Skip to main content
Log in

A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT)

  • Published:
Computing Aims and scope Submit manuscript

Abstract

Recently, the Internet of things (IoT) has received a lot of attention from both industry and academia. A reliable and secure IoT connection and communication is essential for the proper working of the IoT network as a whole. One of the ways to achieve robust security in an IoT network is to enable and build trusted communication among the things (nodes). In this area, the existing IoT literature faces many critical issues, such as the lack of intelligent cluster-based trust approaches for IoT networks and the detection of attacks on the IoT trust system from malicious nodes, such as bad service providers. The existing literature either does not address these issues or only addresses them partially. Our proposed solution can firstly detect on-off attacks using the proposed fuzzy-logic based approach, and it can detect contradictory behaviour attacks and other malicious nodes. Secondly, we develop a fuzzy logic-based approach to detect malicious nodes involved in bad service provisioning. Finally, to maintain the security of the IoT network, we develop a secure messaging system that enables secure communication between nodes. This messaging system uses hexadecimal values with a structure similar to serial communication. We carried out extensive experimentation under varying network sizes to validate the working of our proposed solution and also to test the efficiency of the proposed methods in relation to various types of malicious behavior. The experiment results demonstrate the effectiveness of our approach under various conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Ahmed A, Bakar KA, Channa MI, Haseeb K, Khan AW (2015) TERP: a trust and energy aware routing protocol for wireless sensor network. IEEE Sens J 15(12):6962–6972. https://doi.org/10.1109/JSEN.2015.2468576

    Article  Google Scholar 

  2. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347–2376. https://doi.org/10.1109/COMST.2015.2444095

    Article  Google Scholar 

  3. Alshehri MD, Hussain FK (2017) A centralized trust management mechanism for the internet of things (CTM-IoT). In: International conference on broadband and wireless computing, communication and applications. Springer, Cham, pp 533–543. https://doi.org/10.1007/978-3-319-69811-3_48

  4. Alshehri MD, Hussain FK (2015) A comparative analysis of scalable and context-aware trust management approaches for internet of things. In: International conference on neural information processing, 2015. Springer, pp 596-605. https://doi.org/10.1007/978-3-319-26561-2_70

  5. Alshehri MD, Hussain FK, Hussain OK (2018) Clustering-driven intelligent trust management methodology for the internet of things (CITM-IoT). Mobile networks and applications, 1–13. https://doi.org/10.1007/s11036-018-1017-z

  6. Alsumayt A, Haggerty J, Lotfi A (2017) Using trust to detect denial of service attacks in the internet of things over MANETs. Int J Space-Based Situated Comput 7(1):43–56. https://doi.org/10.1504/IJSSC.2017.10004987

    Article  Google Scholar 

  7. Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8–27. https://doi.org/10.1016/j.jisa.2017.11.002

    Google Scholar 

  8. Arridha R, Sukaridhoto S, Pramadihanto D, Funabiki N (2017) Classification extension based on IoT-big data analytic for smart environment monitoring and analytic in real-time system. Int J Space-Based Situated Comput 7(2):82–93. https://doi.org/10.1504/IJSSC.2017.10008038

    Article  Google Scholar 

  9. Chasaki D, Mansour C (2015) Security challenges in the internet of things. Int J Space-Based Situated Comput 5(3):141–149. https://doi.org/10.1504/IJSSC.2015.070945

    Article  Google Scholar 

  10. Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) TRM-IoT: a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(4):1207–1228. https://doi.org/10.2298/CSIS110303056C

    Article  Google Scholar 

  11. Chen L, Qi X, Liu L, Zheng G (2017) A security routing protocol based on convergence degree and trust. Int J Grid Utility Comput 8(1):38–45. https://doi.org/10.1504/IJGUC.2017.10003008

    Article  Google Scholar 

  12. Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294–1312. https://doi.org/10.1109/COMST.2015.2388550

    Article  Google Scholar 

  13. Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. In: Services (SERVICES), 2015 IEEE World Congress on, 2015. IEEE, pp 21–28. https://doi.org/10.1109/SERVICES.2015.12

  14. Javanmardi S, Shojafar M, Shariatmadari S, Ahrabi SS (2014) Fr trust: a fuzzy reputation-based model for trust management in semantic p2p grids. Int J Grid Util Comput 6(1):57–66. https://doi.org/10.1504/IJGUC.2015.066397

