Skip to main content
Log in

Context-awareness trust management model for trustworthy communications in the social Internet of Things

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

The social Internet of Things (SIoT) is the next generation of the Internet of Things network. It entails the evolution of intelligent devices into social ones, aiming at building interactions with people in order to link groups and develop their own social context. Because a high volume of data is shared throughout the network’s diverse nodes, security measures are essential to ensure that users may interact safely. Trust management (TM) models have been presented in the literature to avoid detrimental interactions and preserve a system’s optimal functioning. In reality, given the SIoT context of nodes varies over time, a TM mechanism must contain methods for evaluating the level of trustworthiness. Existing methods, on the other hand, continue to lack effective solutions for addressing contextual SIoT attributes that define the network node while assessing trust. The utmost objective of this paper is to perform an in-depth analysis of contextual trust-awareness based on the defined TM model “CTM-SIoT” in order to more precisely detect malicious SIoT nodes to maintain safe network connections. As part of our trust evaluation process, machine learning techniques are employed to study the behavior of nodes. Our objective is to limit contacts with aggressive and unskilled service providers. Experimentation was carried out using the Cooja simulator on a simulated SIoT dataset based on real social data. With an F-measure value of up to 1, we validated the Artificial Neural Network’s suitability as a classifier for our issue statement. When compared to other conventional trust classification methods, the findings demonstrated that handling contextual SIoT characteristics inside our TM model enhanced the performance of a TM mechanism with a 0.037% rise in F-measure and a 0.13% drop in FPR, in identifying malicious nodes even for a system with 50% of malicious transactions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Notes

  1. https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/.

  2. http://crawdad.org/thlab/sigcomm2009/20120715/.

  3. https://networksimulationtools.com/cooja-simulator-for-iot-download/.

  4. https://www.python.org/.

References

  1. Mendez DM, Papapanagiotou I, Yang B (2018) Internet of things: survey on security and privacy. Inf Secur J Global Perspect 27(3)

  2. Conti M, Dehghantanha A, Franke K, Watson S (2018) Internet of things security and forensics: challenges and opportunities, vol 78, pp 544-546. Elsevier

  3. Airehrour D, Gutierrez JA, Ray SK (2019) Sectrust-rpl: a secure trust-aware rpl routing protocol for internet of things. Futur Gener Comput Syst 93:860–876

    Article  Google Scholar 

  4. Wu X, Liu C, Wang L, Bilal M (2021) Internet of things-enabled real-time health monitoring system using deep learning. Neural computing and applications. Springer, Berlin, pp 1–12

    Google Scholar 

  5. Nitti M, Girau R, Atzori L, Iera A, Morabito G (2012) A subjective model for trustworthiness evaluation in the social internet of things. In: 2012 IEEE 23rd international symposium on personal, indoor and mobile radio communications-(PIMRC), pp 18–23. IEEE

  6. Sharma V, You I, Jayakody DNK, Atiquzzaman M (2019) Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social internet of things. Futur Gener Comput Syst 92:758–776

    Article  Google Scholar 

  7. Jafarian B, Yazdani N, Haghighi MS (2020) Discrimination-aware trust management for social internet of things. Comput Netw 178:107254

    Article  Google Scholar 

  8. Holzinger A, Weippl E, Tjoa AM, Kieseberg P (2021) Digital transformation for sustainable development goals (sdgs)-a security, safety and privacy perspective on ai. In: International cross-domain conference for machine learning and knowledge extraction, pp 1–20. Springer

  9. Abawajy J, Wang G, Yang LT, Javadi B (2016) Trust, security and privacy in emerging distributed systems fgcs. Futur Gener Comput Syst 55:224–226

    Article  Google Scholar 

  10. Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for internet of things. Futur Gener Comput Syst 82:761–768

    Article  Google Scholar 

  11. Zahra SR, Chishti MA (2022) A generic and lightweight security mechanism for detecting malicious behavior in the uncertain internet of things using fuzzy logic-and fog-based approach. Neural Comput Appl 34:6927–6952

