Skip to main content
Log in

Dynamic and scalable multi-level trust management model for Social Internet of Things

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by offering them the ability to connect to the Internet and communicate. Integrating the social component into IoT gave rise to the Social Internet of Things (SIoT), which has helped overcome various issues such as heterogeneity and navigability. In this kind of environment, participants compete to offer a variety of attractive services. Nevertheless, some of them resort to malicious behaviour to spread poor-quality services. They perform so-called Trust-Attacks and break the basic functionality of the system. Trust management mechanisms aim to counter these attacks and provide the user with an estimate of the trust degree they can place in other users, thus ensuring reliable and qualified exchanges and interactions. Several works in literature have interfered with this problem and have proposed different Trust-Models. The majority tried to adapt and reapply Trust-Models designed for common social networks or peer-to-peer ones. That is, despite the similarities between these types of networks, SIoT ones present specific peculiarities. In SIoT, users, devices and services are collaborating. Devices entities can present constrained computing and storage capabilities, and their number can reach some millions. The resulting network is complex, constrained and highly dynamic, and the attacks-implications can be more significant. In this paper, we propose DSL-STM a new dynamic and scalable multi-level Trust-Model, specifically designed for SIoT environments. We propose multidimensional metrics to describe and SIoT entities behaviours. The latter are aggregated via a Machine Learning-based method, allowing classifying users, detecting attack types and countering them. Finally, a hybrid propagation method is suggested to spread trust values in the network, while minimizing resource consumption and preserving scalability and dynamism. Experimentation made on various simulated scenarios allows us to prove the resilience and performance of DSL-STM.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Abdelghani W, Zayani CA, Amous I, Sèdes F (2016) Trust management in social internet of things: a survey. In: Social media: the good, the bad, and the ugly—conference on e-business, e-services, and e-society. Swansea, pp 430–441

  2. Abdelghani W, Zayani CA, Amous I, Sèdes F (2018) Trust evaluation model for attack detection in social internet of things. In: International conference on risks and security of internet and systems. Springer, pp 48–64

  3. Al-Masri E, Mahmoud QH (2007) Qos-based discovery and ranking of web services. In: Proceedings of the 16th international conference on computer communications and networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13–16, 2007. IEEE, Honolulu, Hawaii, USA, pp 529–534. https://doi.org/10.1109/ICCCN.2007.4317873

  4. Ali DH (2015) A social internet of things application architecture: applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds. Ph.D. thesis, Institut National des Télécommunications

  5. Ali S, Kibria MG, Jarwar MA, Lee HK, Chong I (2018) A model of socially connected web objects for iot applications. Wirel Commun Mobile Comput

  6. Amin F, Abbasi R, Rehman A, Choi GS (2019) An advanced algorithm for higher network navigation in social internet of things using small-world networks. Sensors 19(9)

  7. Atzori L, Iera A, Morabito G (2011) Siot: giving a social structure to the internet of things. IEEE Commun Lett 15(11):1193–1195

    Article  Google Scholar 

  8. Atzori L, Iera A, Morabito G (2014) From “smart objects” to “social objects”: the next evolutionary step of the internet of things. IEEE Commun Mag 52(1):97–105

  9. Atzori L, Iera A, Morabito G, Nitti M (2012) The social internet of things (siot)-when social networks meet the internet of things: concept, architecture and network characterization. Comput Netw 56(16):3594–3608

    Article  Google Scholar 

  10. Babar S, Mahalle P et al (2021) Trust management approach for detection of malicious devices in siot. Tehnički glasnik 15(1):43–50

    Article  Google Scholar 

  11. Bao F, Chen I, Guo J (2013) Scalable, adaptive and survivable trust management for community of interest based internet of things systems. In: International symposium on autonomous decentralized systems. IEEE Computer Society, Mexico City, pp 1–7. https://doi.org/10.1109/ISADS.2013.6513398

  12. Bao F, Chen IR (2012) Dynamic trust management for internet of things applications. In: Proceedings of the 2012 international workshop on Self-aware internet of things. ACM, pp 1–6

  13. Bao F, Chen R (2012) Trust management for the internet of things and its application to service composition. In: 2012 IEEE international symposium on a world of wireless, mobile and multimedia networks (WoWMoM). IEEE, pp 1–6

  14. Bernabe JB, Ramos JLH, Gomez AFS (2016) Taciot: multidimensional trust-aware access control system for the internet of things. Soft Comput 20(5):1763–1779

