A Method for Trust-Based Collaborative Smart Device Selection and Resource Allocation in the Financial Internet of Things
Abstract
1. Introduction
- To ensure secure and reliable collaboration among intelligent devices in the FIoT, a comprehensive trust model is proposed. This model quantifies trust based on three distinct but complementary components: direct trust, indirect trust, and aggregate trust. Direct trust is calculated based on the historical interactions and behavioral patterns observed between devices, reflecting firsthand experience. Indirect trust is derived from recommendations or feedback provided by other nodes within the network, allowing trust to be estimated even in the absence of direct interactions. Aggregate trust serves as a unified measure, synthesizing direct and indirect trust to produce a holistic evaluation of a device’s trustworthiness. This layered approach not only improves the accuracy of trust assessments but also enhances the system’s resilience to malicious behavior, misinformation, and reputation manipulation. A trusted device selection algorithm that integrates both trust and black- and whitelist mechanisms is introduced. The proposed algorithm enhances the system’s capability to withstand attacks.
- Building upon the proposed trust model, a trusted device selection algorithm is developed to identify suitable collaboration partners among FIoT devices. This algorithm integrates both the computed trust values and a black- and whitelist mechanism, offering a dual-layered security framework. The whitelist includes devices with a verified history of trustworthy behavior, ensuring priority in resource allocation and task assignment. The blacklist consists of devices that have been identified as compromised, untrustworthy, or malicious, thereby preventing them from participating in collaborative processes. This hybrid mechanism enables dynamic and adaptive device selection, significantly strengthening the system’s ability to defend against a wide range of attacks. The result is a robust and scalable method for maintaining the integrity and reliability of device interactions in FIoT environments. To address the dynamic nature of device behavior in FIoT environments, this paper also proposes a dynamic black- and whitelist transformation mechanism. Unlike static approaches, this mechanism enables the real-time adaptation of trust boundaries by continuously monitoring device behavior and updating list memberships accordingly. This dynamic transformation mechanism ensures that the trust system remains both flexible and responsive to evolving threats and behavioral shifts. It mitigates the risks associated with fixed classifications and provides a robust defense against strategic attackers who may alternate between benign and malicious behavior to evade detection.
- To optimize the utilization of limited resources among a dynamically changing set of trusted devices, a resource allocation algorithm based on coalition game theory is proposed. In this framework, devices form coalitions based on mutual trust and resource needs, cooperating to share resources in a way that maximizes the overall utility of the group. This approach allows for flexible, dynamic, and decentralized resource management, which is critical in heterogeneous and large-scale FIoT networks. By leveraging coalition formation strategies, the system can adapt to changing demands and trust landscapes in real-time, ensuring sustained performance and security.
2. Related Work
3. Proposed Methods
3.1. System Scenario
3.2. Trust Mechanism Design
3.2.1. Subjective Direct Trust
- Direct Trust Computation
- 2.
- The Decay of Trust Value
- 3.
- Trust Value Update
- 4.
- Normalization
Algorithm 1 Direct Trust Value Calculation Algorithm |
Input: Quantity of interactions , end user assessment of each service , coefficient of weight , the current moment when the trust value is computed, assess the feedback message timing , reward coefficient , penalty coefficient . Output: The direct trustworthiness value of the end user, service satisfaction evaluation set , evaluation set of service dissatisfaction, quantity of service satisfaction ratings , Quantity of service evaluations that are unsatisfactory. 1: , , ; 2: if then 3: for to do 4: if then 5: ; 6: ; 7: else 8: ; 9: ; 10: end if 11: 12: end for 13: if the provision of cooperative service devices constitutes a valid service. then 14: Update the direct trust value in accordance with Equation (7). 15: else 16: Update the direct trust value in accordance with Equation (8). 17: end if 18: end if 19: Determine in accordance with Equation (9). 20: if then 21: Determine in accordance with Equation (6). 22: if cooperative service devices offer efficient services. then 23: Update the direct trust value in accordance with Equation (8). 24: else 25: Update the direct trust value in accordance with Equation (9). 26: end if 27: end if 28: Update the direct trust value in accordance with Equation (9). 29: return , , , , |
3.2.2. Objective Indirect Trust
Algorithm 2 Indirect Trust Value Computation Algorithm |
Input: Set A of cooperative service devices, the direct trust value calculated by Algorithm 1, time .
