A Review on Trust Management in the Social Internet of Things: Issues and Challenges

Main Article Content

Sunil Singh
Pawan K. Chaurasia
Manohar Lal

Abstract

In today's era, every electrical and electronic device is connected very intelligently. These electronic devices like sensors, RFIDs, actuators are becoming an important part of the structure. It is required to connect to the internet. Internet is used in every aspect of daily life. There are drastic changes in the usage of the most demanding and useful technology known as the Internet of Things (IoT). In this field, IoT has been shown one of the important which connect various physical objects with the internet with unique identification. Billions of objects are enabled with the internet and interconnected with each other to interface with Human-to-Machine or Machine-to-Machine to take decisions of data transaction without human involvement.
This internet enables devices connected to our social life which is terme as Social Internet of Things (SIoT). Hence we can say SIoT is an expansion IoT. People and things are connected with social networks which are known as Human to Things (H2T) interactions. Some of the devices are authentic and some are suspicious. The essential utilization of services within SIoT makes a secured network closely rely on origin of services (Service provider) and services accesed by end terminal (Service requester). Due to a lack of trust technologies, trust SIoT is still not so much popular in the market as demanding technology for the researcher and developer. Device owners are worried about sharing the data or receiving any information. Therefore, trust devices are required to identify in the connected network..Hence minimization of risk and uncertaintity within the system are analyse by the degree of trust for Particular Trust Management System(TMS).
Trust and Trustworthiness are novel fields in social networking environment clearlify by investigating the research article under SIoT. In present paper, our contribution starts with the introduction and then is further fragmented in three phases.The first phase represent the basic of trust and SIoT. Second phase categorizes the trust management solutions from the literature review. The third phase identifies and discuses issues, challenges and requirement in current scenario of SIoT and also depicts how developing trust and trustworthiness among social devices interaction as challenging task.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Singh, S., P. K. Chaurasia, and Manohar Lal. “A Review on Trust Management in the Social Internet of Things: Issues and Challenges”. Technix International Journal for Engineering Research, vol. 9, no. 6, June 2022, pp. 1-8, https://tijer.org/index.php/tijer/article/view/152.
Section
Research Articles

References

G. Kortuem, F. Kawsar, V. Sundramoorthy, and D. Fitton, “Smart objects as building blocks for the internet of things,” IEEE Internet Comput., vol. 14, no. 1, pp. 44–51, 2010, doi: 10.1109/MIC.2009.143.

L. E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H. W. Gellersen, “Smart-its friends: A technique for users to easily establish connections between smart artefacts,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 2201, pp. 116–122, 2001, doi: 10.1007/3-540-45427-6_10.

B. Jafarian, N. Yazdani, and M. Sayad Haghighi, “Discrimination-aware trust management for social internet of things,” Comput. Networks, vol. 178, no. April, 2020, doi: 10.1016/j.comnet.2020.107254.

A. Hameed and A. Alomary, “Security issues in IoT: A survey,” 2019 Int. Conf. Innov. Intell. Informatics, Comput. Technol. 3ICT 2019, pp. 1–5, 2019, doi: 10.1109/3ICT.2019.8910320.

W. Najib, S. Sulistyo, and Widyawan, “Survey on trust calculation methods in internet of things,” Procedia Comput. Sci., vol. 161, pp. 1300–1307, 2019, doi: 10.1016/j.procs.2019.11.245.

N. Gulati and P. D. Kaur, When things become friends: A semantic perspective on the social Internet of Things, vol. 670. Springer Singapore, 2019.

Z. Lin and L. Dong, “Clarifying Trust in Social Internet of Things,” IEEE Trans. Knowl. Data Eng., vol. 30, no. 2, pp. 234–248, 2018, doi: 10.1109/TKDE.2017.2762678.

W. Abdelghani, C. A. Zayani, I. Amous, and F. S. ` Edes, “Open Archive TOULOUSE Archive Ouverte (OATAO) Trust Management in Social Internet of Things: A Survey,” vol. 2016, no. September, 2016, doi: 10.1007/978-3-319-45234-0.

I. Ud Din, M. Guizani, B. S. Kim, S. Hassan, and M. K. Khan, “Trust management techniques for the internet of things: A survey,” IEEE Access, vol. 7, pp. 29763–29787, 2019, doi: 10.1109/ACCESS.2018.2880838.