    Article  Google Scholar 

  15. Kotis K, Athanasakis I, Vouros GA (2018) Semantically enabling IoT trust to ensure and secure deployment of IoT entities. Int J Internet Things Cyber-Assur 1(1):3–21. https://doi.org/10.1504/IJITCA.2018.090158

    Article  Google Scholar 

  16. Lee J-Y, Lin W-C, Huang Y-H (2014) A lightweight authentication protocol for internet of things. In: Next-generation electronics (ISNE), 2014 international symposium on, 2014. IEEE, pp 1–2. https://doi.org/10.1109/ISNE.2014.6839375

  17. Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142. https://doi.org/10.1109/JIOT.2017.2683200

    Article  Google Scholar 

  18. Lize G, Jingpei W, Bin S (2014) Trust management mechanism for internet of things. China Commun 11(2):148–156. https://doi.org/10.1109/CC.2014.6821746

    Article  Google Scholar 

  19. Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trustbased access control in internet of things. In: Wireless communications, vehicular technology, information theory and aerospace and electronic systems (VITAE), 2013 3rd international conference on, IEEE, pp 1–5. https://doi.org/10.1109/VITAE.2013.6617083

  20. Malina L, Hajny J, Fujdiak R, Hosek J (2016) On perspective of security and privacy-preserving solutions in the internet of things. Comput Netw 102:83–95. https://doi.org/10.1016/j.comnet.2016.03.011

    Article  Google Scholar 

  21. Mishra S (2015) Network security protocol for constrained resource devices in internet of things. In: India conference (INDICON), 2015 annual IEEE, 2015. IEEE, pp 1–6. https://doi.org/10.1109/INDICON.2015.7443737

  22. Mosenia A, Jha NK (2017) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586–602. https://doi.org/10.1109/TETC.2016.2606384

    Article  Google Scholar 

  23. Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17–31. https://doi.org/10.1016/j.adhoc.2015.01.006

    Article  Google Scholar 

  24. Ray BR, Abawajy J, Chowdhury M (2014) Scalable RFID security framework and protocol supporting internet of things. Comput Netw 67:89–103. https://doi.org/10.1016/j.comnet.2014.03.023

    Article  Google Scholar 

  25. Raza S, Duquennoy S, Höglund J, Roedig U, Voigt T (2014) Secure communication for the internet of thing: a comparison of link-layer security and IPsec for 6LoWPAN. Secur Commun Netw 7(12):2654–2668. https://doi.org/10.1002/sec.406

    Article  Google Scholar 

  26. Renubala S, Dhanalakshmi K (2014) Trust based secure routing protocol using fuzzy logic in wireless sensor networks. In: Computational intelligence and computing research (ICCIC), 2014 IEEE international conference on, 2014. IEEE, pp 1–5. https://doi.org/10.1109/ICCIC.2014.7238435

  27. Sirisala N, Bindu CS (2015) Uncertain rule based fuzzy logic QoS trust model in manets. In: Advanced computing and communications (ADCOM), 2015 international conference on, Chennai. IEEE, pp 55–60. https://doi.org/10.1109/ADCOM.2015.17

  28. Tuna G, Kogias DG, Gungor VC, Gezer C, Taşkın E, Ayday E (2017) A survey on information security threats and solutions for machine to machine (M2M) communications. J Parallel Distrib Comput 109:142–154. https://doi.org/10.1016/j.jpdc.2017.05.021

    Article  Google Scholar 

  29. Wang X, Zhou H, Su J, Wang B, Xing Q, Li P (2018) T-IP: a self-trustworthy and secure internet protocol. China Commun 15(2):1–14. https://doi.org/10.1109/CC.2018.8300267

    Article  Google Scholar 

  30. Yao X, Wang L (2017) Design and implementation of IOT gateway based on embedded \(\mu \)Tenux operating system. Int J Grid Util Comput 8(1):22–28. https://doi.org/10.1504/IJGUC.2017.10003004

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Dahman Alshehri.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alshehri, M.D., Hussain, F.K. A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT). Computing 101, 791–818 (2019). https://doi.org/10.1007/s00607-018-0685-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-018-0685-7

Keywords

Mathematics Subject Classification

Navigation