Abstract
Recently, the Internet of things (IoT) has received a lot of attention from both industry and academia. A reliable and secure IoT connection and communication is essential for the proper working of the IoT network as a whole. One of the ways to achieve robust security in an IoT network is to enable and build trusted communication among the things (nodes). In this area, the existing IoT literature faces many critical issues, such as the lack of intelligent cluster-based trust approaches for IoT networks and the detection of attacks on the IoT trust system from malicious nodes, such as bad service providers. The existing literature either does not address these issues or only addresses them partially. Our proposed solution can firstly detect on-off attacks using the proposed fuzzy-logic based approach, and it can detect contradictory behaviour attacks and other malicious nodes. Secondly, we develop a fuzzy logic-based approach to detect malicious nodes involved in bad service provisioning. Finally, to maintain the security of the IoT network, we develop a secure messaging system that enables secure communication between nodes. This messaging system uses hexadecimal values with a structure similar to serial communication. We carried out extensive experimentation under varying network sizes to validate the working of our proposed solution and also to test the efficiency of the proposed methods in relation to various types of malicious behavior. The experiment results demonstrate the effectiveness of our approach under various conditions.
Similar content being viewed by others
References
Ahmed A, Bakar KA, Channa MI, Haseeb K, Khan AW (2015) TERP: a trust and energy aware routing protocol for wireless sensor network. IEEE Sens J 15(12):6962–6972. https://doi.org/10.1109/JSEN.2015.2468576
Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347–2376. https://doi.org/10.1109/COMST.2015.2444095
Alshehri MD, Hussain FK (2017) A centralized trust management mechanism for the internet of things (CTM-IoT). In: International conference on broadband and wireless computing, communication and applications. Springer, Cham, pp 533–543. https://doi.org/10.1007/978-3-319-69811-3_48
Alshehri MD, Hussain FK (2015) A comparative analysis of scalable and context-aware trust management approaches for internet of things. In: International conference on neural information processing, 2015. Springer, pp 596-605. https://doi.org/10.1007/978-3-319-26561-2_70
Alshehri MD, Hussain FK, Hussain OK (2018) Clustering-driven intelligent trust management methodology for the internet of things (CITM-IoT). Mobile networks and applications, 1–13. https://doi.org/10.1007/s11036-018-1017-z
Alsumayt A, Haggerty J, Lotfi A (2017) Using trust to detect denial of service attacks in the internet of things over MANETs. Int J Space-Based Situated Comput 7(1):43–56. https://doi.org/10.1504/IJSSC.2017.10004987
Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8–27. https://doi.org/10.1016/j.jisa.2017.11.002
Arridha R, Sukaridhoto S, Pramadihanto D, Funabiki N (2017) Classification extension based on IoT-big data analytic for smart environment monitoring and analytic in real-time system. Int J Space-Based Situated Comput 7(2):82–93. https://doi.org/10.1504/IJSSC.2017.10008038
Chasaki D, Mansour C (2015) Security challenges in the internet of things. Int J Space-Based Situated Comput 5(3):141–149. https://doi.org/10.1504/IJSSC.2015.070945
Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) TRM-IoT: a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(4):1207–1228. https://doi.org/10.2298/CSIS110303056C
Chen L, Qi X, Liu L, Zheng G (2017) A security routing protocol based on convergence degree and trust. Int J Grid Utility Comput 8(1):38–45. https://doi.org/10.1504/IJGUC.2017.10003008
Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294–1312. https://doi.org/10.1109/COMST.2015.2388550
Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. In: Services (SERVICES), 2015 IEEE World Congress on, 2015. IEEE, pp 21–28. https://doi.org/10.1109/SERVICES.2015.12
Javanmardi S, Shojafar M, Shariatmadari S, Ahrabi SS (2014) Fr trust: a fuzzy reputation-based model for trust management in semantic p2p grids. Int J Grid Util Comput 6(1):57–66. https://doi.org/10.1504/IJGUC.2015.066397
Kotis K, Athanasakis I, Vouros GA (2018) Semantically enabling IoT trust to ensure and secure deployment of IoT entities. Int J Internet Things Cyber-Assur 1(1):3–21. https://doi.org/10.1504/IJITCA.2018.090158
Lee J-Y, Lin W-C, Huang Y-H (2014) A lightweight authentication protocol for internet of things. In: Next-generation electronics (ISNE), 2014 international symposium on, 2014. IEEE, pp 1–2. https://doi.org/10.1109/ISNE.2014.6839375
Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142. https://doi.org/10.1109/JIOT.2017.2683200
Lize G, Jingpei W, Bin S (2014) Trust management mechanism for internet of things. China Commun 11(2):148–156. https://doi.org/10.1109/CC.2014.6821746
Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trustbased access control in internet of things. In: Wireless communications, vehicular technology, information theory and aerospace and electronic systems (VITAE), 2013 3rd international conference on, IEEE, pp 1–5. https://doi.org/10.1109/VITAE.2013.6617083
Malina L, Hajny J, Fujdiak R, Hosek J (2016) On perspective of security and privacy-preserving solutions in the internet of things. Comput Netw 102:83–95. https://doi.org/10.1016/j.comnet.2016.03.011
Mishra S (2015) Network security protocol for constrained resource devices in internet of things. In: India conference (INDICON), 2015 annual IEEE, 2015. IEEE, pp 1–6. https://doi.org/10.1109/INDICON.2015.7443737
Mosenia A, Jha NK (2017) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586–602. https://doi.org/10.1109/TETC.2016.2606384
Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17–31. https://doi.org/10.1016/j.adhoc.2015.01.006
Ray BR, Abawajy J, Chowdhury M (2014) Scalable RFID security framework and protocol supporting internet of things. Comput Netw 67:89–103. https://doi.org/10.1016/j.comnet.2014.03.023
Raza S, Duquennoy S, Höglund J, Roedig U, Voigt T (2014) Secure communication for the internet of thing: a comparison of link-layer security and IPsec for 6LoWPAN. Secur Commun Netw 7(12):2654–2668. https://doi.org/10.1002/sec.406
Renubala S, Dhanalakshmi K (2014) Trust based secure routing protocol using fuzzy logic in wireless sensor networks. In: Computational intelligence and computing research (ICCIC), 2014 IEEE international conference on, 2014. IEEE, pp 1–5. https://doi.org/10.1109/ICCIC.2014.7238435
Sirisala N, Bindu CS (2015) Uncertain rule based fuzzy logic QoS trust model in manets. In: Advanced computing and communications (ADCOM), 2015 international conference on, Chennai. IEEE, pp 55–60. https://doi.org/10.1109/ADCOM.2015.17
Tuna G, Kogias DG, Gungor VC, Gezer C, Taşkın E, Ayday E (2017) A survey on information security threats and solutions for machine to machine (M2M) communications. J Parallel Distrib Comput 109:142–154. https://doi.org/10.1016/j.jpdc.2017.05.021
Wang X, Zhou H, Su J, Wang B, Xing Q, Li P (2018) T-IP: a self-trustworthy and secure internet protocol. China Commun 15(2):1–14. https://doi.org/10.1109/CC.2018.8300267
Yao X, Wang L (2017) Design and implementation of IOT gateway based on embedded \(\mu \)Tenux operating system. Int J Grid Util Comput 8(1):22–28. https://doi.org/10.1504/IJGUC.2017.10003004
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Alshehri, M.D., Hussain, F.K. A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT). Computing 101, 791–818 (2019). https://doi.org/10.1007/s00607-018-0685-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00607-018-0685-7