Trust Management Strategies in the Social Internet of Things: A Comprehensive Literature Review and Identification of Research Gaps

Authors

  • Shimaz Khan Shaik, Sharifalillah Nordin, Mohamad Yusof Darus

Keywords:

Trust Model, Social Internet of Things (SIoT), Architecture Components, Trust-related Attacks, Mitigation Techniques, Security, Research Gaps, Future Research Directions.

Abstract

This research paper presents a holistic study of the Trust Model in the context of the Social Internet of Things (SIoT) and its architectural components. It examines the importance of trust management in ensuring secure interactions among diverse nodes within SIoT networks. The paper researches various trust-related attacks that target the Trust Model and investigates the existing literature on mitigation techniques to counter these attacks effectively. Furthermore, the research analyzes the limitations of the current approaches, aiming to identify research gaps in trust management for SIoT. By evaluating the strengths and weaknesses of the existing work, this study lays the groundwork for future research directions in enhancing the Trust Model's resilience and adaptability in the rapidly evolving SIoT landscape. Through an in-depth analysis of trust, architecture components, attack scenarios, and mitigation strategies, this paper enhances comprehension of Trust Model dynamics in SIoT and offers valuable insights to guide further advancements in trust management and security for SIoT networks.

Downloads

Download data is not yet available.

References

K. Balasubramanian, Building blocks for the internet of things, vol. 9. 2014.

M. M. Hossain, M. Fotouhi, and R. Hasan, “Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things,” Proc. - 2015 IEEE World Congr. Serv. Serv. 2015, pp. 21–28, 2015, doi: 10.1109/SERVICES.2015.12.

“IoT,” 2016. https://www.ibm.com/blogs/internet-of-things/what-is-the-iot/ (accessed Feb. 11, 2020).

M. Mohammadi, A. Al-Fuqaha, S. Sorour, and M. Guizani, “Deep learning for IoT big data and streaming analytics: A survey,” IEEE Commun. Surv. Tutorials, vol. 20, no. 4, pp. 2923–2960, 2018, doi: 10.1109/COMST.2018.2844341.

K. M. Alam, M. Saini, and A. El Saddik, “Toward social internet of vehicles: Concept, architecture, and applications,” IEEE Access, vol. 3, pp. 343–357, 2015, doi: 10.1109/ACCESS.2015.2416657.

A. Khelloufi et al., “A Social-Relationships-Based Service Recommendation System for SIoT Devices,” IEEE Internet Things J., vol. 8, no. 3, pp. 1859–1870, 2021, doi: 10.1109/JIOT.2020.3016659.

I. R. Chen, F. Bao, and J. Guo, “Trust-Based Service Management for Social Internet of Things Systems,” IEEE Trans. Dependable Secur. Comput., vol. 13, no. 6, pp. 684–696, 2016, doi: 10.1109/TDSC.2015.2420552.

Z. M. Aljazzaf, M. A. M. Capretz, and M. Perry, “Trust-based Service-Oriented Architecture,” 2016.

W. Najib, S. Sulistyo, and Widyawan, “Survey on trust calculation methods in internet of things,” Procedia Comput. Sci., vol. 161, pp. 1300–1307, 2019, doi: 10.1016/j.procs.2019.11.245.

A. M. Kowshalya and M. L. Valarmathi, “Trust Management in the Social Internet of Things,” Wirel. Pers. Commun., vol. 96, no. 2, pp. 2681–2691, 2017, doi: 10.1007/s11277-017-4319-8.

W. Abdelghani, C. A. Zayani, I. Amous, and F. Sèdes, “Trust Evaluation Model for Attack Detection in Social Internet of Things,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11391 LNCS, no. 18, pp. 48–64, 2019, doi: 10.1007/978-3-030-12143-3_5.

M. S. Roopa, S. Pattar, R. Buyya, K. R. Venugopal, S. S. Iyengar, and L. M. Patnaik, “Social Internet of Things (SIoT): Foundations, thrust areas, systematic review and future directions,” Comput. Commun., vol. 139, no. September 2018, pp. 32–57, 2019, doi: 10.1016/j.comcom.2019.03.009.

A. Meena Kowshalya and M. L. Valarmathi, “Dynamic trust management for secure communications in social internet of things (SIoT),” Sadhana - Acad. Proc. Eng. Sci., vol. 43, no. 9, 2018, doi: 10.1007/s12046-018-0885-z.

R. C. Mayer, J. H. Davis, and F. D. Schoorman, “An Integrative Model of Organizational Trust Author ( s ): Roger C . Mayer , James H . Davis and F . David Schoorman Published by : Academy of Management Stable URL : http://www.jstor.com/stable/258792 REFERENCES Linked references are available on JSTOR f,” Acad. Manag. Rev., vol. 20, no. 3, pp. 709–734, 1995.