S. Adali et al., “Measuring behavioral trust in social networks,” ISI 2010 - 2010 IEEE Int. Conf. Intell. Secur. Informatics Public Saf. Secur., pp. 150–152, 2010, doi: 10.1109/ISI.2010.5484757.

L. Atzori, A. Iera, G. Morabito, and M. Nitti, “The social internet of things (SIoT) - When social networks meet the internet of things: Concept, architecture and network characterization,” Comput. Networks, vol. 56, no. 16, pp. 3594–3608, 2012, doi: 10.1016/j.comnet.2012.07.010.

F. Bao and I. R. Chen, “Dynamic trust management for internet of things applications,” Self-IoT’12 - Proc. 2012 Int. Work. Self-Aware Internet Things, Co-located with ICAC’12, pp. 1–6, 2012, doi: 10.1145/2378023.2378025.

J. Chen, Z. Tian, X. Cui, L. Yin, and X. Wang, “Trust architecture and reputation evaluation for internet of things,” J. Ambient Intell. Humaniz. Comput., vol. 10, no. 8, pp. 3099–3107, 2019, doi: 10.1007/s12652-018-0887-z.

I. R. Chen, F. Bao, and J. Guo, “Trust-Based Service Management for Social Internet of Things Systems,” IEEE Trans. Dependable Secur. Comput., vol. 13, no. 6, pp. 684–696, 2016, doi: 10.1109/TDSC.2015.2420552.

F. Bao, I. R. Chen, and J. Guo, “Scalable, adaptive and survivable trust management for community of interest based internet of things systems,” Proc. - 2013 11th Int. Symp. Auton. Decentralized Syst. ISADS 2013, 2013, doi: 10.1109/ISADS.2013.6513398.

P. N. Mahalle, P. A. Thakre, N. R. Prasad, and R. Prasad, “A fuzzy approach to trust based access control in internet of things,” 2013 3rd Int. Conf. Wirel. Commun. Veh. Technol. Inf. Theory Aerosp. Electron. Syst. VITAE 2013 - Co-located with Glob. Wirel. Summit 2013, 2013, doi: 10.1109/VITAE.2013.6617083.

M. Panda and A. Abraham, “Development of a reliable trust management model in social internet of things,” Int. J. Trust Manag. Comput. Commun., vol. 2, no. 3, p. 229, 2014, doi: 10.1504/ijtmcc.2014.067305.

J. Guo, “Trust-based Service Management of Internet of Things Systems and Its Applications,” pp. 1–151, 2018, [Online]. Available: https://vtechworks.lib.vt.edu/bitstream/handle/10919/82854/Guo_J_D_2018.pdf?sequence=1.

Y. Ben Saied, A. Olivereau, D. Zeghlache, and M. Laurent, “Trust management system design for the Internet of Things: A context-aware and multi-service approach,” Comput. Secur., vol. 39, no. PART B, pp. 351–365, 2013, doi: 10.1016/j.cose.2013.09.001.

A. Khanfor, A. Hamrouni, H. Ghazzai, Y. Yang, and Y. Massoud, “A Trustworthy Recruitment Process for Spatial Mobile Crowdsourcing in Large-scale Social IoT,” 2020 IEEE Technol. Eng. Manag. Conf. TEMSCON 2020, 2020, doi: 10.1109/TEMSCON47658.2020.9140085.

W. Z. Khan, Q. U. A. Arshad, S. Hakak, M. K. Khan, and Saeed-Ur-Rehman, “Trust Management in Social Internet of Things: Architectures, Recent Advancements, and Future Challenges,” IEEE Internet Things J., vol. 8, no. 10, pp. 7768–7788, 2021, doi: 10.1109/JIOT.2020.3039296.

S. Ali, M. G. Kibria, M. A. Jarwar, H. K. Lee, and I. Chong, “A Model of Socially Connected Web Objects for IoT Applications,” Wirel. Commun. Mob. Comput., vol. 2018, 2018, doi: 10.1155/2018/6309509.

