pp 1–28 | Cite as

A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT)

  • Mohammad Dahman AlshehriEmail author
  • Farookh Khadeer Hussain


Recently, the Internet of things (IoT) has received a lot of attention from both industry and academia. A reliable and secure IoT connection and communication is essential for the proper working of the IoT network as a whole. One of the ways to achieve robust security in an IoT network is to enable and build trusted communication among the things (nodes). In this area, the existing IoT literature faces many critical issues, such as the lack of intelligent cluster-based trust approaches for IoT networks and the detection of attacks on the IoT trust system from malicious nodes, such as bad service providers. The existing literature either does not address these issues or only addresses them partially. Our proposed solution can firstly detect on-off attacks using the proposed fuzzy-logic based approach, and it can detect contradictory behaviour attacks and other malicious nodes. Secondly, we develop a fuzzy logic-based approach to detect malicious nodes involved in bad service provisioning. Finally, to maintain the security of the IoT network, we develop a secure messaging system that enables secure communication between nodes. This messaging system uses hexadecimal values with a structure similar to serial communication. We carried out extensive experimentation under varying network sizes to validate the working of our proposed solution and also to test the efficiency of the proposed methods in relation to various types of malicious behavior. The experiment results demonstrate the effectiveness of our approach under various conditions.


Internet of things (IoT) Trust management Cyber security Protocol Fuzzy logic 

Mathematics Subject Classification

68 Computer Science 


  1. 1.
    Ahmed A, Bakar KA, Channa MI, Haseeb K, Khan AW (2015) TERP: a trust and energy aware routing protocol for wireless sensor network. IEEE Sens J 15(12):6962–6972. CrossRefGoogle Scholar
  2. 2.
    Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347–2376. CrossRefGoogle Scholar
  3. 3.
    Alshehri MD, Hussain FK (2017) A centralized trust management mechanism for the internet of things (CTM-IoT). In: International conference on broadband and wireless computing, communication and applications. Springer, Cham, pp 533–543.
  4. 4.
    Alshehri MD, Hussain FK (2015) A comparative analysis of scalable and context-aware trust management approaches for internet of things. In: International conference on neural information processing, 2015. Springer, pp 596-605.
  5. 5.
    Alshehri MD, Hussain FK, Hussain OK (2018) Clustering-driven intelligent trust management methodology for the internet of things (CITM-IoT). Mobile networks and applications, 1–13.
  6. 6.
    Alsumayt A, Haggerty J, Lotfi A (2017) Using trust to detect denial of service attacks in the internet of things over MANETs. Int J Space-Based Situated Comput 7(1):43–56. CrossRefGoogle Scholar
  7. 7.
    Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8–27. CrossRefGoogle Scholar
  8. 8.
    Arridha R, Sukaridhoto S, Pramadihanto D, Funabiki N (2017) Classification extension based on IoT-big data analytic for smart environment monitoring and analytic in real-time system. Int J Space-Based Situated Comput 7(2):82–93. CrossRefGoogle Scholar
  9. 9.
    Chasaki D, Mansour C (2015) Security challenges in the internet of things. Int J Space-Based Situated Comput 5(3):141–149. CrossRefGoogle Scholar
  10. 10.
    Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) TRM-IoT: a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(4):1207–1228. CrossRefGoogle Scholar
  11. 11.
    Chen L, Qi X, Liu L, Zheng G (2017) A security routing protocol based on convergence degree and trust. Int J Grid Utility Comput 8(1):38–45. CrossRefGoogle Scholar
  12. 12.
    Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294–1312. CrossRefGoogle Scholar
  13. 13.
    Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. In: Services (SERVICES), 2015 IEEE World Congress on, 2015. IEEE, pp 21–28.
  14. 14.
    Javanmardi S, Shojafar M, Shariatmadari S, Ahrabi SS (2014) Fr trust: a fuzzy reputation-based model for trust management in semantic p2p grids. Int J Grid Util Comput 6(1):57–66. CrossRefGoogle Scholar
  15. 15.
    Kotis K, Athanasakis I, Vouros GA (2018) Semantically enabling IoT trust to ensure and secure deployment of IoT entities. Int J Internet Things Cyber-Assur 1(1):3–21. CrossRefGoogle Scholar
  16. 16.
    Lee J-Y, Lin W-C, Huang Y-H (2014) A lightweight authentication protocol for internet of things. In: Next-generation electronics (ISNE), 2014 international symposium on, 2014. IEEE, pp 1–2.
  17. 17.
    Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142. CrossRefGoogle Scholar
  18. 18.
    Lize G, Jingpei W, Bin S (2014) Trust management mechanism for internet of things. China Commun 11(2):148–156. CrossRefGoogle Scholar
  19. 19.
    Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trustbased access control in internet of things. In: Wireless communications, vehicular technology, information theory and aerospace and electronic systems (VITAE), 2013 3rd international conference on, IEEE, pp 1–5.
  20. 20.
    Malina L, Hajny J, Fujdiak R, Hosek J (2016) On perspective of security and privacy-preserving solutions in the internet of things. Comput Netw 102:83–95. CrossRefGoogle Scholar
  21. 21.
    Mishra S (2015) Network security protocol for constrained resource devices in internet of things. In: India conference (INDICON), 2015 annual IEEE, 2015. IEEE, pp 1–6.
  22. 22.
    Mosenia A, Jha NK (2017) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586–602. CrossRefGoogle Scholar
  23. 23.
    Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17–31. CrossRefGoogle Scholar
  24. 24.
    Ray BR, Abawajy J, Chowdhury M (2014) Scalable RFID security framework and protocol supporting internet of things. Comput Netw 67:89–103. CrossRefGoogle Scholar
  25. 25.
    Raza S, Duquennoy S, Höglund J, Roedig U, Voigt T (2014) Secure communication for the internet of thing: a comparison of link-layer security and IPsec for 6LoWPAN. Secur Commun Netw 7(12):2654–2668. CrossRefGoogle Scholar
  26. 26.
    Renubala S, Dhanalakshmi K (2014) Trust based secure routing protocol using fuzzy logic in wireless sensor networks. In: Computational intelligence and computing research (ICCIC), 2014 IEEE international conference on, 2014. IEEE, pp 1–5.
  27. 27.
    Sirisala N, Bindu CS (2015) Uncertain rule based fuzzy logic QoS trust model in manets. In: Advanced computing and communications (ADCOM), 2015 international conference on, Chennai. IEEE, pp 55–60.
  28. 28.
    Tuna G, Kogias DG, Gungor VC, Gezer C, Taşkın E, Ayday E (2017) A survey on information security threats and solutions for machine to machine (M2M) communications. J Parallel Distrib Comput 109:142–154. CrossRefGoogle Scholar
  29. 29.
    Wang X, Zhou H, Su J, Wang B, Xing Q, Li P (2018) T-IP: a self-trustworthy and secure internet protocol. China Commun 15(2):1–14. CrossRefGoogle Scholar
  30. 30.
    Yao X, Wang L (2017) Design and implementation of IOT gateway based on embedded \(\mu \)Tenux operating system. Int J Grid Util Comput 8(1):22–28. CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Austria, ein Teil von Springer Nature 2018

Authors and Affiliations

  1. 1.Centre for Artificial Intelligence, School of Software, Faculty of Engineering and Information TechnologyUniversity of Technology SydneyUltimoAustralia
  2. 2.Computer Science Department, Computers and Information Technology CollegeTaif UniversityTaifKingdom of Saudi Arabia

Personalised recommendations