Abstract
In the recent year, Internet of Things (IoT) has been adopted in several real-world applications such as smart transportation, smart city, retail, agriculture, smart factory, etc. to make human life more reliable. The integration of social networking concepts into the IoT led to the rise of a new paradigm: the Social Internet of Things (SIoT). In the SIoT environment, the objects are capable of establishing in an autonomous way many social relationships anywhere and anytime with other trusted objects. However, in such environment, objects may provide dishonest recommendations due to malicious reasons such as bad mouthing, ballot stuffing, random opinion, etc. In order to cater these challenges, we propose a new fuzzy logic-based model to filter dishonest recommendations and estimate their trust level based on (1) their values and sending time and the place coordinates and (2) the social relationship parameters of the recommenders. Results prove that our proposed approach is able to detect 100% of the fake Sybil attack and achieves 100% of Recognition Proportion, Sensitivity, Specificity, Accuracy and F1 score and gets 0% of False Negative and False Positive Proportions in presence of up to 90% dishonest recommendations.
Similar content being viewed by others
References
Abdelghani W, Zayani CA, Amous I, Sèdes F (2016) Trust management in social internet of things: a survey. In: Conference on e-Business, e-Services and e-Society. Springer, pp 430–441. https://doi.org/10.1007/978-3-319-45234-0_39
Abderrahim OB, Elhedhili MH, Saidane L (2016) Dtms-iot: a dirichlet-based trust management system mitigating on-off attacks and dishonest recommendations for the internet of things. In: 2016 IEEE/ACS 13th international conference of computer systems and applications (AICCSA), IEEE, pp 1–8. https://doi.org/10.1109/AICCSA.2016.7945691
Atzori L, Iera A, Morabito G, Nitti M (2012) The social internet of things (siot)-when social networks meet the internet of things: Concept, architecture and network characterization. Comput Netw 56(16):3594–3608. https://doi.org/10.1016/j.comnet.2012.07.010
Baldwin JF, Karale SB (2003) Asymmetric triangular fuzzy sets for classification models. In: International conference on knowledge-based and intelligent information and engineering systems, Springer, pp 364–370. https://doi.org/10.1007/978-3-540-45224-9_51
Banković Z, Vallejo JC, Fraga D, Moya JM (2011) Detecting bad-mouthing attacks on reputation systems using self-organizing maps. In: Computational intelligence in security for information systems, pp 9–16. https://doi.org/10.1007/978-3-642-21323-6_2
Bao F, Chen IR (2012) Dynamic trust management for internet of things applications. In: Proceedings of the 2012 international workshop on Self-aware internet of things, pp 1–6. https://doi.org/10.1145/2378023.2378025
Bergmann R, Ludbrook J, Spooren WP (2000) Different outcomes of the wilcoxon–mann–whitney test from different statistics packages. Am Stat 54(1):72–77. https://doi.org/10.1080/00031305.2000.10474513
Brozovsky L, Petricek V (2007) Recommender system for online dating service. In: Proceedings of Conference Znalosti 2007, VSB, Ostrava. http://www.occamslab.com/petricek/papers/dating/brozovsky07recommender.pdf
Cerrillo C, Barandika G, Igartua A, Areitioaurtena O, Mendoza G (2017) Key challenges for nanotechnology: standardization of ecotoxicity testing. J Enviro Sci Heal C 35(2):104–126. https://doi.org/10.1080/10590501.2017.1298361
Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) Trm-iot: a trust management model based on fuzzy reputation for internet of things. Comut Sci Inf Syst 8(4):1207–1228. https://doi.org/10.2298/CSIS110303056C
Chen JM, Li TT, Panneerselvam J (2018) Tmec: a trust management based on evidence combination on attack-resistant and collaborative internet of vehicles. IEEE Access 7:148913–148922. https://doi.org/10.1109/ACCESS.2018.2876153
Chen R, Guo J, Bao F (2014) Trust management for soa-based iot and its application to service composition. IEEE Trans Serv Comput 9(3):482–495. https://doi.org/10.1109/TSC.2014.2365797
Chen Z, Ling R, Huang CM, Zhu X (2016) A scheme of access service recommendation for the social internet of things. Int J Commun Syst 29(4):694–706. https://doi.org/10.1002/dac.2930
Cho E, Myers SA, Leskovec J (2011) Friendship and mobility: user movement in location-based social networks. In: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 1082–1090. https://doi.org/10.1145/2020408.2020579