    Article  Google Scholar 

  12. Abdelghani W, Zayani CA, Amous I, Sedes F (2016) Trust management in social internet of things: a survey. In: Conference on e-Business, e-Services and e-Society, vol 9844, pp 430–441. Springer

  13. Siddiqui SA, Mahmood A, Sheng QZ, Suzuki H, Ni W (2021) A survey of trust management in the internet of vehicles. Electronics 10(18):2223

    Article  Google Scholar 

  14. Jayasinghe U, Truong NB, Lee GM, Um T (2016) Rpr: A trust computation model for social internet of things. In: 2016 Intl IEEE conferences on ubiquitous intelligence and computing, advanced and trusted computing, scalable computing and communications, cloud and big data computing, internet of people, and smart world congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), pp 930–937. IEEE

  15. Magdich R, Jemal H, Nakti C, Ayed MB (2021) An efficient trust related attack detection model based on machine learning for social internet of things. In: 2021 International wireless communications and mobile computing (IWCMC), Harbin City, China, pp 1465–1470. IEEE

  16. Alemneh E, Senouci SM, Brunet P, Tegegne T (2020) A two-way trust management system for fog computing. Futur Gener Comput Syst 106:206–220

    Article  Google Scholar 

  17. Fortino G, Fotia L, Messina F, Rosaci D, Sarne GM (2020) A meritocratic trust-based group formation in an iot environment for smart cities. Futur Gener Comput Syst 108:34–45

    Article  Google Scholar 

  18. Meng X, Zhang G (2020) Truetrust: a feedback-based trust management model without filtering feedbacks in p2p networks. Peer-to-Peer Network Appl 13(1):175–189

    Article  MathSciNet  Google Scholar 

  19. Panigrahi L, Jena D (2021) Genetic algorithm and probability-based leach variant trust management model for wsns. In: Intelligent and cloud computing vol 194, pp 681–690. Springer

  20. Rathee G, Sharma A, Kumar R, Ahmad F, Iqbal R (2020) A trust management scheme to secure mobile information centric networks. Comput Commun 151:66–75

    Article  Google Scholar 

  21. Yang S, Wang X, Zhang S, Yi B, Huang M (2020) Trust-based security routing mechanism in mobile social networks. Neural Comput Appl 32(10):5609–5620

    Article  Google Scholar 

  22. Holzinger A (2021) The next frontier: Ai we can really trust. In: Joint European conference on machine learning and knowledge discovery in databases, pp 427–440. Springer

  23. Guo J, Chen R, Tsai JJ (2017) A survey of trust computation models for service management in internet of things systems. Comput Commun 97:1–14

    Article  Google Scholar 

  24. Truong NB, Um TW, Zhou B, Lee GM (2017) From personal experience to global reputation for trust evaluation in the social internet of things. In: GLOBECOM 2017-2017 IEEE global communications conference, pp 1–7. IEEE

  25. Abdelghani W, Zayani CA, Amous I, Sedes F (2018) Trust evaluation model for attack detection in social internet of things. In: International conference on risks and security of internet and systems, pp 48–64. Springer

  26. Magdich R, Jemal H, Ayed MB (2019) Trust management model based on mutual evaluation method for the social internet of things. In: European, mediterranean, and middle eastern conference on information systems, pp 361–375. Springer

  27. Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26(5):1253–1266

    Article  Google Scholar 

  28. Chen Z, Ling R, Huang CM, Zhu X (2016) A scheme of access service recommendation for the social internet of things. Int J Commun Syst 29(4):694–706

    Article  Google Scholar 

  29. Chen R, Bao F, Guo J (2015) Trust-based service management for social internet of things systems. IEEE Trans Depend Secure Comput 13(6):684–696

    Article  Google Scholar 

  30. Jayasinghe U, Lee GM, Um T, Shi Q (2018) Machine learning based trust computational model for iot services. IEEE Trans Sustain Comput 4(1):39–52

    Article  Google Scholar 

  31. Saied YB, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the internet of things: a context-aware and multi-service approach. Comput Secur 39:351–365

