A Survey of Trust Management Schemes for Social Internet of Things

  • Simon Wewoliamo Kuseh Department of Computer Engineering, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana
  • Henry Nunoo-Mensah Department of Computer Engineering, Kwame Nkrumah University of Science and Technology, Kumasi
  • Griffith Selorm Klogo Department of Computer Engineering, Kwame Nkrumah University of Science and Technology, Kumasi
  • Eric Tutu Tchao Department of Computer Engineering, Kwame Nkrumah University of Science and Technology, Kumasi
Abstract views: 313 , PDF downloads: 281
Keywords: Internet of Things, IoT, Social Internet of Things, SIoT, Trust

Abstract

Social Internet of Things (SIoT) involves integrating social networking concepts in the Internet of Things (IoT) to enhance social interactions among IoT objects and users. SIoT is envisaged to provide adequate service selection and discovery. Trust is an essential factor whenever social concepts are discussed in communication networks. Trust usually leads to a mutual relationship between two parties (i.e., the trustor and trustee) where they both enjoy mutual benefits. For secure social relationships, Trust management (TM) is a crucial feature of SIoT. The primary aim of this work is to provide a comprehensive review of trust management proposals/schemes available for SIoT. Four main trust calculation algorithms for trust management were selected for this review, and they were examined in detail. The IEEE Xplore, Scopus, ResearchGate, and Google Scholar databases were searched for articles containing the terms "Trust aggregation approaches in IoT", and "Trust computation in SIoT" with a particular emphasis on works published between 2018 and 2021. The paper also discussed the pros and cons of each TM technique, trust metrics/features, contributions, and limitations of the state-of-the-art SIoT TM proposals in the literature. The paper further provides open issues and possible research directions for entry-level researchers in the domain of SIoT.