C. L. Corritore, B. Kracher, and S. Wiedenbeck, “On-line trust: Concepts, evolving themes, a model,” Int. J. Hum. Comput. Stud., vol. 58, no. 6, pp. 737–758, 2003, doi: 10.1016/S1071-5819(03)00041-7.

W. Viriyasitavat, L. Da Xu, Z. Bi, D. Hoonsopon, and N. Charoenruk, “Managing QoS of Internet-of-Things Services Using Blockchain,” IEEE Trans. Comput. Soc. Syst., vol. 6, no. 6, pp. 1357–1368, 2019, doi: 10.1109/TCSS.2019.2919667.

M. S. · G. B. · A. K. Tripathi1, “QoS‑Aware Selection of IoT‑Based Service.pdf.” 2020.

I. R. Chen, J. Guo, D. C. Wang, J. J. P. Tsai, H. Al-Hamadi, and I. You, “Trust-Based Service Management for Mobile Cloud IoT Systems,” IEEE Trans. Netw. Serv. Manag., vol. 16, no. 1, pp. 246–263, 2019, doi: 10.1109/TNSM.2018.2886379.

M. Nitti, R. Girau, and L. Atzori, “Trustworthiness management in the social internet of things,” IEEE Trans. Knowl. Data Eng., vol. 26, no. 5, pp. 1253–1266, 2014, doi: 10.1109/TKDE.2013.105.

N. B. Truong and G. M. Lee, “A Survey on Trust Computation in the Internet of Things,” no. April 2017, 2016.

M. S. Tyrone Grandison, “ A Survey of Trust in Internet Applications,” IEEE Commun. Surv. Tutorials, Fourth Quart., pp. 1–30, 2000.

I. Pranata, G. Skinner, and R. Athauda, “A holistic review on trust and reputation management systems for digital environments,” Int J Comput Inf Technol, vol. 01, no. 01, pp. 44–53, 2012, [Online]. Available: http://ijcit.com/archives/volume1/issue1/Paper010106.pdf.

A. M. Kowshalya and M. L. Valarmathi, “Trust Management in the Social Internet of Things,” Wirel. Pers. Commun., vol. 96, no. 2, pp. 2681–2691, 2017, doi: 10.1007/s11277-017-4319-8.

W. Li, H. Song, and F. Zeng, “Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities,” IEEE Internet Things J., vol. 5, no. 2, pp. 716–723, 2018, doi: 10.1109/JIOT.2017.2720635.

S. W. A. Hamdani, A. W. Khan, N. Iltaf, J. I. Bangash, Y. A. Bangash, and A. Khan, “Dynamic distributed trust management scheme for the Internet of Things,” Turkish J. Electr. Eng. Comput. Sci., vol. 29, no. 2, pp. 796–815, 2021, doi: 10.3906/ELK-2003-5.

M. M. B, W. Abdelghani, and I. Amous, “Deep Learning for Trust-Related Attacks,” vol. 1, pp. 389–404, 2020, doi: 10.1007/978-3-030-34986-8.

C. V. L. Mendoza and J. H. Kleinschmidt, “Mitigating on-off attacks in the internet of things using a distributed trust management scheme,” Int. J. Distrib. Sens. Networks, vol. 2015, 2015, doi: 10.1155/2015/859731.

F. Bao, I. R. Chen, and J. Guo, “Scalable, adaptive and survivable trust management for community of interest based internet of things systems,” Proc. - 2013 11th Int. Symp. Auton. Decentralized Syst. ISADS 2013, 2013, doi: 10.1109/ISADS.2013.6513398.

J. Wang, H. Wang, H. Zhang, and N. Cao, “Trust and Attribute-Based Dynamic Access Control Model for Internet of Things,” Proc. - 2017 Int. Conf. Cyber-Enabled Distrib. Comput. Knowl. Discov. CyberC 2017, vol. 2018-Janua, pp. 342–345, 2017, doi: 10.1109/CyberC.2017.47.

S. Aalibagi, H. Mahyar, A. Movaghar, and H. E. Stanley, “A Matrix Factorization Model for Hellinger-Based Trust Management in Social Internet of Things,” IEEE Trans. Dependable Secur. Comput., vol. 19, no. 4, pp. 2274–2285, 2022, doi: 10.1109/TDSC.2021.3052953.

