained memory capacity, IoT devices will only be able to store a limited amount of trust information, thereby requiring an eviction strategy when its memory is full of which there has been limited investigation in the literature. To address this, we develop the concept of the memory profile of an agent and that profile's utility. We formalise the profile eviction problem in a unified profile memory model and show it is NP-complete. To circumvent the inherent complexity, we study the performance of eviction algorithms in a partitioned profile memory model using our utility metric. Our results show that localised eviction strategies which only consider one specific type of information do not perform well. Thus we propose a novel eviction strategy that globally considers all types of trust information stored and we show that it outperforms local eviction strategies for the majority of memory sizes and agent behaviours. In this paper, we develop a concept of information utility to a trust model and formalise the problem of information eviction, which we prove to be NP-complete. We then investigate the usefulness of different eviction strategies to maximise the utility of information stored to enable trust-based task offloading.

KW - Trust

KW - Information management

KW - IoT

KW - Resource-constraints

KW - Edge nodes

KW - Offloading

U2 - 10.1016/j.future.2022.05.004

DO - 10.1016/j.future.2022.05.004

M3 - Journal article

VL - 135

SP - 348

EP - 363

JO - Future Generation Computer Systems

JF - Future Generation Computer Systems

SN - 0167-739X

ER -