Multidimensional Trust-Based Anomaly Detection System in Internet of Things

  • Fangyu Gai
  • Jiexin Zhang
  • Peidong Zhu
  • Xinwen JiangEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10251)


Trust Management (TM) has been playing an important role in dealing with security and privacy issues in the Internet of Things (IoT). Following this trend, we propose a trust-based anomaly detection system which provides a closed loop of trustworthiness computing, decision-making and trust reevaluation. The proposed trust model considers multidimensional trust elements including reputation, Quality of Service (QoS) and social relationship, the result of which is employed to instruct the device to take appropriate security policies against its peers. Moreover, the detected anomaly event will trigger the reevaluation of the peers trustworthiness. To evaluate our system, we consider a shopping mall scenario with a great many of IoT devices, and the simulation results show our system achieves very low false alarm rate under proper trust level threshold.


Internet of Things Trust management Anomaly detection 



This work is supported by the National Science Foundation of China under Grants Nos. 61272010 and 61572514.


  1. 1.
    Liu, Y.B., Gong, X.H., Feng, Y.F.: Trust system based on node behavior detection in Internet of Things. J. Commun. 35, 8–15 (2014)Google Scholar
  2. 2.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of IEEE Conference on Security and Privacy, vol. 30, no. 1, pp. 164–173 (1996)Google Scholar
  3. 3.
    Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security. ITIFIP, vol. 100, pp. 107–121. Springer, Boston (2002). doi: 10.1007/978-0-387-35612-9_9 CrossRefGoogle Scholar
  4. 4.
    Lee, S., Sherwood, R., Bhattacharjee, B.: Cooperative peer groups in nice. In: Joint Conference of the IEEE Computer and Communications, vol. 2, pp. 1272–1282. IEEE Societies (2003)Google Scholar
  5. 5.
    Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42(3), 120–134 (2014)CrossRefGoogle Scholar
  6. 6.
    Chen, D., Chang, G., Sun, D., Li, J., Jia, J., Wang, X.: TRM-IoT: a trust management model based on fuzzy reputation for Internet of Things. Comput. Sci. Inf. Syst. 8(4), 1207–1228 (2011)CrossRefGoogle Scholar
  7. 7.
    Bao, F., Chen, I.R.: Trust management for the Internet of Things and its application to service composition. In: World of Wireless, Mobile and Multimedia Networks, pp. 1–6 (2012)Google Scholar
  8. 8.
    Atzori, L., Iera, A., Morabito, G., Nitti, M.: The Social Internet of Things (SIoT) - when social networks meet the Internet of Things: concept, architecture and network characterization. Comput. Netw. 56(16), 3594–3608 (2012)CrossRefGoogle Scholar
  9. 9.
    Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the Social Internet of Things. IEEE Trans. Knowl. Data Eng. 26(5), 1253–1266 (2014)CrossRefGoogle Scholar
  10. 10.
    Bao, F., Chen, I.R., Chang, M.J., Cho, J.H.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2), 169–183 (2012)CrossRefGoogle Scholar
  11. 11.
    Bernabe, J.B., Ramos, J.L.H., Gomez, A.F.S.: TACIoT: multidimensional trust-aware access control system for the Internet of Things. Soft Comput. 20(5), 1–17 (2016)Google Scholar
  12. 12.
    Yan, Z., Prehofer, C.: Autonomic trust management for a component-based software system. IEEE Trans. Depend. Secur. Comput. 8(6), 810–823 (2011)CrossRefGoogle Scholar
  13. 13.
    Chen, I.R., Bao, F., Guo, J.: Trust-based service management for Social Internet of Things systems. IEEE Trans. Depend. Secur. Comput. 13, 684–696 (2015)CrossRefGoogle Scholar
  14. 14.
    Bao, F., Chen, R., Chang, M., Cho, J.-H.: Trust-based intrusion detection in wireless sensor networks. In: 2011 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2011)Google Scholar
  15. 15.
    Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013)CrossRefGoogle Scholar
  16. 16.
    Truong, N.B., Um, T.-W., Lee, G.M.: A reputation and knowledge based trust service platform for trustworthy Social Internet of Things. In: Innovations in Clouds, Internet and Networks (ICIN), Paris, France (2016)Google Scholar
  17. 17.
    Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the Internet of Things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16. ACM (2012)Google Scholar
  18. 18.
    Zadeh, L.A.: Fuzzy logic = computing with words. IEEE Trans. Fuzzy Syst. 4(2), 3–23 (1996)CrossRefzbMATHGoogle Scholar
  19. 19.
    Mamdani, E.H.: Application of fuzzy algorithms for control of simple dynamic plant. In: Proceedings of the Institution of Electrical Engineers, vol. 121, no. 12, pp. 1585–1588. IET (1974)Google Scholar
  20. 20.
    Pawlak, Z.: Rough sets, decision algorithms and Bayes’ theorem. Eur. J. Oper. Res. 136(1), 181–189 (2002)MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Fangyu Gai
    • 1
  • Jiexin Zhang
    • 1
  • Peidong Zhu
    • 1
  • Xinwen Jiang
    • 1
    Email author
  1. 1.School of ComputerNational University of Defense TechnologyChangshaChina

Personalised recommendations