Document Type : Original Research Paper


1 computer engineering, Lahijan branch, Islamic Azad University

2 Mehrastan University


The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmful attacks based on their social relationships with other things for their own gain at the expense of other IoT devices. This motivates us to work on the issue of how to estimate the trust of a service provider to avoid malicious service providers and select the best service provider. In this paper, a novel trust management model is proposed based on four properties. The model deals with attacks (especially on-off attacks) and considers service levels for services provided by each node. A method to provide different levels of services via SIoT devices, and a new trust assessment scheme are the contributions of this paper. We evaluated the proposed scheme with extensive simulations and the results show that the proposed model can effectively select the best service provider and cope with most trust related attacks.


Main Subjects

[1] K. Routh and T. Pal, "A survey on technological, business and societal aspects of Internet of Things by Q3, 2017," in 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU), 2018, pp. 1-4.
[2] N. Bui and M. Zorzi, "Health care applications: a solution based on the internet of things," presented at the Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, Barcelona, Spain, 2011.
[3] A. J. Jara, M. A. Zamora, and A. F. Skarmeta, "An internet of things-based personal device for diabetes therapy management in ambient assisted living (AAL)," Personal Ubiquitous Comput., vol. 15, no. 4, pp. 431-440, 2011.
[4] L. Xu, L. Rongxing, L. Xiaohui, S. Xuemin, C. Jiming, and L. Xiaodong, "Smart community: an internet of things application," Communications Magazine, IEEE, vol. 49, no. 11, pp. 68-75, 2011.
[5] Y. Kung, S. Liou, G. Qiu, B. Zu, Z. Wang, and G. Jong, "Home monitoring system based internet of things," in 2018 IEEE International Conference on Applied System Invention (ICASI), 2018, pp. 325-327.
[6] D. Guinard, V. Trifa, S. Karnouskos, P. Spiess, and D. Savio, "Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services," IEEE Transactions on Services Computing, vol. 3, no. 3, pp. 223-235, 2010.
[7] L. Atzori, A. Iera, and G. Morabito, "SIoT: Giving a Social Structure to the Internet of Things," IEEE Communications Letters, vol. 15, no. 11, pp. 1193-1195, 2011.
[8] A. P. Fiske, "The four elementary forms of sociality: framework for a unified theory of social relations," Psychological review, vol. 99, no. 4, p. 689, 1992.
[9] L. E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl5, and H.-W. Gellersen, "Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts," in Ubicomp 2001: Ubiquitous Computing: International Conference Atlanta Georgia, USA, September 30–October 2, 2001 Proceedings, G. D. Abowd, B. Brumitt, and S. Shafer, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001, pp. 116-122.
[10] L. Atzori, A. Iera, G. Morabito, and M. Nitti, "The Social Internet of Things (SIoT) – When social networks meet the Internet of Things: Concept, architecture and network characterization," Computer Networks, vol. 56, no. 16, pp. 3594-3608, 11/14/ 2012.
[11] Z. Yan, P. Zhang, and A. V. Vasilakos, "A survey on trust management for Internet of Things," Journal of Network and Computer Applications, vol. 42, pp. 120-134, 6// 2014.
[12] I. Chen, F. Bao, and J. Guo, "Trust-Based Service Management for Social Internet of Things Systems," IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 6, pp. 684-696, 2016.
[13] R. Zhou, K. Hwang, and M. Cai, "GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks," IEEE Trans. on Knowl. and Data Eng., vol. 20, no. 9, pp. 1282-1295, 2008.
[14] A. A. Selcuk, E. Uzun, and M. R. Pariente, "A reputation-based trust management system for P2P networks," in Cluster Computing and the Grid, 2004. CCGrid 2004. IEEE International Symposium on, 2004, pp. 251-258.
[15] C. Yang, H. Shuang, C. Gongliang, and L. Jianhua, "An improved trust and authorization mechanism for P2P file sharing system," in 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN), 2017, pp. 1080-1084.
[16] X. Meng and D. Liu, "GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks," IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 1, pp. 54-68, 2018.
[17] J. Hendler and J. Golbeck, "Metcalfe's law, Web 2.0, and the Semantic Web," Web Semant., vol. 6, no. 1, pp. 14-20, 2008.
[18] H. Mayadunna and L. Rupasinghe, "A Trust Evaluation Model for Online Social Networks," in 2018 National Information Technology Conference (NITC), 2018, pp. 1-6.
[19] k. Ashton, "That 'Internet of Things' Thing , available at," RFID journal, 2009.
[20] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 9// 2013.
[21] B. Zhuming, X. Li Da, and W. Chengen, "Internet of Things for Enterprise Systems of Modern Manufacturing," Industrial Informatics, IEEE Transactions on, vol. 10, no. 2, pp. 1537-1546, 2014.
[22] M. Nitti, R. Girau, and L. Atzori, "Trustworthiness Management in the Social Internet of Things," Knowledge and Data Engineering, IEEE Transactions on, vol. 26, no. 5, pp. 1253-1266, 2014.
[23] Y. Ben Saied, A. Olivereau, D. Zeghlache, and M. Laurent, "Trust management system design for the Internet of Things: A context-aware and multi-service approach," Computers & Security, vol. 39, Part B, pp. 351-365, 11// 2013.
[24] F. Bao and I.-R. Chen, "Dynamic trust management for internet of things applications," presented at the Proceedings of the 2012 international workshop on Self-aware internet of things, San Jose, California, USA, 2012.
[25] D. Chen, G. Chang, D. Sun, J. Li, J. Jia, and X. Wang, "TRM-IoT: A trust management model based on fuzzy reputation for internet of things," Comput. Sci. Inf. Syst., vol. 8, no. 4, pp. 1207-1228, 2011.
[26] W. Sherchan, S. Nepal, and C. Paris, "A survey of trust in social networks," ACM Comput. Surv., vol. 45, no. 4, pp. 1-33, 2013.
[27] M. S. Islam, R. H. Khan, and D. M. Bappy, "A hierarchical intrusion detection system in wireless sensor networks," Computer Science Netw.Security, vol. 10, no. 8, pp. 21–26, 2010.
[28] A. P. R. d. Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong, "Decentralized intrusion detection in wireless sensor networks," presented at the Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, Montreal, Quebec, Canada, 2005.
[29] L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, 10/28/ 2010.
[30] E. Borgia, "The Internet of Things vision: Key features, applications and open issues," Computer Communications, vol. 54, pp. 1-31, 12/1/ 2014.