A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT)

被引:0
作者
Mohammad Dahman Alshehri
Farookh Khadeer Hussain
机构
[1] University of Technology Sydney,Centre for Artificial Intelligence, School of Software, Faculty of Engineering and Information Technology
[2] Taif University,Computer Science Department, Computers and Information Technology College
来源
Computing | 2019年 / 101卷
关键词
Internet of things (IoT); Trust management; Cyber security; Protocol; Fuzzy logic; 68 Computer Science;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, the Internet of things (IoT) has received a lot of attention from both industry and academia. A reliable and secure IoT connection and communication is essential for the proper working of the IoT network as a whole. One of the ways to achieve robust security in an IoT network is to enable and build trusted communication among the things (nodes). In this area, the existing IoT literature faces many critical issues, such as the lack of intelligent cluster-based trust approaches for IoT networks and the detection of attacks on the IoT trust system from malicious nodes, such as bad service providers. The existing literature either does not address these issues or only addresses them partially. Our proposed solution can firstly detect on-off attacks using the proposed fuzzy-logic based approach, and it can detect contradictory behaviour attacks and other malicious nodes. Secondly, we develop a fuzzy logic-based approach to detect malicious nodes involved in bad service provisioning. Finally, to maintain the security of the IoT network, we develop a secure messaging system that enables secure communication between nodes. This messaging system uses hexadecimal values with a structure similar to serial communication. We carried out extensive experimentation under varying network sizes to validate the working of our proposed solution and also to test the efficiency of the proposed methods in relation to various types of malicious behavior. The experiment results demonstrate the effectiveness of our approach under various conditions.
引用
收藏
页码:791 / 818
页数:27
相关论文
共 82 条
[1]  
Ahmed A(2015)TERP: a trust and energy aware routing protocol for wireless sensor network IEEE Sens J 15 6962-6972
[2]  
Bakar KA(2015)Internet of things: a survey on enabling technologies, protocols, and applications IEEE Commun Surv Tutor 17 2347-2376
[3]  
Channa MI(2017)Using trust to detect denial of service attacks in the internet of things over MANETs Int J Space-Based Situated Comput 7 43-56
[4]  
Haseeb K(2018)Internet of things: a survey on the security of IoT frameworks J Inf Secur Appl 38 8-27
[5]  
Khan AW(2017)Classification extension based on IoT-big data analytic for smart environment monitoring and analytic in real-time system Int J Space-Based Situated Comput 7 82-93
[6]  
Al-Fuqaha A(2015)Security challenges in the internet of things Int J Space-Based Situated Comput 5 141-149
[7]  
Guizani M(2011)TRM-IoT: a trust management model based on fuzzy reputation for internet of things Comput Sci Inf Syst 8 1207-1228
[8]  
Mohammadi M(2017)A security routing protocol based on convergence degree and trust Int J Grid Utility Comput 8 38-45
[9]  
Aledhari M(2015)Security for the internet of things: a survey of existing protocols and open research issues IEEE Commun Surv Tutor 17 1294-1312
[10]  
Ayyash M(2014)Fr trust: a fuzzy reputation-based model for trust management in semantic p2p grids Int J Grid Util Comput 6 57-66