A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT)

被引:61
|
作者
Alshehri, Mohammad Dahman [1 ,2 ]
Hussain, Farookh Khadeer [1 ]
机构
[1] Univ Technol Sydney, Ctr Artificial Intelligence, Sch Software, Fac Engn & Informat Technol, Ultimo, NSW, Australia
[2] Taif Univ, Comp & Informat Technol Coll, Comp Sci Dept, At Taif, Saudi Arabia
关键词
Internet of things (IoT); Trust management; Cyber security; Protocol; Fuzzy logic; DESIGN;
D O I
10.1007/s00607-018-0685-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, the Internet of things (IoT) has received a lot of attention from both industry and academia. A reliable and secure IoT connection and communication is essential for the proper working of the IoT network as a whole. One of the ways to achieve robust security in an IoT network is to enable and build trusted communication among the things (nodes). In this area, the existing IoT literature faces many critical issues, such as the lack of intelligent cluster-based trust approaches for IoT networks and the detection of attacks on the IoT trust system from malicious nodes, such as bad service providers. The existing literature either does not address these issues or only addresses them partially. Our proposed solution can firstly detect on-off attacks using the proposed fuzzy-logic based approach, and it can detect contradictory behaviour attacks and other malicious nodes. Secondly, we develop a fuzzy logic-based approach to detect malicious nodes involved in bad service provisioning. Finally, to maintain the security of the IoT network, we develop a secure messaging system that enables secure communication between nodes. This messaging system uses hexadecimal values with a structure similar to serial communication. We carried out extensive experimentation under varying network sizes to validate the working of our proposed solution and also to test the efficiency of the proposed methods in relation to various types of malicious behavior. The experiment results demonstrate the effectiveness of our approach under various conditions.
引用
收藏
页码:791 / 818
页数:28
相关论文
共 50 条
  • [31] Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things
    Kouicem, Djamel Eddine
    Imine, Youcef
    Bouabdallah, Abdelmadjid
    Lakhlef, Hicham
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1292 - 1306
  • [32] FTM-IoMT: Fuzzy-Based Trust Management for Preventing Sybil Attacks in Internet of Medical Things
    Almogren, Ahmad
    Mohiuddin, Irfan
    Din, Ikram Ud
    Almajed, Hisham
    Guizani, Nadra
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4485 - 4497
  • [33] Protocol Security in the Industrial Internet of Things
    Dahlmanns, Markus
    Wehrle, Klaus
    [J]. PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [34] Security for the Internet of Things and the Bluetooth Protocol
    Fagua Arevalo, Rodrigo Alexander
    Salcedo Parra, Octavio Jose
    Sanchez Cespedes, Juan Manuel
    [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2018, 2018, 11251 : 74 - 79
  • [35] Advanced Security Framework for Internet of Things (IoT)
    Ali, Abid
    Mateen, Abdul
    Hanan, Abdul
    Amin, Farhan
    [J]. TECHNOLOGIES, 2022, 10 (03)
  • [36] Security Architechture Framework for Internet of Things (IoT)
    Obaidat, Muath
    Khodiaeva, Matluba
    Obeidat, Suhaib
    Salane, Douglas
    Holst, Jennifer
    [J]. 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 154 - 157
  • [37] Internet of Things (IoT): Taxonomy of Security Attacks
    Nawir, Mukrimah
    Amir, Amiza
    Yaakob, Naimah
    Lynn, Ong Bi
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN (ICED), 2016, : 321 - 326
  • [38] An Internet of Things (IoT) Security Assessment for Households
    Aiken, William
    Ryoo, Jungwoo
    Rizvi, Syed
    [J]. 2020 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2020), 2020, : 53 - 59
  • [39] Internet of Things (IoT): Security and Privacy Threats
    Shaikh, Eman
    Mohiuddin, Iman
    Manzoor, Ayisha
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [40] Security and Privacy Issues in Internet of Things (IoT)
    Masood, Muhammad Sarmad
    Bajaj, Kamini
    Rajab, Mohamad Michael
    [J]. 2018 4TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,