Output: 1: Constructing matrix CC. 2: for do 3: Calculate in accordance with Equation (14). 4: end for 5: return |
3.2.3. Aggregate Trust
Algorithm 3 Aggregate Trust Value Calculation Algorithm |
Input: Time , Set of cooperative service devices.
Output: 1: Determine in accordance with Algorithm 1. 2: Determine in accordance with Algorithm 2. 3: Calculate the mean value of direct trust in . 4: 5: 6: return |
3.3. Trusted Cooperative Service Device Selection Mechanism
3.3.1. Black- and Whitelist Mechanism
- Blacklist Mechanism
Algorithm 4 The Algorithm for Tolerance Calculation |
Input: The quantity of interactions , the evaluation value of each service as perceived by the end user, the fairness rating of each service as perceived by the end user, the factor of service fairness .
Output: Tolerance 1: , , , , ; 2: for to do 3: if then 4: ; 5: ; 6: else 7: ; 8: ; 9: end if 10: if then 11: ; 12: ; 13: else 14: ; 15: ; 16: end if 17: end for 18: 19: return |
- 2.
- Construction of Blacklist
- 3.
- Whitelist Mechanism
- 4.
- Whitelist Mechanism
3.3.2. Dynamic Whitelist Conversion Mechanism
- Blacklist and Whitelist Removal Mechanism
- (1)
- The ratio of unsatisfactory services to total services. A larger indicates that device provides invalid services more frequently, increasing the probability of its removal from the whitelist.
- (2)
- To prevent device from strategically providing unsatisfactory services while maintaining a high effective service ratio, we consider the number of ineffective services provided by device . The larger is, the higher the probability is of removing device from the whitelist.
- (3)
- The importance of the service: If collaborative service device provides false feedback on highly important services, the probability of removing device from the whitelist increases; conversely, for less important services, this probability decreases.
- (4)
- Terminal user ’s sensitivity to ineffective or malicious services : A larger value indicates that user has less tolerance for ineffective or malicious services, increasing the probability of removing device . Conversely, a smaller decreases this probability. Therefore, is defined as shown in Equation (27).
- 2.
- Blacklist Deletion Mechanism
- (1)
- Neighbor ’s attitude towards device : denotes that neighbor has blacklisted device ; indicates placement on the regular list; indicates the whitelist, with and defined accordingly. The more favorable neighbor ’s attitude is towards device , the higher the probability is that end user will remove from the blacklist.
- (2)
- Evaluation reliability between end user and neighbor : A higher means neighbor has a greater influence on .
- (3)
- End user ’s aversion to invalid or malicious services : A higher value makes it less likely for device to be removed from the blacklist. In summary, is defined as shown in Equation (28).
Algorithm 5 Black- and whitelist dynamic conversion mechanism |
Input: end user ’s blacklist , end user ’s whitelist general list Output: end user ’s blacklist after conversion , end user ’s whitelist after conversion , general after conversion 1: , , 2: if then 3: is calculated according to Equation (27). 4: 5: if 6: 7: 8: else 9: The co-serving device continues to remain in the set 10: end if 11: end if 12: if then 13: is calculated according to Equation (28). 14: if 15: 16: 17: else 18: The co-serving device continues to remain in the set 19: end if 20: end if 21: return , , |
Algorithm 6 Collaborative service device selection algorithm based on personalized black- and whitelist |
Input: end user ’s blacklist , end user ’s whitelist , the set of cooperative service devices for the service request is named, the cumulative trust value of the cooperative service device , Output: The chosen cooperative service device 1: 2: 3: if 4: return −1 5: else 6: 7: if 8: The cooperative service device is selected for execution with a probability of . 9: else 10: The cooperative service device is selected for execution with a probability of . 11: end if 12: end if |
3.4. Resource Allocation Mechanism of Trusted Collaborative Service Devices
- Grouping Rules
- 2.
- Degree of Activity
- 3.
- Aggregate Trust Values
- 4.
- Coalition game
- 5.