Das R, Singh M, Majumder K (2019) Sgsqot: A community-based trust management scheme in internet of things. In: Proceedings of international ethical hacking conference 2018, Springer, pp 209–222. https://doi.org/10.1007/978-981-13-1544-2_18
Derrac J, García S, Molina D, Herrera F (2011) A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm Evol Comput 1(1):3–18. https://doi.org/10.1109/ICRAIE.2014.6909184
Douceur JR (2002) The sybil attack. In: International workshop on peer-to-peer systems, Springer, pp 251–260. https://doi.org/10.1007/3-540-45748-8_24
Dubois DJ (1980) Fuzzy sets and systems: theory and applications, vol 144. Academic press, Hoboken. https://doi.org/10.2307/2581310
Hakim A, Amirat A, Oussalah MC (2020) Non-intrusive contextual dynamic reconfiguration of ambient intelligent iot systems. J Ambient Intell Human Comput 11(4):1365–1376. https://doi.org/10.1002/dac.2930
Kurniasih D, Jasmi KA, Basiron B, Huda M, Maseleno A (2018) The uses of fuzzy logic method for finding agriculture and livestock value of potential village. Int J Eng Technol 7(3):1091–1095. https://doi.org/10.14419/ijet.v7i3.11984
Lachenbruch PA (1989) Statistical power analysis for the behavioral sciences. J Am Stat Assoc 84(408):1096–1097
Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: International conference on wireless communications, vehicular technology, information theory and aerospace and electronic systems, IEEE, pp 1–5. https://doi.org/10.1109/VITAE.2013.6617083
Mehta R, Parmar M (2018) Trust based mechanism for securing iot routing protocol rpl against wormhole&grayhole attacks. In: 2018 3rd International conference for convergence in technology (I2CT), IEEE, pp 1–6. https://doi.org/10.1109/I2CT.2018.8529426
Narayanan SJ, Paramasivam I, Bhatt RB (2017) On the estimation of optimal number of clusters for the induction of fuzzy decision trees. Int J Data Sci 2(3):221–245. https://doi.org/10.1504/IJDS.2017.086255
Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26(5):1253–1266. https://doi.org/10.1109/TKDE.2013.105
Ouechtati H, Azzouna NB, Said LB (2019) A fuzzy logic based trust-abac model for the internet of things. In: International conference on advanced information networking and applications, Springer, pp 1157–1168. https://doi.org/10.1007/978-3-030-15032-7_97
Palattella MR, Dohler M, Grieco A, Rizzo G, Torsner J, Engel T, Ladid L (2016) Internet of things in the 5g era: enablers, architecture, and business models. IEEE J Sel Areas Comm 34(3):510–527. https://doi.org/10.1109/JSAC.2016.2525418
Park JH, Yen NY (2018) Advanced algorithms and applications based on iot for the smart devices. J Ambient Intell Human Comput 9:085–1087. https://doi.org/10.1007/s12652-018-0715-5
Quej VH, Almorox J, Arnaldo JA, Saito L (2017) Anfis, svm and ann soft-computing techniques to estimate daily global solar radiation in a warm sub-humid environment. J Atmos Sol-Terr Phys 155:62–70. https://doi.org/10.1504/IJDS.2017.086255
Saied YB, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the internet of things: a context-aware and multi-service approach. Comput Secur 39:351–365. https://doi.org/10.1016/j.cose.2013.09.001
Shabut AM, Dahal KP, Bista SK, Awan IU (2014) Recommendation based trust model with an effective defence scheme for manets. IEEE Trans Mobile Comput 14(10):2101–2115. https://doi.org/10.1109/TMC.2014.2374154
Shaikh RA, Alzahrani AS (2014) Intrusion-aware trust model for vehicular ad hoc networks. Sec Commun Netw 7(11):1652–1669. https://doi.org/10.1002/sec.862
Sun Y, Han Z, Liu KR (2008) Defense of trust management vulnerabilities in distributed networks. IEEE Commun Mag 46(2):112–119. https://doi.org/10.1109/MCOM.2008.4473092
Talbi S, Bouabdallah A (2020) Interest-based trust management scheme for social internet of things. J Ambient Intell Human Comput 11(3):1129–1140. https://doi.org/10.1007/s12652-019-01256-8
Ullah Z, Islam MH, Khan AA, Sarwar S (2016) Filtering dishonest trust recommendations in trust management systems in mobile ad hoc networks. Int J Commun Netw Inf Secur 8(1):18
Yang L, Jones BF, Yang SH (2007) A fuzzy multi-objective programming for optimization of fire station locations through genetic algorithms. Eur J Oper Res 181(2):903–915. https://doi.org/10.1016/j.ejor.2006.07.003
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ouechtati, H., Nadia, B.A. & Lamjed, B.S. A fuzzy logic-based model for filtering dishonest recommendations in the Social Internet of Things. J Ambient Intell Human Comput 14, 6181–6200 (2023). https://doi.org/10.1007/s12652-021-03127-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-021-03127-7