Advertisement

Computing

pp 1–28 | Cite as

A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT)

  • Mohammad Dahman AlshehriEmail author
  • Farookh Khadeer Hussain
Article

Abstract

Recently, the Internet of things (IoT) has received a lot of attention from both industry and academia. A reliable and secure IoT connection and communication is essential for the proper working of the IoT network as a whole. One of the ways to achieve robust security in an IoT network is to enable and build trusted communication among the things (nodes). In this area, the existing IoT literature faces many critical issues, such as the lack of intelligent cluster-based trust approaches for IoT networks and the detection of attacks on the IoT trust system from malicious nodes, such as bad service providers. The existing literature either does not address these issues or only addresses them partially. Our proposed solution can firstly detect on-off attacks using the proposed fuzzy-logic based approach, and it can detect contradictory behaviour attacks and other malicious nodes. Secondly, we develop a fuzzy logic-based approach to detect malicious nodes involved in bad service provisioning. Finally, to maintain the security of the IoT network, we develop a secure messaging system that enables secure communication between nodes. This messaging system uses hexadecimal values with a structure similar to serial communication. We carried out extensive experimentation under varying network sizes to validate the working of our proposed solution and also to test the efficiency of the proposed methods in relation to various types of malicious behavior. The experiment results demonstrate the effectiveness of our approach under various conditions.