K. M. Alam, M. Saini, and A. El Saddik, “Toward social internet of vehicles: Concept, architecture, and applications,” IEEE Access, vol. 3, pp. 343–357, 2015, doi: 10.1109/ACCESS.2015.2416657.

J. Chen, Z. Tian, X. Cui, L. Yin, and X. Wang, “Trust architecture and reputation evaluation for internet of things,” J. Ambient Intell. Humaniz. Comput., vol. 10, no. 8, pp. 3099–3107, 2019, doi: 10.1007/s12652-018-0887-z.

H. Xiao, N. Sidhu, and B. Christianson, “Guarantor and reputation based trust model for Social Internet of Things,” IWCMC 2015 - 11th Int. Wirel. Commun. Mob. Comput. Conf., pp. 600–605, 2015, doi: 10.1109/IWCMC.2015.7289151.

A. M. Kowshalya and M. L. Valarmathi, “Trust Management in the Social Internet of Things,” Wirel. Pers. Commun., vol. 96, no. 2, pp. 2681–2691, 2017, doi: 10.1007/s11277-017-4319-8.

A. Meena Kowshalya and M. L. Valarmathi, “Dynamic trust management for secure communications in social internet of things (SIoT),” Sadhana - Academy Proceedings in Engineering Sciences, vol. 43, no. 9. 2018, doi: 10.1007/s12046-018-0885-z.

U. Jayasinghe, N. B. Truong, G. M. Lee, and T. W. Um, “RpR: A Trust Computation Model for Social Internet of Things,” Proc. - 13th IEEE Int. Conf. Ubiquitous Intell. Comput. 13th IEEE Int. Conf. Adv. Trust. Comput. 16th IEEE Int. Conf. Scalable Comput. Commun. IEEE Int., pp. 930–937, 2017, doi: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0146.

T. U. . L. G. M. Truong N.B.; Won, N. B. Truong, T.-W. Um, and G. M. Lee, “A reputation and knowledge based trust service platform for trustworthy Social Internet of Things,” Proc. 19th Int. Conf. Innov. Clouds, no. March, pp. 104–111, 2016.

O. Voutyras, P. Bourelos, D. Kyriazis, and T. Varvarigou, “An architecture supporting knowledge flow in social internet of things systems,” Int. Conf. Wirel. Mob. Comput. Netw. Commun., pp. 100–105, 2014, doi: 10.1109/WiMOB.2014.6962156.

O. Voutyras, P. Bourelos, S. Gogouvitis, D. Kyriazis, and T. Varvarigou, “Social monitoring and social analysis in internet of things virtual networks,” 2015 18th Int. Conf. Intell. Next Gener. Networks, ICIN 2015, pp. 244–251, 2015, doi: 10.1109/ICIN.2015.7073838.

A. M. Ortiz et al., “The cluster between Internet of Things and social networks?: review and research challenges To cite this version?: HAL Id?: hal-02284567 The Cluster Between Internet of Things and Social Networks?: Review and Research Challenges,” 2019.

I. R. Chen, J. Guo, and F. Bao, “Trust Management for SOA-Based IoT and Its Application to Service Composition,” IEEE Trans. Serv. Comput., vol. 9, no. 3, pp. 482–495, 2016, doi: 10.1109/TSC.2014.2365797.

W. Najib, S. Sulistyo, and Widyawan, “Survey on trust calculation methods in internet of things,” Procedia Comput. Sci., vol. 161, pp. 1300–1307, 2019, doi: 10.1016/j.procs.2019.11.245.

I. Y. Kim and O. De Weck, “Adaptive weighted sum method for multiobjective optimization,” Collect. Tech. Pap. - 10th AIAA/ISSMO Multidiscip. Anal. Optim. Conf., vol. 1, pp. 236–248, 2004, doi: 10.2514/6.2004-4322.

M. Beynon, B. Curry, and P. Morgan, “The Dempster-Shafer theory of evidence: An alternative approach to multicriteria decision modelling,” Omega, vol. 28, no. 1, pp. 37–50, 2000, doi: 10.1016/S0305-0483(99)00033-X.

G. Zacharia and P. Maes, “Trust Management Through Reputation,” Online, vol. 12, no. 1, pp. 881–907, 2000.

M. Tahajod, A. Iranmehr, and N. Khozooyi, “Trust management for