{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T07:18:16Z","timestamp":1745306296949,"version":"3.37.3"},"reference-count":38,"publisher":"Association for Computing Machinery (ACM)","issue":"3","funder":[{"name":"Cyber Florida?s Collaborative Seed Award program"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2020,8,31]]},"abstract":"As Internet of Things (IoT) and Cyber-Physical systems become more ubiquitous in our daily lives, it necessitates the capability to measure the trustworthiness of the aggregate data from such systems to make fair decisions. However, the interpretation of trustworthiness is contextual and varies according to the risk tolerance attitude of the concerned application. In addition, there exist varying levels of uncertainty associated with an evidence upon which a trust model is built. Hence, the data integrity scoring mechanisms require some provisions to adapt to different risk attitudes and uncertainties.<\/jats:p>\n \n In this article, we propose a prospect theoretic framework for data integrity scoring that quantifies the trustworthiness of the collected data from IoT devices in the presence of adversaries who try to manipulate the data. In our proposed method, we consider an imperfect anomaly monitoring mechanism that tracks the transmitted data from each device and classifies the outcome (trustworthiness of data) as\n not compromised, compromised,<\/jats:italic>\n or\n undecided<\/jats:italic>\n . These outcomes are conceptualized as a multinomial hypothesis of a Bayesian inference model with three parameters. These parameters are then used for calculating a utility value via prospect theory to evaluate the reliability of the aggregate data at an IoT hub. In addition, to take into account different risk attitudes, we propose two types of fusion rule at IoT hub\u2014optimistic and conservative.\n <\/jats:p>\n Furthermore, we put forward asymmetric weighted moving average scheme to measure the trustworthiness of aggregate data in presence of On-Off attacks. The proposed framework is validated using extensive simulation experiments for both uniform and On-Off attacks. We show how trust scores vary under a variety of system factors like attack magnitude and inaccurate detection. In addition, we measure the trustworthiness of the aggregate data using the well-known expected utility theory and compare the results with that obtained by prospect theory. The simulation results reveal that prospect theory quantifies trustworthiness of the aggregate data better than expected utility theory.<\/jats:p>","DOI":"10.1145\/3392058","type":"journal-article","created":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T00:05:12Z","timestamp":1590451512000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["A Prospect Theoretic Approach for Trust Management in IoT Networks Under Manipulation Attacks"],"prefix":"10.1145","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9243-9480","authenticated-orcid":false,"given":"Mehrdad","family":"Salimitari","sequence":"first","affiliation":[{"name":"University of Central Florida, Orlando, FL"}]},{"given":"Shameek","family":"Bhattacharjee","sequence":"additional","affiliation":[{"name":"Western Michigan University, Kalamazoo, MI"}]},{"given":"Mainak","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL"}]},{"given":"Yaser P.","family":"Fallah","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL"}]}],"member":"320","published-online":{"date-parts":[[2020,5,25]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2736446"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1017-z"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405513"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.27.1.173"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357511"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2889458"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.87"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2018.8326290"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2317719"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS110303056C"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2009.08.001"},{"volume-title":"Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud\u201917)","author":"Guo Jia","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Daniel Kahneman and Amos Tversky. 1979. Prospect theory: An analysis of decision under risk. Econometrica: J.\u00a0Econ. Soc. (1979) 263--291. Daniel Kahneman and Amos Tversky. 1979. Prospect theory: An analysis of decision under risk. Econometrica: J.\u00a0Econ. Soc. (1979) 263--291.","DOI":"10.2307\/1914185"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Daniel Kahneman and Amos Tversky. 2013. Prospect theory: An analysis of decision under risk. In Handbook of the Fundamentals of Financial Decision Making: Part I. World Scientific 99--127. Daniel Kahneman and Amos Tversky. 2013. Prospect theory: An analysis of decision under risk. In Handbook of the Fundamentals of Financial Decision Making: Part I. World Scientific 99--127.","DOI":"10.1142\/9789814417358_0006"},{"volume-title":"Generalized Multivariate Analysis","author":"Kai-Tai Fang","key":"e_1_2_1_15_1"},{"volume-title":"Trust management in distributed systems. Computer 40, 2","year":"2007","author":"Li Huaizhi","key":"e_1_2_1_16_1"},{"volume-title":"Proceedings of the 46th Annual Conference on Information Sciences and Systems (CISS\u201912)","author":"Li Tianming","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2677520"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/859731"},{"volume-title":"Generalized expected utility theory: The rank-dependent model","author":"Quiggin John","key":"e_1_2_1_20_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-011-2182-8"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.105"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2017.7899434"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2017.167"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/01441647.2013.856356"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3288599.3288640"},{"key":"e_1_2_1_26_1","first-page":"05613","article-title":"A survey on consensus protocols in blockchain for IoT networks","volume":"1809","author":"Salimitari Mehrdad","year":"2018","journal-title":"Arxiv Preprint Arxiv"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2017.00043"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013824"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996862"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11166-007-9017-6"},{"volume-title":"Proceedings of the IEEE World Forum on Internet of things (WF-IoT\u201914)","author":"Singh Dhananjay","key":"e_1_2_1_31_1"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITEED.2016.7863271"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861389"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00122574"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2659418"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2015.2488636"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600421"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3392058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T11:39:36Z","timestamp":1672573176000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3392058"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,25]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,8,31]]}},"alternative-id":["10.1145\/3392058"],"URL":"https:\/\/doi.org\/10.1145\/3392058","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.12121899.v1","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.12121899","asserted-by":"object"}]},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2020,5,25]]},"assertion":[{"value":"2019-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-05-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}