- Resource Allocation Algorithm for Trusted Cooperative Service Devices
Algorithm 7 The Resource Allocation Algorithm for Trusted Cooperative Service Devices |
Input: Whitelist set, valid interaction records of collaborative service devices included in the whitelist, probability of being included in the whitelist, the maximal number of iterations , Output: Resource allocation outcomes for devices within the whitelist collection. 1: Calculate the value of the grouping function for each device within the whitelist set in accordance with Equation (31). 2: for do 3: if then 4: 5: else 6: 7: end if 8: end for 9: Randomly initialize the structure of the coalition within the set and . 10: for do 11: for do 12: if adhere to the rules stipulated in Definition 2 then 13: The coalition adjustment is conducted, a new coalition is formed, and the device joining sequence is recorded. 14: else 15: The coalition structure remains unaltered. 16: end if 17: 18: if Definition 3 remains valid or then 19: break 20: end if 21: end for 22: end for 23: For the devices in the set , the grouping function value is sorted in descending order by means of the quick sort algorithm to form the allocation result. 24: For the devices within the set , the device resources are allocated in accordance with the game outcomes of the coalition game. In the process of resource allocation, the proportional fairness criterion is used. 25: return whitelist of device resource allocation outcomes. |
- 6.
- Convergence of the algorithm
- 7.
- Algorithm stability
- 8.
- Time Complexity of the algorithm
4. Results and Discussion
4.1. Experimental Setting
4.2. Model Validation
4.3. Effectiveness of the Black- and Whitelist Mechanism
4.4. Trust Model’s Resistance to Attacks
4.5. Performance Evaluation of Resource Allocation Algorithms
- Performance Evaluation of Resource Allocation Algorithms
- 2.
- Impact of Parameters on the Resource Allocation Model
5. Conclusions and Future Works
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Yang, X.; Zeng, Z.; Liu, A.; Xiong, N.N.; Zhang, S. ADTO: A Trust Active Detecting-based Task Offloading Scheme in Edge Computing for Internet of Things. ACM Trans. Internet Technol. 2024, 24, 1–25. [Google Scholar] [CrossRef]
- Sun, Y.; Jiang, W.; Yang, Y.; Zhu, H.; Jiang, Y. Multi-domain authorization and decision-making method of access control in the edge environment. Comput. Netw. 2023, 228, 109721. [Google Scholar] [CrossRef]
- Li, J.; Zhang, H.; Li, S.; Cheng, L.; Guo, Y.; Wu, S. BD-TTS: A blockchain and DRL-based framework for trusted task scheduling in edge computing. Comput. Netw. 2024, 251, 110609. [Google Scholar] [CrossRef]
- Bounaira, S.; Alioua, A.; Souici, I. Blockchain-enabled trust management for secure content caching in mobile edge computing using deep reinforcement learning. Internet Things 2024, 25, 101081. [Google Scholar] [CrossRef]
- Geng, J.; Qin, Z.; Jin, S. Dynamic Resource Allocation for Cloud-Edge Collaboration Offloading in VEC Networks With Diverse Tasks. IEEE Trans. Intell. Transp. Syst. 2024, 25, 21235–21251. [Google Scholar] [CrossRef]
- Mageswari, U.; Deepak, G.; Santhanavijayan, A.; Mala, C. The IoT resource allocation and scheduling using elephant herding optimization (EHO-RAS) in IoT environment. Int. J. Inf. Technol. 2024, 16, 3283–3293. [Google Scholar] [CrossRef]
- Mostafa, N.; Shdefat, A.Y.; Al-Arnaout, Z.; Salman, M.; Elsayed, F. Optimizing IoT Resource Allocation Using Reinforcement Learning. In Proceedings of the International Conference on Advanced Engineering, Technology and Applications, Catania, Italy, 24–25 May 2024; pp. 736–747. [Google Scholar]
- Elgendy, I.A.; Zhang, W.-Z.; Liu, C.-Y.; Hsu, C.-H. An efficient and secured framework for mobile cloud computing. IEEE Trans. Cloud Comput. 2018, 9, 79–87. [Google Scholar] [CrossRef]
