Deep Learning for Trust-Related Attacks Detection in Social Internet of Things
Social Internet of Things (SIoT) is a new paradigm where the Internet of Things (IoT) is merged with social networks, allowing objects to establish autonomous social relationships. However, face to this new paradigm, users remain suspicious. They fear the violation of their privacy and revelation of their personal information. Without reliable mechanisms to enhance trustworthy communications between nodes, SIoT will not reach sufficient popularity to be considered as a leading technology. Hence, trust management becomes a major challenge to ensure qualified services and guaranteed security.
Several works in the literature have tried to diagnose this problem. They proposed various trust evaluation models based on different features and aggregation methods, aiming to classify benign nodes of the SIoT network. However, related works did not allow to detect malicious nodes and couldn’t identify their types of attacks.
As a result, we suggest a new trust-evaluation model in a deep learning framework. This model permits to find out the type of trust-related attacks performed by malicious nodes, which will be isolated from the network in order to achieve a reliable environment. Based on authentic data, experimentation is able to prove our system performance.
KeywordsInternet of Things (IoT) Social Internet of Things (SIoT) Trust-evaluation model Trust-related attacks Deep learning Multi-Layer Perceptron (MLP)
This work was financially supported by the PHC Utique program of the French Ministry of Foreign Affairs and Ministry of higher education and research and the Tunisian Ministry of higher education and scientific research in the CMCU project number 18G1431.
- 1.Abdelghani, W., Zayani, C.A., Amous, I., Sèdes, F.: Trust evaluation model for attack detection in social internet of things. In: International Conference on Risks and Security of Internet and Systems. Springer (2018)Google Scholar
- 2.Ramanathan, A.: A Multi-level Trust Management Scheme for the Internet of Things. University of Nevada, Las Vegas (2015)Google Scholar
- 7.Truong, N.B., Um, T.W., Lee, G.M.: A reputation and knowledge based trust service platform for trustworthy social internet of things. In: Innovations in Clouds, Internet and Networks (ICIN), Paris, France (2016)Google Scholar
- 10.Bao, F., Chen, R., Guo, J.: Scalable, adaptive and survivable trust management for community of interest based internet of things systems. In: IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS). IEEE (2013)Google Scholar
- 11.Abdelghani, W., Zayani, C.A., Amous, I., Sèdes, F.: Trust management in social internet of things: a survey. In: Conference on e-Business, e-Services and e-Society, pp. 430–441. Springer, Cham (2016)Google Scholar
- 13.Gambetta, D.: Can we trust. Trust.: Mak. Break. Coop. Relat. 13, 213–237 (2000)Google Scholar
- 14.Luhmann, N.: Trust and Power Chichester. Wiley, Hoboken (1979)Google Scholar