, 43:136 | Cite as

Dynamic trust management for secure communications in social internet of things (SIoT)

  • A Meena KowshalyaEmail author
  • M L Valarmathi


The world has faced three Information and Communication Technology (ICT) revolutions and the third ICT wave led to Internet of Things, the notion of anything, everything, anytime and everywhere. Out of the many visions of IoT, one revolutionary concept is to make IoT sociable i.e., incorporating social networking within Internet of Things. This revolution has led to the notion of Social Internet of Things (SIoT). Establishing a SIoT network or community is not so simple and requires integration of heterogeneous technology and communication solutions. This paper focuses on establishing a secure and reliable communication over nodes in SIoT by computing trust dynamically among neighboring nodes. Trust Management is an important area that has attracted numerous researchers over the past few years. The proposed DTrustInfer computes trust based on first hand observation, second hand observation, centrality and dependability factor of a node. Properties of trust such as honesty, cooperativeness, community interest and energy of a node are considered for computing trust. Also, this paper ensures secure communication among SIoT nodes through simple secret codes. Experimental results show that the proposed DTrustInfer outperforms the existing trust models significantly.


Internet of Things (IoT) Social Networks (SN) Social Internet of Things (SIoT) trust secret codes 


  1. 1.
    Bao F and Chen I-R 2012 Dynamic trust management for the internet of things applications. In: International Workshop on Self Aware IoT, pp. 1–6Google Scholar
  2. 2.
    Chen D, Chang G, Sun D, Li J, Jia J and Wang X 2011 TRM-IoT: a trust management model based on fuzzy reputation for internet of things. Comput. Sci. Inf. Syst. 8(4): 1207–1228CrossRefGoogle Scholar
  3. 3.
    Valarmathi M L, Kowshalya M and Aarthi M 2015 Research challenges in the social internet of things (SIoT) – a survey. In: Proceedings of National Conference on Science Research and Information Technology, pp. 128–133Google Scholar
  4. 4.
    Sherchan W, Nepal S and Paris C 2013 A survey of trust in social networks. ACM Comput. Surv. 45(4): 1–33CrossRefGoogle Scholar
  5. 5.
    Meena Kowshalya A and Valarmathi M L 2017 Trust management in the social internet of things. Wirel. Pers. Commun. 96(2): 2681–2691CrossRefGoogle Scholar
  6. 6.
    Meena Kowshalya A and Valarmathi M L 2017 Trust management for reliable decision making among social objects in the social internet of things. IET Netw. 69(4):75–80CrossRefGoogle Scholar
  7. 7.
    Xong L and Liu L 2004 PeerTrust: supporting reputation based trust for peer to peer electronic communities. IEEE Trans. Knowl. Data Eng. 16(7): 843–857CrossRefGoogle Scholar
  8. 8.
    Despotovic Z and Aberer K 2004 Maximum likelihood estimation of peers performance in P2P Networks. In: Second Workshop on the Economics of Peer-to Peer Systems Google Scholar
  9. 9.
    Bao F, Chen R, Chang M J and Cho J-H 2012 Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2): 169–183CrossRefGoogle Scholar
  10. 10.
    Nitti M, Girau R and Atzori L 2014 Trustworthiness management in the social internet of things. IEEE Trans. Knowl. Data Manag. 26(5): 1–11Google Scholar
  11. 11.
    Zhou R and Hwang K 2008 Gossip-based reputation aggregation for unstructured peer to peer networks. IEEE Trans. Knowl. Data Manag. 20(9): 1282–1295CrossRefGoogle Scholar
  12. 12.
    Yu B, Singh M and Sycara K 2004 Developing trust in large scale peer to peer systems. In: Proceedings of First IEEE Symposium on Multi-Agent Security and Survivability (MASS), pp. 1–10Google Scholar
  13. 13.
    Sherwood R, Lee S and Bhattacharjee B 2006 Cooperative peer groups in NICE. Comput. Netw. 50(4): 523–544CrossRefzbMATHGoogle Scholar
  14. 14.
    Wang Y and Vassileva J 2005 Bayesian network-based trust model in peer to peer networks. In: Agents and Peer-to-Peer Computing Lecture Notes in Computer Science, pp. 23–34Google Scholar
  15. 15.
    Saied Y B, Olivereau A, Zeghlache D and Laurent M 2013 Trust management system design for the internet of things: a context-aware and multi-service approach. Comput. Secur. 39(B): 351–365CrossRefGoogle Scholar
  16. 16.
    Mahalle P N, Thakre P A, Prasad N R and Prasad R 2013 A fuzzy approach to trust based access control in internet of things. In: 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Google Scholar
  17. 17.
    DuBois T, Golbeck J and Srinivasan A 2011 Predicting trust and distrust in social networks, privacy, security, risk and trust (PASSAT). In: Third International Conference on Social Computing (SocialCom), pp. 418–424Google Scholar
  18. 18.
    Wang J P, Bin S, Yu Y and Niu X 2013 Distributed trust management mechanism for the internet of things. Appl. Mech. Mater. 2463–2467Google Scholar
  19. 19.
    Bao F, Chen R and Guo J 2013 Scalable, adaptive and survivable trust management for community of interest based internet of things systems. In: Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), pp. 1–7Google Scholar
  20. 20.
    Bachi G, Coscia M, Monreale A and Giannotti F 2012 Classifying trust/distrust relationships in online social networks, privacy, security, risk and trust (PASSAT). In: International Conference on Social Computing (SocialCom), pp. 552–557Google Scholar
  21. 21.
    Atzori L, Iera A and Morabito G 2010 The internet of things: a survey. Comput. Netw. 54(15): 2787–2805CrossRefzbMATHGoogle Scholar
  22. 22.
    Atzori L, Iera A and Morabito G 2011 SIoT: giving a social structure to the internet of things. IEEE Commun. Lett. 15(11): 1193–1195CrossRefGoogle Scholar
  23. 23.
    Atzori L, Iera A, Morabito G and Nitti M 2012 The social internet of things (SIoT): when social networks meet the internet of things: concepts, architecture and network characterization. Comput. Netw. 56(14): 3594–3608CrossRefGoogle Scholar
  24. 24.
    Yu H 2011 Sybil defenses via social networks: a tutorial and survey. Proc. ACM SIGACT 42(3): 80–101CrossRefGoogle Scholar
  25. 25.
    Yu H, Kaminsky M, Gibbons P and Flaxman A 2008 SybilGuard: defending against sybil attack via social networks. IEEE Trans. Netw. 16(3): 576–589CrossRefGoogle Scholar

Copyright information

© Indian Academy of Sciences 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringGovernment College of TechnologyCoimbatoreIndia
  2. 2.Department of Electrical and Electronics EngineeringAlagappa Chettiar Government College of Engineering and TechnologyKaraikudiIndia

Personalised recommendations