- Kang, J.; Yu, R.; Huang, X.; Wu, M.; Maharjan, S.; Xie, S.; Zhang, Y. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 2018, 6, 4660–4670. [Google Scholar] [CrossRef]
- Liu, J.; Li, C.; Luo, Y. Efficient resource allocation for IoT applications in mobile edge computing via dynamic request scheduling optimization. Expert Syst. Appl. 2024, 255, 124716. [Google Scholar] [CrossRef]
- Zhou, Y.; Ge, H.; Ma, B.; Zhang, S.; Huang, J. Collaborative task offloading and resource allocation with hybrid energy supply for UAV-assisted multi-clouds. J. Cloud Comput. 2022, 11, 42. [Google Scholar] [CrossRef]
- Deng, S.; Xiang, Z.; Zhao, P.; Taheri, J.; Gao, H.; Yin, J.; Zomaya, A.Y. Dynamical resource allocation in edge for trustable internet-of-things systems: A reinforcement learning method. IEEE Trans. Ind. Inform. 2020, 16, 6103–6113. [Google Scholar] [CrossRef]
- Liu, X.; Yu, J.; Wang, J.; Gao, Y. Resource allocation with edge computing in IoT networks via machine learning. IEEE Internet Things J. 2020, 7, 3415–3426. [Google Scholar] [CrossRef]
- Xu, J.; Xu, Z.; Shi, B. Deep reinforcement learning based resource allocation strategy in cloud-edge computing system. Front. Bioeng. Biotechnol. 2022, 10, 908056. [Google Scholar]
- Feng, X.; Zhu, X.; Han, Q.-L.; Zhou, W.; Wen, S.; Xiang, Y. Detecting vulnerability on IoT device firmware: A survey. IEEE/CAA J. Autom. Sin. 2022, 10, 25–41. [Google Scholar] [CrossRef]
- Deng, Z.; Guo, Y.; Han, C.; Ma, W.; Xiong, J.; Wen, S.; Xiang, Y. Ai agents under threat: A survey of key security challenges and future pathways. ACM Comput. Surv. 2025, 57, 1–36. [Google Scholar] [CrossRef]
- Zhou, W.; Zhu, X.; Han, Q.-L.; Li, L.; Chen, X.; Wen, S.; Xiang, Y. The security of using large language models: A survey with emphasis on ChatGPT. IEEE/CAA J. Autom. Sin. 2024, 12, 1–26. [Google Scholar] [CrossRef]
- Chen, R.; Bao, F.; Guo, J. Trust-based service management for social internet of things systems. IEEE Trans. Dependable Secur. Comput. 2015, 13, 684–696. [Google Scholar] [CrossRef]
- Suryani, V.; Sulistyo, S.; Widyawan, W. Two-phase security protection for the Internet of Things object. J. Inf. Process. Syst. 2018, 14, 1431–1437. [Google Scholar]
- Cai, Y.; Zhu, D. Fraud detections for online businesses: A perspective from blockchain technology. Financ. Innov. 2016, 2, 20. [Google Scholar] [CrossRef]
- Chen, G. Research on IoT Trust Model Based on Recommended Value Filtering Algorithm. Master’s Thesis, University of Science and Technology of China, Hefei, China, 2021. [Google Scholar]
- Chen, G.; Zeng, F.; Zhang, J.; Lu, T.; Shen, J.; Shu, W. An adaptive trust model based on recommendation filtering algorithm for the Internet of Things systems. Comput. Netw. 2021, 190, 107952. [Google Scholar] [CrossRef]
- Papadopoulos, S.; Bontcheva, K.; Jaho, E.; Lupu, M.; Castillo, C. Overview of the special issue on trust and veracity of information in social media. ACM Trans. Inf. Syst. (TOIS) 2016, 34, 1–5. [Google Scholar] [CrossRef]
- Wang, B.; Li, M. Cooperative Edge Computing Task Offloading Strategy for Urban Internet of Things. Wirel. Commun. Mob. Comput. 2021, 2021, 9959304. [Google Scholar] [CrossRef]
- Wang, T.; Song, L.; Han, Z.; Jiao, B. Dynamic popular content distribution in vehicular networks using coalition formation games. IEEE J. Sel. Areas Commun. 2013, 31, 538–547. [Google Scholar] [CrossRef]
- Szabó, G.; Tőke, C. Evolutionary prisoner’s dilemma game on a square lattice. Phys. Rev. E 1998, 58, 69. [Google Scholar] [CrossRef]
- Wang, Z.; Szolnoki, A.; Perc, M. Different perceptions of social dilemmas: Evolutionary multigames in structured populations. Phys. Rev. E 2014, 90, 032813. [Google Scholar] [CrossRef]