Keywords

Internet of things (IoT) Trust management Cyber security Protocol Fuzzy logic 

Mathematics Subject Classification

68 Computer Science 

References

  1. 1.
    Ahmed A, Bakar KA, Channa MI, Haseeb K, Khan AW (2015) TERP: a trust and energy aware routing protocol for wireless sensor network. IEEE Sens J 15(12):6962–6972.  https://doi.org/10.1109/JSEN.2015.2468576 CrossRefGoogle Scholar
  2. 2.
    Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347–2376.  https://doi.org/10.1109/COMST.2015.2444095 CrossRefGoogle Scholar
  3. 3.
    Alshehri MD, Hussain FK (2017) A centralized trust management mechanism for the internet of things (CTM-IoT). In: International conference on broadband and wireless computing, communication and applications. Springer, Cham, pp 533–543.  https://doi.org/10.1007/978-3-319-69811-3_48
  4. 4.
    Alshehri MD, Hussain FK (2015) A comparative analysis of scalable and context-aware trust management approaches for internet of things. In: International conference on neural information processing, 2015. Springer, pp 596-605.  https://doi.org/10.1007/978-3-319-26561-2_70
  5. 5.
    Alshehri MD, Hussain FK, Hussain OK (2018) Clustering-driven intelligent trust management methodology for the internet of things (CITM-IoT). Mobile networks and applications, 1–13.  https://doi.org/10.1007/s11036-018-1017-z
  6. 6.
    Alsumayt A, Haggerty J, Lotfi A (2017) Using trust to detect denial of service attacks in the internet of things over MANETs. Int J Space-Based Situated Comput 7(1):43–56.  https://doi.org/10.1504/IJSSC.2017.10004987 CrossRefGoogle Scholar
  7. 7.
    Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8–27.  https://doi.org/10.1016/j.jisa.2017.11.002 CrossRefGoogle Scholar
  8. 8.
    Arridha R, Sukaridhoto S, Pramadihanto D, Funabiki N (2017) Classification extension based on IoT-big data analytic for smart environment monitoring and analytic in real-time system. Int J Space-Based Situated Comput 7(2):82–93.  https://doi.org/10.1504/IJSSC.2017.10008038 CrossRefGoogle Scholar
  9. 9.
    Chasaki D, Mansour C (2015) Security challenges in the internet of things. Int J Space-Based Situated Comput 5(3):141–149.  https://doi.org/10.1504/IJSSC.2015.070945 CrossRefGoogle Scholar
  10. 10.
    Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) TRM-IoT: a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(4):1207–1228.  https://doi.org/10.2298/CSIS110303056C CrossRefGoogle Scholar
  11. 11.
    Chen L, Qi X, Liu L, Zheng G (2017) A security routing protocol based on convergence degree and trust. Int J Grid Utility Comput 8(1):38–45.  https://doi.org/10.1504/IJGUC.2017.10003008 CrossRefGoogle Scholar
  12. 12.
    Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294–1312.  https://doi.org/10.1109/COMST.2015.2388550 CrossRefGoogle Scholar
  13. 13.
    Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. In: Services (SERVICES), 2015 IEEE World Congress on, 2015. IEEE, pp 21–28.  https://doi.org/10.1109/SERVICES.2015.12
  14. 14.
    Javanmardi S, Shojafar M, Shariatmadari S, Ahrabi SS (2014) Fr trust: a fuzzy reputation-based model for trust management in semantic p2p grids. Int J Grid Util Comput 6(1):57–66.  https://doi.org/10.1504/IJGUC.2015.066397 CrossRefGoogle Scholar
  15. 15.
    Kotis K, Athanasakis I, Vouros GA (2018) Semantically enabling IoT trust to ensure and secure deployment of IoT entities. Int J Internet Things Cyber-Assur 1(1):3–21.  https://doi.org/10.1504/IJITCA.2018.090158 CrossRefGoogle Scholar
  16. 16.
    Lee J-Y, Lin W-C, Huang Y-H (2014) A lightweight authentication protocol for internet of things. In: Next-generation electronics (ISNE), 2014 international symposium on, 2014. IEEE, pp 1–2.  https://doi.org/10.1109/ISNE.2014.6839375
  17. 17.
    Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142.  https://doi.org/10.1109/JIOT.2017.2683200 CrossRefGoogle Scholar
  18. 18.
    Lize G, Jingpei W, Bin S (2014) Trust management mechanism for internet of things. China Commun 11(2):148–156.  https://doi.org/10.1109/CC.2014.6821746 CrossRefGoogle Scholar
  19. 19.
    Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trustbased access control in internet of things. In: Wireless communications, vehicular technology, information theory and aerospace and electronic systems (VITAE), 2013 3rd international conference on, IEEE, pp 1–5.  https://doi.org/10.1109/VITAE.2013.6617083
  20. 20.
    Malina L, Hajny J, Fujdiak R, Hosek J (2016) On perspective of security and privacy-preserving solutions in the internet of things. Comput Netw 102:83–95.  https://doi.org/10.1016/j.comnet.2016.03.011 CrossRefGoogle Scholar
  21. 21.
    Mishra S (2015) Network security protocol for constrained resource devices in internet of things. In: India conference (INDICON), 2015 annual IEEE, 2015. IEEE, pp 1–6.  https://doi.org/10.1109/INDICON.2015.7443737
  22. 22.
    Mosenia A, Jha NK (2017) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586–602.  https://doi.org/10.1109/TETC.2016.2606384 CrossRefGoogle Scholar
  23. 23.
    Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17–31.  https://doi.org/10.1016/j.adhoc.2015.01.006 CrossRefGoogle Scholar
  24. 24.
    Ray BR, Abawajy J, Chowdhury M (2014) Scalable RFID security framework and protocol supporting internet of things. Comput Netw 67:89–103.  https://doi.org/10.1016/j.comnet.2014.03.023 CrossRefGoogle Scholar
  25. 25.
    Raza S, Duquennoy S, Höglund J, Roedig U, Voigt T (2014) Secure communication for the internet of thing: a comparison of link-layer security and IPsec for 6LoWPAN. Secur Commun Netw 7(12):2654–2668.  https://doi.org/10.1002/sec.406 CrossRefGoogle Scholar
  26. 26.
    Renubala S, Dhanalakshmi K (2014) Trust based secure routing protocol using fuzzy logic in wireless sensor networks. In: Computational intelligence and computing research (ICCIC), 2014 IEEE international conference on, 2014. IEEE, pp 1–5.  https://doi.org/10.1109/ICCIC.2014.7238435
  27. 27.
    Sirisala N, Bindu CS (2015) Uncertain rule based fuzzy logic QoS trust model in manets. In: Advanced computing and communications (ADCOM), 2015 international conference on, Chennai. IEEE, pp 55–60.  https://doi.org/10.1109/ADCOM.2015.17
  28. 28.
    Tuna G, Kogias DG, Gungor VC, Gezer C, Taşkın E, Ayday E (2017) A survey on information security threats and solutions for machine to machine (M2M) communications. J Parallel Distrib Comput 109:142–154.  https://doi.org/10.1016/j.jpdc.2017.05.021 CrossRefGoogle Scholar
  29. 29.
    Wang X, Zhou H, Su J, Wang B, Xing Q, Li P (2018) T-IP: a self-trustworthy and secure internet protocol. China Commun 15(2):1–14.  https://doi.org/10.1109/CC.2018.8300267 CrossRefGoogle Scholar
  30. 30.
    Yao X, Wang L (2017) Design and implementation of IOT gateway based on embedded \(\mu \)Tenux operating system. Int J Grid Util Comput 8(1):22–28.  https://doi.org/10.1504/IJGUC.2017.10003004 CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Austria, ein Teil von Springer Nature 2018

Authors and Affiliations

  1. 1.Centre for Artificial Intelligence, School of Software, Faculty of Engineering and Information TechnologyUniversity of Technology SydneyUltimoAustralia
  2. 2.Computer Science Department, Computers and Information Technology CollegeTaif UniversityTaifKingdom of Saudi Arabia

Personalised recommendations