    Article  Google Scholar 

  32. Huber B, Kandah F (2020) Behavioral model based trust management design for iot at scale. In: 2020 international conferences on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), pp 9–17. IEEE

  33. Hellaoui H, Bouabdallah A, Koudil M (2016) Tas-iot: trust-based adaptive security in the iot. In: 2016 IEEE 41st conference on local computer networks (LCN), pp 599–602. IEEE

  34. Truong NB, Um T, Lee GM (2016) A reputation and knowledge based trust service platform for trustworthy social internet of things. Innovations in clouds, internet and networks (ICIN), Paris, France, 104–111

  35. Amiri-Zarandi M, Dara RA (2020) Blockchain-based trust management in social internet of things. In: 2020 IEEE Intl Conf on dependable, autonomic and secure computing, Intl Conf on pervasive intelligence and computing, Intl Conf on cloud and big data computing, Intl Conf on cyber science and technology congress (DASC/PiCom/CBDCom/CyberSciTech), pp 49–54. IEEE

  36. Amiri-Zarandi M, Dara RA, Fraser E (2022) Lbtm: a lightweight blockchain-based trust management system for social internet of things. J Supercomput 78(6):8302–8320

    Article  Google Scholar 

  37. Ayed EB, Kolski C, Magdich R, Ezzedine H (2016) Towards a context based evaluation support system for quality in use assessment of mobile systems. In: 2016 IEEE international conference on systems, man, and cybernetics (SMC), pp 004350–004355

  38. Coutaz J, Calvary G (2012) HCI and software engineering for user interface plasticity. In: Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications, Third Edition, pp 1195–1220

  39. Bello AA, Chiroma H, Gital AY, Gabralla LA, Abdulhamid SM, Shuib L (2020) Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives. Neural Comput Appl 32(17):13651–13678

    Article  Google Scholar 

  40. Lin Z, Dong L (2017) Clarifying trust in social internet of things. IEEE Trans Knowl Data Eng 30(2):234–248

    Article  Google Scholar 

  41. Masmoudi M, Abdelghani W, Amous I, Sedes F (2019) Deep learning for trust-related attacks detection in social internet of things. In: International conference on e-business engineering, pp 389–404. Springer

  42. Gonzalez Garcia C, Nunez Valdez ER, Garcia Diaz V, Pelayo Garcia Bustelo BC, Cueva Lovelle JM et al (2019) A review of artificial intelligence in the internet of things. Int J Interact Multimed Artif Intell 5:9–20

    Google Scholar 

  43. Mendoza CV, Kleinschmidt JH (2015) Mitigating on-off attacks in the internet of things using a distributed trust management scheme. Int J Distrib Sens Netw 11(11):859731

    Article  Google Scholar 

  44. Mendoza CVL, Kleinschmidt JH (2018) A distributed trust management mechanism for the internet of things using a multi-service approach. Wireless Pers Commun 103(3):2501–2513

    Article  Google Scholar 

  45. Carrington AM, Fieguth PW, Qazi H, Holzinger A, Chen HH, Mayr F, Manuel DG (2020) A new concordant partial auc and partial c statistic for imbalanced data in the evaluation of machine learning algorithms. BMC Med Inform Decis Mak 20(1):1–12

    Article  Google Scholar 

  46. Chen R, Guo J, Bao F (2014) Trust management for soa-based iot and its application to service composition. IEEE Trans Serv Comput 9(3):482–495

    Article  Google Scholar 

Download references

Acknowledgements

The research leading to these results has received funding from the Ministry of Higher Education and Scientific Research of Tunisia under the Grant Agreement Number LR11ES48.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rim Magdich.

Ethics declarations

Conflict of interest

All authors declare that they have NO affiliations with or involvement in any organization or entity with any financial interest, or non-financial interest in the subject matter or materials discussed in this manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Magdich, R., Jemal, H. & Ben Ayed, M. Context-awareness trust management model for trustworthy communications in the social Internet of Things. Neural Comput & Applic 34, 21961–21986 (2022). https://doi.org/10.1007/s00521-022-07656-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-022-07656-w

Keywords

Navigation