Deep Learning for Trust-Related Attacks Detection in Social Internet of Things

  • Mariam MasmoudiEmail author
  • Wafa Abdelghani
  • Ikram Amous
  • Florence Sèdes
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 41)


Social Internet of Things (SIoT) is a new paradigm where the Internet of Things (IoT) is merged with social networks, allowing objects to establish autonomous social relationships. However, face to this new paradigm, users remain suspicious. They fear the violation of their privacy and revelation of their personal information. Without reliable mechanisms to enhance trustworthy communications between nodes, SIoT will not reach sufficient popularity to be considered as a leading technology. Hence, trust management becomes a major challenge to ensure qualified services and guaranteed security.

Several works in the literature have tried to diagnose this problem. They proposed various trust evaluation models based on different features and aggregation methods, aiming to classify benign nodes of the SIoT network. However, related works did not allow to detect malicious nodes and couldn’t identify their types of attacks.

As a result, we suggest a new trust-evaluation model in a deep learning framework. This model permits to find out the type of trust-related attacks performed by malicious nodes, which will be isolated from the network in order to achieve a reliable environment. Based on authentic data, experimentation is able to prove our system performance.


Internet of Things (IoT) Social Internet of Things (SIoT) Trust-evaluation model Trust-related attacks Deep learning Multi-Layer Perceptron (MLP) 



This work was financially supported by the PHC Utique program of the French Ministry of Foreign Affairs and Ministry of higher education and research and the Tunisian Ministry of higher education and scientific research in the CMCU project number 18G1431.


  1. 1.
    Abdelghani, W., Zayani, C.A., Amous, I., Sèdes, F.: Trust evaluation model for attack detection in social internet of things. In: International Conference on Risks and Security of Internet and Systems. Springer (2018)Google Scholar
  2. 2.
    Ramanathan, A.: A Multi-level Trust Management Scheme for the Internet of Things. University of Nevada, Las Vegas (2015)Google Scholar
  3. 3.
    Chen, R., Bao, F., Guo, J.: Trust-based service management for social internet of things systems. IEEE Trans. Dependable Secur. Comput. 13(6), 684–696 (2016) CrossRefGoogle Scholar
  4. 4.
    LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436 (2015)CrossRefGoogle Scholar
  5. 5.
    Lin, Z., Dong, L.: Clarifying trust in social internet of things. IEEE Trans. Knowl. Data Eng. 30(2), 234–248 (2018)CrossRefGoogle Scholar
  6. 6.
    Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the social internet of things. IEEE Trans. Knowl. Data Eng. 26(5), 1253–1266 (2014)CrossRefGoogle Scholar
  7. 7.
    Truong, N.B., Um, T.W., Lee, G.M.: A reputation and knowledge based trust service platform for trustworthy social internet of things. In: Innovations in Clouds, Internet and Networks (ICIN), Paris, France (2016)Google Scholar
  8. 8.
    Bernabe, J.B., Ramos, J.L.H., Gomez, A.F.S.: TACIoT: multidimensional trust-aware access control system for the internet of things. Soft. Comput. 20(5), 1763–1779 (2016)CrossRefGoogle Scholar
  9. 9.
    Yu, Y., Jia, Z., Tao, W., Xue, B., Lee, C.: An efficient trust evaluation scheme for node behavior detection in the internet of things. Wirel. Pers. Commun. 93(2), 571–587 (2017)CrossRefGoogle Scholar
  10. 10.
    Bao, F., Chen, R., Guo, J.: Scalable, adaptive and survivable trust management for community of interest based internet of things systems. In: IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS). IEEE (2013)Google Scholar
  11. 11.
    Abdelghani, W., Zayani, C.A., Amous, I., Sèdes, F.: Trust management in social internet of things: a survey. In: Conference on e-Business, e-Services and e-Society, pp. 430–441. Springer, Cham (2016)Google Scholar
  12. 12.
    Jayasinghe, U., Lee, G.M., Um, T.W., Shi, Q.: Machine learning based trust computational model for IoT services. IEEE Trans. Sustain. Comput. 4, 39–52 (2018)CrossRefGoogle Scholar
  13. 13.
    Gambetta, D.: Can we trust. Trust.: Mak. Break. Coop. Relat. 13, 213–237 (2000)Google Scholar
  14. 14.
    Luhmann, N.: Trust and Power Chichester. Wiley, Hoboken (1979)Google Scholar
  15. 15.
    Kalaï, A., Zayani, C.A., Amous, I., Abdelghani, W., Sèdes, F.: Social collaborative service recommendation approach based on user’s trust and domain-specific expertise. Future Gener. Comput. Syst. 80, 355–367 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Mariam Masmoudi
    • 1
    Email author
  • Wafa Abdelghani
    • 2
  • Ikram Amous
    • 1
  • Florence Sèdes
    • 2
  1. 1.MIRACL LaboratorySfax UniversitySfaxTunisia
  2. 2.IRIT LaboratoryPaul Sabatier UniversityToulouseFrance

Personalised recommendations