    Article  Google Scholar 

  15. Blomqvist K, Ståhle P (2000) Building organizational trust. 16th annual IMP conference. Citeseer, Bath, UK, pp 7–9

    Google Scholar 

  16. Bormann C, Ersue M, Keranen A (2014) Terminology for constrained-node networks. Tech. rep, IETF

  17. Chen R, Bao F, Guo J (2016) Trust-based service management for social internet of things systems. IEEE Trans Depend Sec Comput 13(6):684–696

    Article  Google Scholar 

  18. Chen R, Guo J, Bao F (2016) Trust management for soa-based iot and its application to service composition. IEEE Trans Serv Comput 9(3):482–495

    Article  Google Scholar 

  19. Chen Z, Ling R, Huang C, Zhu X (2016) A scheme of access service recommendation for the social internet of things. Int J Commun Syst 29(4):694–706. https://doi.org/10.1002/dac.2930

    Article  Google Scholar 

  20. Davis E, Marcus G (2015) Commonsense reasoning and commonsense knowledge in artificial intelligence. Commun ACM 58(9):92–103

    Article  Google Scholar 

  21. Deutsch M (1958) Trust and suspicion. J Confl Resol 2(4):265–279

    Article  Google Scholar 

  22. Ekbatanifard G, Yousefi O (2019) A novel trust management model in the social internet of things. J Adv Comput Eng Technol 5(2):57–70

    Google Scholar 

  23. Geetha S (2016) Social internet of things. World Sci News 41:76–77

    Google Scholar 

  24. Huang J, Seck MD, Gheorghe A (2016) Towards trustworthy smart cyber-physical-social systems in the era of internet of things. In: System of systems engineering conference (SoSE), 2016 11th. IEEE, pp 1–6

  25. Hussein D, Han SN, Lee GM, Crespi N, Bertin E (2017) Towards a dynamic discovery of smart services in the social internet of things. Comput Elect Eng 58:429–443

    Article  Google Scholar 

  26. Jayasinghe U, Truong NB, Lee GM, Um TW (2016) Rpr: a trust computation model for social internet of things. In: Ubiquitous intelligence and computing, advanced and trusted computing. IEEE, pp 930–937

  27. Jiang N, Tian F, Li J, Yuan X, Zheng J (2020) Man: mutual attention neural networks model for aspect-level sentiment classification in siot. IEEE Inter Things J 7(4):2901–2913

    Article  Google Scholar 

  28. Kim Y, Peterson RA (2017) A meta-analysis of online trust relationships in e-commerce. J Inter Market 38:44–54

    Google Scholar 

  29. Kranz M, Holleis P, Schmidt A (2009) Embedded interaction: interacting with the internet of things. IEEE Inter Comput 14(2):46–53

    Article  Google Scholar 

  30. Li Z, Chen R, Liu L, Min G (2015) Dynamic resource discovery based on preference and movement pattern similarity for large-scale social internet of things. IEEE Inter Things J 3(4):581–589

    Article  Google Scholar 

  31. Luhmann N (2000) Familiarity, confidence, trust: problems and alternatives. Trust Making Break Cooper Relat 6:94–107

    Google Scholar 

  32. Marche C, Atzori L, Iera A, Militano L, Nitti M (2017) Navigability in social networks of objects: the importance of friendship type and nodes’ distance. In: 2017 IEEE globecom workshops (GC Wkshps). IEEE, pp 1–6

  33. Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Acad Manage Rev 20(3):709–734

    Article  Google Scholar 

  34. Militano L, Orsino A, Araniti G, Nitti M, Atzori L, Iera A (2016) Trusted d2d-based data uploading in in-band narrowband-iot with social awareness. In: 2016 IEEE 27th annual international symposium on personal, indoor, and mobile radio communications (PIMRC). IEEE, pp, 1–6

  35. Roopa, MS, Buyya R (2020) Trust management for service-oriented siot systems. In: 2020 The 8th international conference on information technology: IoT and Smart City, pp 216–222

  36. Nitti M, Atzori L, Cvijikj IP (2014) Network navigability in the social internet of things. In: 2014 IEEE world forum on internet of things (WF-IoT). IEEE, pp 405–410

  37. Nitti M, Girau R, Atzori L (2014) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26(5):1253–1266

    Article  Google Scholar 

  38. Oliveira T, Alhinho M, Rita P, Dhillon G (2017) Modelling and testing consumer trust dimensions in e-commerce. Comput Human Behav 71:153–164