References

[1] S. G. H. Soumyalatha, "Study of iot: Understanding iot architecture, applications, issues and challenges," InternationalJournal of Advanced Networking and Applications (IJANA), 201.
[2] K. L Lueth Top 10 IoT applications in 2020: Access on :20 May,2021 Available: https://iot-analytics.com/top-10-iot-applications-in-2020/ July 8, 2020 2020.
[3] A. Rehman, A. Paul, M. A. Yaqub, and M. M. U. Rathore, "Trustworthy intelligent industrial monitoring architecture for early event detection by exploiting social iot," in Proceedings of the 35th Annual ACM Symposium on Applied Computing, pp. 2163–2169, 2020.
[4] J. Y. Kinza Sarwar, Sira Yongchareon, "A brief survey on iot privacy: Taxonomy, issues and future trends," Springer Nature Switzerland AG 2019, p. 208–219, 2019.
[5] J. Lima. (2016). Could consumer distrust kill IoT? Why calls for security, privacy and transparency should not be ignored. Available: https://www.cbronline.com/internet-of-things/could-consumer-distrust-kill-iot-why-calls-for-security-privacy-and-transparency-should-not-be-ignored-4859978/.
[6] L. Atzori, A. Iera, G. Morabito, and M. J. C. n. Nitti, "The social internet of things (siot)–when social networks meet the internet of things: Concept, architecture and network characterization," vol. 56, no. 16, pp. 3594–3608, 2012.
[7] M. Frustaci, P. Pace, G. Aloi, and G. Fortino, "Evaluating critical security issues of the iot world: Present and future challenges," IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2483–2495, 2018.
[8] M. Rashmi and C. V. Raj, A review on trust models of social Internet of Things, pp. 203–209. Springer, 2019.
[9] H. Nunoo-Mensah, K. O. Boateng, and J. D. Gadze, "The adoption of socio-and bio-inspired algorithms for trust models in wireless sensor networks: A survey," International Journal of Communication Systems, vol. 31, no. 7, p. e3444, 2018.
[10] V. U. Rani and K. S. Sundaram, "Review of trust models in wireless sensor networks," Int. J. Comput. Inf. Syst. Control Eng, vol. 8, pp. 371–377, 2014.
[11] H. Nunoo-Mensah, K. O. Boateng, and J. D. Gadze, "Pstrm: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks," Peer-to-Peer Networking and Applications, vol. 13, no. 5, pp. 1505–1525, 2020.
[12] M. J. Aslam, S. Din, J. J. Rodrigues, A. Ahmad, and G. S. J. I. A. Choi, "Defining service-oriented trust assessment for social internet of things," vol. 8, pp. 206459–206473, 2020.
[13] E. M. Maximilien and M. P. Singh, "Toward autonomic web services trust and selection," in Proceedings of the 2nd international conference on Service oriented computing, pp. 212–221.
[14] S. Sagar, A. Mahmood, Q. Z. Sheng, and W. E. Zhang, "Trust computational heuristic for social internet of things: A machine learning-based approach," in ICC 2020-2020 IEEE International Conference on Communications (ICC), pp. 1–6, IEEE.
[15] W. Abdelghani, C. A. Zayani, I. Amous, and F. Sedes, "Trust` management in social internet of things: a survey," in Conference on e-Business, e-Services and e-Society, pp. 430–441, Springer, 2016.
[16] R. K. Chahal, N. Kumar, and S. Batra, "Trust management in social internet of things: A taxonomy, open issues, and challenges," Computer Communications, vol. 150, pp. 13–46, 2020.
[17] R. Iqbal, T. A. Butt, M. Afzaal, and K. Salah, "Trust management in social internet of vehicles: factors, challenges, blockchain, and fog solutions," International Journal of Distributed Sensor Networks, vol. 15, no. 1, p. 1550147719825820, 2019.
[18] W. Z. Khan, S. Hakak, M. K. Khan, et al., "Trust management in social internet of things: Architectures, recent advancements, and future challenges," IEEE Internet of Things Journal, vol. 8, no. 10, pp. 7768–7788, 2020.
[19] S. Ali, M. G. Kibria, M. A. Jarwar, H. K. Lee, I. J. W. C. Chong, and M. Computing, "A model of socially connected web objects for iot applications," vol. 2018, 2018.
[20] J. Shen, T. Zhou, F. Wei, X. Sun, and Y. J. I. I. o. t. J. Xiang, "Privacypreserving and lightweight key agreement protocol for v2g in the social internet of things," vol. 5, no. 4, pp. 2526–2536, 2017.
[21] J. S. Kumar, G. Sivasankar, and S. S. Nidhyananthan, An artificial intelligence approach for enhancing trust between social IoT devices in a network, pp. 183–196. Springer, 2020.
[22] L. Atzori, A. Iera, G. Morabito, and M. J. C. n. Nitti, "The social internet of things (siot)–when social networks meet the internet of things: Concept, architecture and network characterization," vol. 56, no. 16, pp. 3594–3608, 2012.
[23] L. Atzori, A. Iera, and G. J. I. c. l. Morabito, "Siot: Giving a social structure to the internet of things," vol. 15, no. 11, pp. 1193–1195, 2011.
[24] W. Z. Khan, M. Y. Aalsalem, M. K. Khan, and Q. Arshad,
"When social objects collaborate: Concepts, processing elements, attacks and challenges," Computers & Electrical Engineering, vol. 58, pp. 397–411, 2017.
[25] A. Jøsang, C. Keser, and T. Dimitrakos, "Can we manage trust?", in International Conference on Trust Management, pp. 93–107, Springer, 2005.
[26] J. Guo and R. Chen, "A classification of trust computation models for service-oriented internet of things systems," in 2015 IEEE International Conference on Services Computing, pp. 324–331, IEEE, 2015.
[27] A. Rezvanian, B. Moradabadi, M. Ghavipour, M. M. D. Khomami, and M. R. Meybodi, "Social trust management," in Learning Automata Approach for Social Networks, pp. 241–279, Springer, 2019.
[28] W. Abdelghani, C. A. Zayani, I. Amous, and F. Sedes, "Trust` management in social internet of things: a survey," in Conference on e-Business, e-Services and e-Society, pp. 430–441, Springer, 2016.
[29] J. R. S. C. Mateo, "Weighted sum method and weighted product method," in Multi criteria analysis in the renewable energy industry, pp. 19–22, Springer, 2012.
