Abstract
The integration of social ties between IoT’s devices has facilitated the emergence of new paradigm named the Social Internet of Things SIoT. In this paradigm, social relationships can be established in autonomous way by objects creating virtual communities with shared interests. To facilitate the location of the desired interests and enhance the cooperation between SIoT’s devices, the trust systems have been proven to be an effective solution in such interconnected environment. In this paper, we propose an interest-based trust management scheme for SIoT. This scheme assesses the trust of SIoT’s devices according to the interest preferences of the trustor (i.e., assessor object). Moreover, it introduces a new recommendation system based on the similarity in terms of interest preferences between the trustor and the recommender (i.e., provides recommendation about the assessed object) to enhance the location of the desired services. Simulation results validate the convergence of the proposed trust mechanism, and show its gain in terms of transaction success rate.







Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
AlFarraj O, AlZubi A, Tolba A (2018) Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0885-1
Amit S (2001) Modern information retrieval: a brief overview. Bull IEEE Comput Soc Techn Comm Data Eng 24(4):35–43
Atzori L, Iera A, Morabito G (2010) The internet of things: a surveys. Comput Netw 54(15):2787–2805. https://doi.org/10.1016/j.comnet.2010.05.010
Atzori L, Iera A, Morabito G (2011) Siot: Giving a social structure to the internet of things. Commun Lett 15(11):1193–1195. https://doi.org/10.1109/LCOMM.2011.090911.111340
Atzori L, Iera A, Morabito G, Nitti M (2012) The social internet of things (siot)—when social networks meet the internet of things: concept, architecture and network characterization. Comput Netw 56(16):3594–3608. https://doi.org/10.1016/j.comnet.2012.07.010
Chen D, Chang G, Sun D, Jia J, Wang X (2011) Trm-iot: A trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(4):1207–1228. https://doi.org/10.2298/CSIS110303056C
Chen I, Bao F, Guo J (2016a) Trust-based service management for social internet of things systems. IEEE Trans Dependable Secure Comput 13(6):684–696. https://doi.org/10.1109/TDSC.2015.2420552
Chen I, Guo J, Bao F (2016b) Trust management for soa-based iot and its application to service composition. IEEE Trans Serv Comput 9(3):482–495. https://doi.org/10.1109/TSC.2014.2365797
Chen I, Tian Z, Cui X, Yin L, Wang X (2018) Trust architecture and reputation evaluation for internet of things. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0887-z
Ganeriwal S, Balzano L, Srivastava M (2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sensor Netw 4(3):1–37. https://doi.org/10.1145/1362542.1362546
Gao C, Chen Z, Li X, Tian Z, Li S, Wang Z (2018) Multiobjective discrete particle swarm optimization for community detection in dynamic networks. Europhys Lett (EPL) 22(2):28001. https://doi.org/10.1209/0295-5075/122/28001
Gu L, Wang J, Bin S (2014) Trust management mechanism for internet of things. Commun China 11(12):148–156. https://doi.org/10.1109/CC.2014.6821746
Hoffman K, Zage D, Rotaru C (2009) A survey of attack and defense techniques for reputation systems. ACM Comput Surv J 42(2):1–34. https://doi.org/10.1145/1592451.1592452
Huang Z, Zeng D, Chen H (2007) A comparison of collaborative-filtering recommendation algorithms for e-commerce. IEEE Intell Syst 22(5):68–78. https://doi.org/10.1109/MIS.2007.4338497
Josang A, Golbeck J (2009) Challenges for robust trust and reputation systems. In: International Workshop on Security and Trust Management (STM), pp 1–12
Josang A, Ismail R (2002) The beta reputation system. In: 15th Bled Electronic Commerce Conference, pp 1–14
Khoury R, Karray F, Sun Y, Kamel M, Basir O (2007) Semantic understanding of general linguistic items by means of fuzzy set theory. IEEE Trans Fuzzy Syst 15(5):757–771. https://doi.org/10.1109/TFUZZ.2006.889817
Køien G (2011) Reflections on trust in devices: an informal survey of human trust in an internet-of-things context. Wirel Person Commun 61(3):495–510. https://doi.org/10.1007/s11277-011-0386-4
Kowshalya A, Valarmathi M (2017) Trust management for reliable decision making among social objects in the social internet of things. IET Netw 6(4):75–80. https://doi.org/10.1049/iet-net.2017.0021
Lacuesta R, Navarro G, Cetina C, Penalver L, Lloret J (2012) Internet of things: where to be is to trust. J Wirel Commun Network. https://doi.org/10.1186/1687-1499-2012-203
Nguyen H, Lee O, Jung J, Park J, Um T, Lee H (2017) Event-driven trust refreshment on ambient services. IEEE Access 5:4664–4670. https://doi.org/10.1109/ACCESS.2017.2677917
Nguyen K, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17–31. https://doi.org/10.1016/j.adhoc.2015.01.006
Nitti M, Girau R, Atzori L, Morabito G (2012) A subjective model for trustworthiness evaluation in the social internet of things. In: IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), p 18–23. https://doi.org/10.1109/PIMRC.2012.6362662
Nitti M, Girau R, Atzori L, Morabito G (2014) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26(5):1253–1266. https://doi.org/10.1109/TKDE.2013.105
Saied Y, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the internet of things: a context-aware and multiservice approach. Comput Secur 39:351–366. https://doi.org/10.1016/j.cose.2013.09.001
Sicari S, Rizzardi A, Grieco L, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164. https://doi.org/10.1016/j.comnet.2014.11.008
Tan Q, Gao Y, Shi J, Wang X, Fang B, Tian Z (2018) Towards a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2018.2846624
Tian Z, Cui Y, An L, Su S, Yin X, Yin L, Cui X (2018) A real-time correlation of host-level events in cyber range service for smart campus. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2846590
Tian Z, Su S, Shi W, Du X, Guizani M, Yu X (2019) A data-driven method for future internet route decision modeling. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2018.12.054
Wang Y, Tian Z, Zhang H, Su S, Shi W (2018) A privacy preserving scheme for nearest neighbor query. Sensors 18(8):2440. https://doi.org/10.3390/s18082440
Yan Z, Zhang P, Vasilakos A (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134. https://doi.org/10.1016/j.jnca.2014.01.014
Yang X, Guo Y, Steck H (2014) A survey of collaborative filtering based social recommender systems. Comput Commun 41:1–10. https://doi.org/10.1016/j.comcom.2013.06.009
Zemmoudj S, Bermad N, Omar M (2018) Context-aware pseudonymization and authorization model for iot-based smart hospitals. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-1129-0
Acknowledgements
This work was carried out in the framework of research activities of the laboratory LARI, which is affiliated to the University of Tizi-Ouzou. It was done in collaboration with the Labex MS2T, which was funded by the French Government, through the program “Investments for the future” managed by the National Agency for Research (Reference ANR-11-IDEX-0004-02).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations
Rights and permissions
About this article
Cite this article
Talbi, S., Bouabdallah, A. Interest-based trust management scheme for social internet of things. J Ambient Intell Human Comput 11, 1129–1140 (2020). https://doi.org/10.1007/s12652-019-01256-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-019-01256-8