    Article  Google Scholar 

  39. Perera C, Zaslavsky A, Christen P, Georgakopoulos D (2013) Context aware computing for the internet of things: a survey. IEEE Commun Surv Tutorials 16(1):414–454

    Article  Google Scholar 

  40. Seungyong Y, Jeongnyeo K, Yongsung J (2017) Security considerations based on classification of iot device capabilities. In: Service computation. IARIA, 2017, Athens, Greece, pp 13–15

  41. Singh D, Tripathi G, Jara AJ (2014) A survey of internet-of-things: future vision, architecture, challenges and services. In: 2014 IEEE world forum on internet of things (WF-IoT). IEEE, pp 287–292

  42. Truong NB, Um TW, Lee GM (2016) A reputation and knowledge based trust service platform for trustworthy social internet of things. Innovations in clouds, internet and networks (ICIN). France, Paris, pp 104–111

    Google Scholar 

  43. Truong NB, Um TW, Zhou B, Lee GM (2017) From personal experience to global reputation for trust evaluation in the social internet of things. In: GLOBECOM 2017—2017 IEEE global communications conference. IEEE, pp 1–7

  44. Truong NB, Um TW, Zhou B, Lee GM (2018) Strengthening the blockchain-based internet of value with trust. In: 2018 IEEE international conference on communications (ICC), pp 1–7

  45. Wei L, Wu J, Long C (2021) Blockchain-enabled trust management in service-oriented internet of things: opportunities and challenges. In: 2021 The 3rd international conference on blockchain technology, pp 90–95

  46. Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134

    Article  Google Scholar 

  47. Ye J, Dobson S, McKeever S (2012) Situation identification techniques in pervasive computing: A review. Pervas Mobile Comput 8(1):36–66

    Article  Google Scholar 

  48. Zhou L, Varadharajan V, Hitchens M et al (2015) Trust enhanced cryptographic role-based access control for secure cloud data storage. IEEE Trans Inform Foren Sec 10(11):2381–2395

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wafa Abdelghani.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This work was financially supported by the PHC Utique program of the French Ministry of Foreign Affairs and Ministry of higher education and research and the Tunisian Ministry of higher education and scientific research in the CMCU project number 18G1431.

Appendix: Terminologies

Appendix: Terminologies

Notation

Meaning

Definition

Other designations

Social Internet of Things

IoT

Internet of things

A paradigm where physical devices are embedded with sensors , software and other technologies to interact ad exchange data over the Internet

Connected environment

SIoT

Social Internet of Things

A paradigm born from the integration of the social component in the IoT

Device

Technical artefacts intended to furnish an interface between the digital world and the physical world

Things-objects-node-actor-entity

User

Humans participating in IoT interactions by providing or requesting services and assigning rates and recommendations

Human-participant-actor-node-entity-provider-requester-consumer-recommender

Service

An abstraction allowing the construction of complex software systems

Node-Entity

Provider

A user who provides services for other users through the devices he owns

Requester

A user who invokes services provided by other users

Consumer

Recommender

A user who assign a rate to a service he invoked

-

Resource

Computing or storing capability. Can also refers to devices or services made available for IoT users

-

Rating

A score given by a user to a service he has invoked

Rate-feedback-opinion-recommendation

Community

A set of user

Trust concept

Trust

A social and psychological concept involving two actors: a trustor and a trustee

Confidence-belief

Trustor

A user who decides to trust another

Trustee

A user who is trusted.

Intention

A social and psychological concept referring to aims or plans of a user

Good will

-

Ability

A term designing the possession of the means or skill to do something

Capability-competency

Expectation

A term that expresses the needs and the requirement of a user

Risk

A situation involving exposure to danger

-

Trust-dimension

Different aspects of the trust concept. In this work there is a trust-dimension for each kind of entity as the purpose of trust vary according the kind of entity

 

Reputation system

Programs or algorithms that allow users to rate each other in online communities in order to build trust through reputation

 

Trust management process

 

TMM

Trust management mechanism

A mechanism which forms a layer superimposed on a given system and provides methods for assessing, propagating, storing and updating trust values for the system actors

Trust-features

Descriptors that make it possible to establish the criteria considered to compare and evaluate the network nodes

Indicator-factor-parameter-

TAM

Trust assessment model

The main component of a TMM designed for trust computation

Trust-composition

The first step of a TAM consisting in selecting trust features

Feature-engineering

Trust-aggregation

The second step of a TAM consisting in selecting a method to aggregate TrustFeatures on a trust value or a trust decision

Trust-propagation

The second phase of a TMM consisting on choosing a method for propagating trust-values computed by the TAM on the network

