A Fuzzy Logic Based Trust-ABAC Model for the Internet of Things

  • Hamdi OuechtatiEmail author
  • Nadia Ben Azzouna
  • Lamjed Ben Said
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 926)


The Internet of Things (IoT) integrates a large amount of everyday life devices from heterogeneous network environments, bringing a great challenge into security and reliability management. In order to cope with certain challenges posed by device capacity and the nature of IoT networks, a lightweight access control model is needed to resolve security and privacy issues. In this paper, we present Fuzzy logic based Trust-ABAC model, an access control model for the Internet of Things. Our model for the IoT is an improvement of our previous work Trust-ABAC [3] by a new Fuzzy logic-based model in which we consider an evaluation of trust based on recommendations and social relationship that can deal effectively with certain types of malicious behavior that intend to mislead other nodes. Results prove the performance of the proposed model and its capabilities to detect the collision and singular attacks with high precision.


  1. 1.
    Palattella, M.R., Dohler, M., Grieco, A., Rizzo, G., Torsner, J., Engel, T., Ladid, L.: Internet of things in the 5G era: enablers, architecture, and business models. IEEE J. Sel. Areas Commun. 34(3), 510–527 (2016)CrossRefGoogle Scholar
  2. 2.
    Akpakwu, G.A., Silva, B.J., Hancke, G.P., Abu-Mahfouz, A.M.: A survey on 5G networks for the internet of things: communication technologies and challenges. IEEE Access 5(12), 3619–3647 (2017)Google Scholar
  3. 3.
    Ouechtati, H., Azzouna, N.B.: Trust-ABAC towards an access control system for the internet of things. In: International Conference on Green, Pervasive, and Cloud Computing, pp. 75–89. Springer, Cham (2017)Google Scholar
  4. 4.
    Li, F.-H., Su, M., Shi, G.-Z., et al.: Research status and development trends of access control model. Dianzi Xuebao (Acta Electronica Sinica) 40(4), 805–813 (2012)Google Scholar
  5. 5.
    Blackstock, M., Lea, R.: IoT interoperability: a hub-based approach. In: 2014 International Conference on the Internet of Things (IOT), pp. 79–84. IEEE (2014)Google Scholar
  6. 6.
    Lampson, B.W.: Protection. In: 5th Princeton Symposium on Information Sciences and Systems, vol. 8, pp. 18–24 (1974)Google Scholar
  7. 7.
    Sandhu, R.S.: Lattice-based access control models. IEEE Comput. 26, 9–19 (1993)CrossRefGoogle Scholar
  8. 8.
    Sandhu, R.S., Coynek, E.J., Feinsteink, H.L., Youmank, C.E.: Role-based access control models. IEEE Comput. 29, 38–47 (1996)CrossRefGoogle Scholar
  9. 9.
    Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10, 1–34 (2006)CrossRefGoogle Scholar
  10. 10.
    Feng, F., Lin, C., Peng, D., Li, J.: A trust and context based access control model for distributed systems. In: The 10th IEEE International Conference on High Performance Computing and Communications, pp. 629–634 (2008)Google Scholar
  11. 11.
    Dan, N., Hua-Ji, S., Yuan, C., Jia-Hu, G.: Attribute based access control (ABAC)-based cross-domain access control in service-oriented architecture (SOA). In: Proceedings of the International Conference on Computer Science and Service System (CSSS 2012) (2012)Google Scholar
  12. 12.
    Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the social internet of things. IEEE Trans. Knowl. Data Eng. 26(5), 1253–1266 (2014)CrossRefGoogle Scholar
  13. 13.
    Sicari, S., Rizzardi, A., Grieco, L.A., et al.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRefGoogle Scholar
  14. 14.
    Saied, Y.B., Olivereau, A., Zeghlache, D., et al.: Trust management system design for the internet of things: a context-aware and multi-service approach. Comput. Secur. 39, 351–365 (2013)CrossRefGoogle Scholar
  15. 15.
    Smari, W.W., Clemente, P., Lalande, J.-F.: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system. Future Gener. Comput. Syst. 31, 147–168 (2014)CrossRefGoogle Scholar
  16. 16.
    Chen, D., Chang, G., Sun, D., et al.: Modeling access control for cyber-physical systems using reputation. Comput. Electric. Eng. 38(5), 1088–1101 (2012)CrossRefGoogle Scholar
  17. 17.
    Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R.: A fuzzy approach to trust based access control in internet of things. In: 2013 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems (VITAE), pp. 1–5. IEEE (2013)Google Scholar
  18. 18.
    Armando, A., Bezzi, M., Di Cerbo, F., et al.: Balancing trust and risk in access control. In: OTM Confederated International Conferences on the Move to Meaningful Internet Systems, pp. 660–676. Springer, Cham (2015)Google Scholar
  19. 19.
    Xia, F., Yang, L.T., Wang, L., et al.: Internet of things. Int. J. Commun. Syst. 25(9), 1101–1102 (2012)CrossRefGoogle Scholar
  20. 20.
    Douceur, J.R.: The sybil attack. In: International Workshop on Peer To Peer Systems. Springer, Berlin, Heidelberg (2002)Google Scholar
  21. 21.
    Bhuiyan, M.Z.A., Wu, J.: Collusion attack detection in networked systems. In: Proceedings of the 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (IEEE DASC 2016), p. 18 (2016)Google Scholar
  22. 22.
    Atzori, L., Iera, A., Morabito, G., et al.: The social internet of things (SIoT) when social networks meet the internet of things: concept, architecture and network characterization. Comput. Netw. 56(16), 3594–3608 (2012)CrossRefGoogle Scholar
  23. 23.
    Gong, S.: A collaborative filtering recommendation algorithm based on user clustering and item clustering. JSW 5(7), 745–752 (2010)CrossRefGoogle Scholar
  24. 24.
    Pham, M.C., Cao, Y., Klamma, R., et al.: A clustering approach for collaborative filtering recommendation using social network analysis. J. UCS 17(4), 583–604 (2011)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Hamdi Ouechtati
    • 1
    Email author
  • Nadia Ben Azzouna
    • 1
  • Lamjed Ben Said
    • 1
  1. 1.LR11ES03 SMART LabUniversite de Tunis ISGTunisTunisia

Personalised recommendations