- Yuan, J.; Li, X. A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. Ieee Access 2018, 6, 23626–23638. [Google Scholar] [CrossRef]
- Kamvar, S.D.; Schlosser, M.T.; Garcia-Molina, H. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th International Conference on World Wide Web, New York, NY, USA, 20–24 May 2003; pp. 640–651. [Google Scholar]
- Fan, X.; Liu, L.; Li, M.; Su, Z. GroupTrust: Dependable trust management. IEEE Trans. Parallel Distrib. Syst. 2016, 28, 1076–1090. [Google Scholar] [CrossRef]
- Rendle, S.; Freudenthaler, C.; Gantner, Z.; Schmidt-Thieme, L. BPR: Bayesian personalized ranking from implicit feedback. arXiv 2012, arXiv:1205.2618. [Google Scholar]
- Wu, Y.; DuBois, C.; Zheng, A.X.; Ester, M. Collaborative denoising auto-encoders for top-n recommender systems. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, San Francisco, CA, USA, 22–25 February 2016; pp. 153–162. [Google Scholar]
- Chae, D.-K.; Kang, J.-S.; Kim, S.-W.; Lee, J.-T. CFGAN: A generic collaborative filtering framework based on generative adversarial networks. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management, Torino, Italy, 22–26 October 2018; pp. 137–146. [Google Scholar]
Symbol | Description | Value |
---|---|---|
Quantity of Users | 1000 | |
User Tolerance | 10 | |
User Satisfaction | 10 | |
Percentage of Busy Collaborative End Users | 10%, 20%, 40%, 100% | |
Predefined Number of Trusted Cooperative Service Devices | 5 | |
Total Services | 2000 | |
Initial Number of Services per End User | 15 | |
The Benefits of an Excellent Service | 7 | |
The Cost of Providing an Excellent Service | −1 | |
Loss of Invalid Services | −15 | |
The Cost of Ineffective Services Provided | −10 |
Algorithm | Precision | Recall | NDCG |
---|---|---|---|
BPR | 0.282097 | 0.27281 | 0.509021 |
CDAE | 0.271815 | 0.271885 | 0.474660 |
CFGAN | 0.251634 | 0.244755 | 0.456654 |
Our model | 0.327279 | 0.243134 | 0.565214 |
Algorithm | Precision | Recall | NDCG |
---|---|---|---|
BPR | 0.268145 | 0.479976 | 0.587745 |
CDAE | 0.246056 | 0.436588 | 0.536539 |
CFGAN | 0.207251 | 0.400631 | 0.497778 |
Our model | 0.289912 | 0.480077 | 0.623811 |
Algorithm | Precision | Recall | NDCG |
---|---|---|---|
BPR | 0.238172 | 0.626019 | 0.65792 |
CDAE | 0.219814 | 0.573304 | 0.600307 |
CFGAN | 0.186295 | 0.522359 | 0.556231 |
Our model | 0.242877 | 0.625874 | 0.682097 |
Algorithm | Precision | Recall | NDCG |
---|---|---|---|
BPR | 0.201455 | 0.715859 | 0.696002 |
CDAE | 0.194188 | 0.702956 | 0.675496 |
CFGAN | 0.169203 | 0.620556 | 0.603054 |
Our model | 0.201123 | 0.726377 | 0.737693 |
Algorithm | Precision | Recall | NDCG |
---|---|---|---|
BPR | 0.170613 | 0.766883 | 0.715204 |
CDAE | 0.159689 | 0.742395 | 0.674349 |
CFGAN | 0.149896 | 0.68435 | 0.630644 |
Our model | 0.171644 | 0.764024 | 0.739104 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, B.; Wang, J.; Li, M. A Method for Trust-Based Collaborative Smart Device Selection and Resource Allocation in the Financial Internet of Things. Sensors 2025, 25, 4082. https://doi.org/10.3390/s25134082
Wang B, Wang J, Li M. A Method for Trust-Based Collaborative Smart Device Selection and Resource Allocation in the Financial Internet of Things. Sensors. 2025; 25(13):4082. https://doi.org/10.3390/s25134082
Chicago/Turabian StyleWang, Bo, Jiesheng Wang, and Mingchu Li. 2025. "A Method for Trust-Based Collaborative Smart Device Selection and Resource Allocation in the Financial Internet of Things" Sensors 25, no. 13: 4082. https://doi.org/10.3390/s25134082
APA StyleWang, B., Wang, J., & Li, M. (2025). A Method for Trust-Based Collaborative Smart Device Selection and Resource Allocation in the Financial Internet of Things. Sensors, 25(13), 4082. https://doi.org/10.3390/s25134082