O. A. Wahab, G. Rjoub, J. Bentahar, and R. Cohen, “Federated against the cold: A trust-based federated learning approach to counter the cold start problem in recommendation systems,” Inf. Sci. (Ny)., vol. 601, pp. 189–206, Jul. 2022, doi: 10.1016/J.INS.2022.04.027.

S. Asiri and A. Miri, “An IoT trust and reputation model based on recommender systems,” 2016 14th Annu. Conf. Privacy, Secur. Trust. PST 2016, pp. 561–568, 2016, doi: 10.1109/PST.2016.7907017.

C. Ju, J. Wang, and C. Xu, “A novel application recommendation method combining social relationship and trust relationship for future internet of things,” Multimed. Tools Appl., vol. 78, no. 21, pp. 29867–29880, 2019, doi: 10.1007/s11042-018-6604-2.

B. Cai, X. Li, W. Kong, J. Yuan, and S. Yu, “A Reliable and Lightweight Trust Inference Model for Service Recommendation in SIoT,” IEEE Internet Things J., vol. 9, no. 13, pp. 10988–11003, 2022, doi: 10.1109/JIOT.2021.3125347.

J. Son, W. Choi, and S. M. Choi, “Trust information network in social Internet of things using trust-aware recommender systems,” Int. J. Distrib. Sens. Networks, vol. 16, no. 4, 2020, doi: 10.1177/1550147720908773.

J. Wei, J. He, K. Chen, Y. Zhou, and Z. Tang, “Collaborative filtering and deep learning based recommendation system for cold start items,” Expert Syst. Appl., vol. 69, pp. 1339–1351, 2017, doi: 10.1016/j.eswa.2016.09.040.

G. X. Lye, W. K. Cheng, T. B. Tan, C. W. Hung, and Y. L. Chen, “Creating personalized recommendations in a smart community by performing user trajectory analysis through social internet of things deployment,” Sensors (Switzerland), vol. 20, no. 7, pp. 1–28, 2020, doi: 10.3390/s20072098.

F. Wang et al., “With User-Item-Trust Records,” pp. 1–11, 2021.

C. Marche and M. Nitti, “Can We Trust Trust Management Systems?,” IoT, vol. 3, no. 2, pp. 262–272, 2022, doi: 10.3390/iot3020015.

S. A. Siddiqui, A. Mahmood, W. E. Zhang, and Q. Z. Sheng, “Machine learning based trust model for misbehaviour detection in internet-of-vehicles,” Commun. Comput. Inf. Sci., vol. 1142 CCIS, pp. 512 – 520, 2019, doi: 10.1007/978-3-030-36808-1_56.

A. Gholami, N. Torkzaban, and J. S. Baras, “Trusted Decentralized Federated Learning,” 2022, doi: 10.1109/CCNC49033.2022.9700624.

R. Magdich, H. Jemal, C. Nakti, and M. Ben Ayed, “An efficient Trust Related Attack Detection Model based on Machine Learning for Social Internet of Things,” in 2021 International Wireless Communications and Mobile Computing (IWCMC), 2021, pp. 1465–1470, doi: 10.1109/IWCMC51323.2021.9498808.

W. Abdelghani, I. Amous, C. A. Zayani, F. Sèdes, and G. Roman-Jimenez, “Dynamic and scalable multi-level trust management model for Social Internet of Things,” J. Supercomput., vol. 78, no. 6, pp. 8137–8193, 2022, doi: 10.1007/s11227-021-04205-5.

B. Jafarian, N. Yazdani, and M. Sayad Haghighi, “Discrimination-aware trust management for social internet of things,” Comput. Networks, vol. 178, p. 107254, 2020, doi: 10.1016/j.comnet.2020.107254.

R. Mohan Das et al., “A novel deep learning-based approach for detecting attacks in social IoT,” Soft Comput., vol. 1, 2023, doi: 10.1007/s00500-023-08389-1.

N. Narang and S. Kar, “A hybrid trust management framework for a multi-service social IoT network,” Comput. Commun., vol. 171, pp. 61–79, 2021, doi: https://doi.org/10.1016/j.comcom.2021.02.015.

Y. Alghofaili and M. A. Rassam, “A Trust Management Model for IoT Devices and Services Based,” 2022.

C. Marche and M. Nitti, “Trust-Related Attacks and Their Detection: A Trust Management Model for the Social IoT,” IEEE Trans. Netw. Serv. Manag., vol. 18, no. 3, pp. 3297–3308, 2021, doi: 10.1109/TNSM.2020.3046906.

Downloads

Published

26.03.2024

How to Cite

Shimaz Khan Shaik. (2024). Trust Management Strategies in the Social Internet of Things: A Comprehensive Literature Review and Identification of Research Gaps. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 4077 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6211

Issue

Section

Research Article