Mobile Networks and Applications

, Volume 23, Issue 3, pp 419–431 | Cite as

Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT)

  • Mohammad Dahman AlshehriEmail author
  • Farookh Khadeer Hussain
  • Omar Khadeer Hussain


The growth and adoption of the Internet of Things (IoT) is increasing day by day. The large number of IoT devices increases the risk of security threats such as (but not limited to) viruses or cyber-attacks. One possible approach to achieve IoT security is to enable a trustworthy IoT environment in IoT wherein the interactions are based on the trust value of the communicating nodes. Trust management and trust assessment has been extensively studied in distributed networks in general and the IoT in particular, but there are still outstanding pressing issues such as bad-mouthing of trust values which prevent them from being used in practical IoT applications. Furthermore, there is no research in ensuring that the developed IoT trust solutions are scalable across billions of IoT nodes. To address the above-mentioned issues, we propose a methodology for scalable trust management solution in the IoT. The methodology addresses practical and pressing issues related to IoT trust management such as trust-based IoT clustering, intelligent methods for countering bad-mouthing attacks on trust systems, issues of memory-efficient trust computation and trust-based migration of IoT nodes from one cluster to another. Experimental results demonstrate the effectiveness of the proposed approaches.


Internet of things (IoT) Trust management IoT scalability Clustering Bad-mouthing attacks 


  1. 1.
    Alshehri MD, Hussain FK (2015) A comparative analysis of scalable and context-aware trust management approaches for internet of things. In: International conference on neural information processing. Springer, Berlin, pp 596–605Google Scholar
  2. 2.
    Bao F, Chen R, Guo J (2013) Scalable, adaptive and survivable trust management for community of interest based internet of things systems. In: 2013 IEEE 11th international symposium on autonomous decentralized systems (ISADS). IEEE, pp 1–7Google Scholar
  3. 3.
    Bellavista P, Zanni A (2016) Towards better scalability for IoT-cloud interactions via combined exploitation of MQTT and CoAP. In: 2016 IEEE 2nd international forum on research and technologies for society and industry leveraging a better tomorrow (RTSI). IEEE, pp 1–6Google Scholar
  4. 4.
    Gharbieh M, ElSawy H, Bader A, Alouini M-S (2017) Spatiotemporal stochastic modeling of IoT enabled cellular networks: Scalability and stability analysis. IEEE Transactions on CommunicationsGoogle Scholar
  5. 5.
    Chen R, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9(3):482–495CrossRefGoogle Scholar
  6. 6.
    Han S, NDN-Based Woo H (2016) Pub/sub system for scalable IoT cloud. In: Cloud computing technology and science (CloudCom). IEEEGoogle Scholar
  7. 7.
    Jabeur N, Yasar AU-H, Shakshuki E, Haddad H (2017) Toward a bio-inspired adaptive spatial clustering approach for IoT applications. Future Generation Computer SystemsGoogle Scholar
  8. 8.
    Jiang H, Shen F, Chen S, Li K-C, Jeong Y-S (2015) A secure and scalable storage system for aggregate data in IoT. Futur Gener Comput Syst 49:133–141CrossRefGoogle Scholar
  9. 9.
    Khan ZA, Herrmann PA (2017) Trust based distributed intrusion detection mechanism for internet of things. In: 2017 IEEE 31st international conference on advanced information networking and applications (AINA). IEEE, pp 1169–1176Google Scholar
  10. 10.
    Kokoris-Kogias E, Voutyras O, Varvarigou T (2016) TRM-SIoT: A scalable hybrid trust & reputation model for the social internet of things. In: 2016 IEEE 21st international conference on emerging technologies and factory automation (ETFA). IEEE, pp 1–9Google Scholar
  11. 11.
    Li F, Vögler M, Claeßens M, Dustdar S (2013) Efficient and scalable IoT service delivery on cloud. In: 2013 IEEE 6th international conference on cloud computing (CLOUD). IEEE, pp 740– 747Google Scholar
  12. 12.
    Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134CrossRefGoogle Scholar
  13. 13.
    Ahmed A, Bakar KA, Channa MI, Khan AW (2016) A secure routing protocol with trust and energy awareness for wireless sensor network. Mobile Netw Appl 21(2):272–285CrossRefGoogle Scholar
  14. 14.
    Ma T, Liu Y, Zhang Z-J (2015) An energy-efficient reliable trust-based data aggregation protocol for wireless sensor networks. Int J Control Autom 8(3):305–318CrossRefGoogle Scholar
  15. 15.
    Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164CrossRefGoogle Scholar
  16. 16.
    Varghese R, Chithralekha T, Kharkongor C (2016) Self-organized cluster based energy efficient meta trust model for internet of things. In: 2016 IEEE international conference on engineering and technology (ICETECH). IEEE, pp 382–389Google Scholar
  17. 17.
    Tayeb S, Latifi S, Kim Y (2017) A survey on IoT communication and computation frameworks: An industrial perspective. In: 2017 IEEE 7th annual computing and communication workshop and conference (CCWC). IEEE, pp 1–6Google Scholar
  18. 18.
    Williams R, McMahon E, Samtani S, Patton M, Chen H (2017) Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach. In: 2017 IEEE international conference on intelligence and security informatics (ISI). IEEE, pp 179–181Google Scholar
  19. 19.
    Vögler M, Schleicher JM, Inzinger C, Dustdar S (2016) A scalable framework for provisioning large-scale IoT deployments. ACM Trans Internet Technol 16(2):11CrossRefGoogle Scholar
  20. 20.
    Wolf T, Nagurney A (2016) A layered protocol architecture for scalable innovation and identification of network economic synergies in the internet of things. In: 2016 IEEE 1st international conference on internet-of-things design and implementation (IoTDI). IEEE, pp 141–151Google Scholar
  21. 21.
    Yu Y, Jia Z, Tao W, Xue B, Lee C (2017) An efficient trust evaluation scheme for node behavior detection in the internet of things. Wirel Pers Commun 93(2):571–587CrossRefGoogle Scholar
  22. 22.
    Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ (2017) IoT middleware: A survey on issues and enabling technologies. IEEE Internet Things J 4(1):1–20CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Centre for Artificial Intelligence, School of Software, Faculty of Engineering and Information TechnologyUniversity of Technology SydneySydneyAustralia
  2. 2.Computer Science Department, Computers and Information Technology CollegeTaif UniversityTaifSaudi Arabia
  3. 3.School of BusinessAustralian Defence Force Academy University of New South Wales CanberraCanberraAustralia

Personalised recommendations