Trust-updating

The third phase of a TMM consisting on choosing a method for updating trust values

Node-ranking

A module consisting in providing scores to rank nodes according to many criteria

Attack-detection

A module aiming to classify nodes in malicious/legitimate and detect the type of launched attacks

Scalability

Consists of supporting a continuous and unlimited increase in the number of devices on the network

Dynamism

Consists of supporting a huge number of real-time interactions

-

Resources-efficiency

Consists of ensuring minimal consumption of computing and storage resources

Trust-Attacks modelling

TA

Trust-Attack

A set of actions performed by a malicious user in order to bias a reputation system

BMA

Bad-mouthing attack

A Trust-Attack where malicious nodes collude to destroy the reputation of a well-behaving one

BSA

Ballot-stuffing attack

A Trust-Attack where malicious disreputable nodes collaborate to promote their mutual reputations

SPA

Self-promoting attack

A Trust-Attack where a malicious node providing bad-quality service promotes his own reputation

DA

Discriminatory attack

A Trust-Attack where a malicious node attacks any other nodes without a strong relationship with him

OOA

On–off attack

A Trust-Attack where a malicious node provides bad services randomly instead of always providing the best services

OSA

Opportunistic-services attack

A Trust-Attack where a malicious node provides good services until he reaches a good reputation and then starts providing bad services

MRA

Malicious recommender attack

A category of Trust-Attacks where the node uses erroneous and unrepresentative ratings to skew the reputation system

MPA

Malicious provider attack

A category of Trust-Attacks where the node does not use rating but the chronological order of providing good/bad service to skew the reputation system

Malicious

A user who performed one or multiple Trust-Attacks

Legitimate

A user who does not launch Trust-Attacks

Benign-well-behaving

DSL-STM

Rep(\(u_i\))

Reputation

A Trust-Feature representing the global renown of a service provider in the network

Cred(\(u_i\))

Credibility

A trust-feature assessing how much the user’s rating match with his real opinion about an interaction he made

dExp(\(u_i,u_j\))

Direct experience

A trust feature representing the opinion of a user \(u_i\) about his past interactions with another user \(u_j\)

RateF(\(u_i,u_j\))

Rating frequency

A trust feature allowing to estimate if a user \(u_i\) is targeting another user \(u_j\)

Sim(\(u_i,u_j\))

Similarity

A trust feature consisting of measuring the degree of similarity between two users \(u_i\) and \(u_j\)

RateT(\(u_i\))

Rating Trend

A trust feature used to understand the general behaviour of a recommender node in the network

relStren(\(u_i,u_j\))

Relationship Strength

A trust feature allowing to study the relationship between two users

Fluct(\(u_i\))

Fluctuation

A trust feature to depict the variation in the service quality for a provider node

DCC

Device capability criterion

A criterion permitting devices classification according to their storage, computing and communication capabilities

ELC

Energy limitation criterion

A criterion permitting to classify devices according to their power terminology and their strategy for using power

MSRC

Minimal security requirement criterion

A criterion permitting to classify devices according to their respect for minimal security requirements

\(T_u(u_i)\)

User trust score

A score estimating the degree of trust we can assign to a user based on his reputation

\(T_d(d_j)\)

Device trust score

A score estimating the degree of trust we can assign to a device

\(T_s(s_k)\)

Service trust score

A score estimating the degree of trust we can assign to a service according to its functional and no-functional characteristics

\(fc(s_k)\)

Functional characteristics

A device feature expressing if a service is able to achieve the task for each it was designed.

\(nfc(s_k)\)

Non-functional characteristics

Secondary characteristics that qualify a service such as its response time

\(TN_i\)

Trustful node

Nodes trusted because they do not provide services and are just designed to make trust calculations

\(N_i\)

Node

Nodes providing and consuming services

\(f_h(x)\)

Hash function

Any function used to map data of arbitrary size to a fixed size values

Experimental metrics

R

Recall

A performance metric computed as the fraction of relevant instances that were retrieved

P

Precision

A performance metric computed as the fraction of relevant instances among the retrieved instances. were retrieved

F–M

F-measure

A performance metric that combines recall and precision

NBQS

Number of bad quality services

A performance metric indicating the rate of propagation of poor-quality services

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abdelghani, W., Amous, I., Zayani, C.A. et al. Dynamic and scalable multi-level trust management model for Social Internet of Things. J Supercomput 78, 8137–8193 (2022). https://doi.org/10.1007/s11227-021-04205-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04205-5

Keywords

Navigation