[30] S. Sagar, A. Mahmood, Q. Z. Sheng, M. Zaib, and W. E. Zhang, "Towards a machine learning-driven trust evaluation model for social internet of things: A time-aware approach," arXiv preprint arXiv:2102.10998, 2021.
[31] T. A. Butt, R. Iqbal, K. Salah, M. Aloqaily, and Y. Jararweh, "Privacy management in social internet of vehicles: review, challenges and blockchain based solutions," IEEE Access, vol. 7, pp. 79694– 79713, 2019.
[32] U. Jayasinghe, G. M. Lee, T.-W. Um, and Q. Shi, "Machine learning based trust computational model for iot services," IEEE Transactions on Sustainable Computing, vol. 4, no. 1, pp. 39–52, 2018.
[33] A. Khanfor, A. Hamrouni, H. Ghazzai, Y. Yang, and Y. Massoud, "A trustworthy recruitment process for spatial mobile crowdsourcing in large-scale social iot," in 2020 IEEE Technology & Engineering Management Conference (TEMSCON), pp. 1–6, IEEE, 2020.
[34] A. U. Rehman, A. Jiang, A. Rehman, and A. Paul, "Weighted based trustworthiness ranking in social internet of things by using soft set theory," in 2019 IEEE 5th International Conference on Computer and Communications (ICCC), pp. 1644–1648, IEEE, 2019.
[35] S. Babar, P. Mahalle, et al., "Trust management approach for detection of malicious devices in siot," Tehnicˇki glasnik, vol. 15, no. 1, pp. 43–50, 2021.
[36] O. A. Oualhaj, A. Mohamed, M. Guizani, and A. Erbad, "Blockchain based decentralized trust management framework," in 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 2210–2215, IEEE, 2020.
[37] M. Masmoudi, W. Abdelghani, I. Amous, and F. Sedes, "Deep` learning for trust-related attacks detection in social internet of things," in International Conference on e-Business Engineering, pp. 389–404, Springer, 2019.
[38] Y. He, G. Han, J. Jiang, H. Wang, and M. Martinez-Garcia, "A trust update mechanism based on reinforcement learning in underwater acoustic sensor networks," IEEE Transactions on Mobile Computing, 2020.
[39] N. B. Truong, G. M. Lee, T.-W. Um, and M. Mackay, "Trust evaluation mechanism for user recruitment in mobile crowd-sensing in the internet of things," IEEE Transactions on Information Forensics and Security, vol. 14, no. 10, pp. 2705–2719, 2019.
[40] A. A. Adewuyi, H. Cheng, Q. Shi, J. Cao, A. MacDermott, and' X. Wang, "Ctrust: A dynamic trust model for collaborative applications in the internet of things," IEEE Internet of Things Journal, vol. 6, no. 3, pp. 5432–5445, 2019.
[41] S. Sagar, A. Mahmood, J. Kumar, and Q. Z. Sheng, "A time-aware similarity-based trust computational model for social internet of things," in GLOBECOM 2020-2020 IEEE Global Communications Conference, pp. 1–6, IEEE.
[42] C. Sharma, M. A. Alam, and A. Khalique, "A novel trust establishment model in siot network based on sociological aspects of users in social networking services," Indian Journal of Science and Technology, vol. 12, p. 17, 2019.
[43] U. S. Premarathne, "Residual energy aware trust computation method for social internet of things," in 2019 14th Conference on Industrial and Information Systems (ICIIS), pp. 470–475, IEEE, 2020.
[44] A. Mahmood, B. Butler, W. E. Zhang, Q. Z. Sheng, and S. A. Siddiqui, "A hybrid trust management heuristic for vanets," in
2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 748–752, IEEE, 2019.
[45] L. Wei, J. Wu, C. Long, and B. Li, "On designing context-aware trust model and service delegation for social internet of things," IEEE Internet of Things Journal, 2020.
[46] B. Jafarian, N. Yazdani, and M. S. Haghighi, "Discriminationaware trust management for social internet of things," Computer Networks, vol. 178, p. 107254, 2020.
[47] H. Xia, F. Xiao, S.-s. Zhang, C.-q. Hu, and X.-z. Cheng, "Trustworthiness inference framework in the social internet of things: A context-aware approach," in IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 838–846, IEEE, 2019.
[48] A. U. Rehman, R. A. Naqvi, A. Rehman, A. Paul, M. T. Sadiq, and D. Hussain, "A trustworthy siot aware mechanism as an enabler for citizen services in smart cities," Electronics, vol. 9, no. 6, p. 918, 2020.
[49] C. Boudagdigue, A. Benslimane, A. Kobbane, and J. Liu, "Trust management in industrial internet of things," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3667–3682, 2020.
[50] K. A. Awan, I. Ud. Din, A. Almogren, and H.Almajed, "Agritrust—a trust management approach for smart agriculture in cloud-based internet of agriculture things," Sensors, vol. 20, no. 21, p. 6174, 2020.
[51] M. Khani, Y. Wang, M. A. Orgun, and F. Zhu, "Context-aware trustworthy service evaluation in social internet of things," in International Conference on Service-Oriented Computing, pp. 129–145, Springer, 2018.
[52] W. Abdelghani, C. A. Zayani, I. Amous, and F. Sedes, "Trust` evaluation model for attack detection in social internet of things," in International Conference on Risks and Security of Internet and Systems, pp. 48–64, Springer, 2018.
[53] B. Tang, H. Kang, J. Fan, Q. Li, and R. Sandhu, "Iot passport: A blockchain-based trust framework for collaborative internet-ofthings," in Proceedings of the 24th ACM symposium on access control models and technologies, pp. 83–92, 2019.
[54] A. M. Kowshalya and M. Valarmathi, "Dynamic trust management for secure communications in social internet of things (siot)," Sa¯dhana¯, vol. 43, no. 9, pp. 1–8, 2018.
Published
2022-06-09
How to Cite
Simon Wewoliamo Kuseh, Henry Nunoo-Mensah, Griffith Selorm Klogo, & Eric Tutu Tchao. (2022). A Survey of Trust Management Schemes for Social Internet of Things. Inform : Jurnal Ilmiah Bidang Teknologi Informasi Dan Komunikasi, 7(1), 48-58. https://doi.org/10.25139/inform.v7i1.4567
Section
Articles

Most read articles by the same author(s)