Abstract
The Internet of Things (IoT) integrates a large amount of everyday life devices from heterogeneous network environments, bringing a great challenge into security and reliability management. In order to cope with certain challenges posed by device capacity and the nature of IoT networks, a lightweight access control model is needed to resolve security and privacy issues. In this paper, we present Fuzzy logic based Trust-ABAC model, an access control model for the Internet of Things. Our model for the IoT is an improvement of our previous work Trust-ABAC [3] by a new Fuzzy logic-based model in which we consider an evaluation of trust based on recommendations and social relationship that can deal effectively with certain types of malicious behavior that intend to mislead other nodes. Results prove the performance of the proposed model and its capabilities to detect the collision and singular attacks with high precision.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Palattella, M.R., Dohler, M., Grieco, A., Rizzo, G., Torsner, J., Engel, T., Ladid, L.: Internet of things in the 5G era: enablers, architecture, and business models. IEEE J. Sel. Areas Commun. 34(3), 510–527 (2016)
Akpakwu, G.A., Silva, B.J., Hancke, G.P., Abu-Mahfouz, A.M.: A survey on 5G networks for the internet of things: communication technologies and challenges. IEEE Access 5(12), 3619–3647 (2017)
Ouechtati, H., Azzouna, N.B.: Trust-ABAC towards an access control system for the internet of things. In: International Conference on Green, Pervasive, and Cloud Computing, pp. 75–89. Springer, Cham (2017)
Li, F.-H., Su, M., Shi, G.-Z., et al.: Research status and development trends of access control model. Dianzi Xuebao (Acta Electronica Sinica) 40(4), 805–813 (2012)
Blackstock, M., Lea, R.: IoT interoperability: a hub-based approach. In: 2014 International Conference on the Internet of Things (IOT), pp. 79–84. IEEE (2014)
Lampson, B.W.: Protection. In: 5th Princeton Symposium on Information Sciences and Systems, vol. 8, pp. 18–24 (1974)
Sandhu, R.S.: Lattice-based access control models. IEEE Comput. 26, 9–19 (1993)
Sandhu, R.S., Coynek, E.J., Feinsteink, H.L., Youmank, C.E.: Role-based access control models. IEEE Comput. 29, 38–47 (1996)
Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10, 1–34 (2006)
Feng, F., Lin, C., Peng, D., Li, J.: A trust and context based access control model for distributed systems. In: The 10th IEEE International Conference on High Performance Computing and Communications, pp. 629–634 (2008)
Dan, N., Hua-Ji, S., Yuan, C., Jia-Hu, G.: Attribute based access control (ABAC)-based cross-domain access control in service-oriented architecture (SOA). In: Proceedings of the International Conference on Computer Science and Service System (CSSS 2012) (2012)
Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the social internet of things. IEEE Trans. Knowl. Data Eng. 26(5), 1253–1266 (2014)
Sicari, S., Rizzardi, A., Grieco, L.A., et al.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)
Saied, Y.B., Olivereau, A., Zeghlache, D., et al.: Trust management system design for the internet of things: a context-aware and multi-service approach. Comput. Secur. 39, 351–365 (2013)
Smari, W.W., Clemente, P., Lalande, J.-F.: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system. Future Gener. Comput. Syst. 31, 147–168 (2014)
Chen, D., Chang, G., Sun, D., et al.: Modeling access control for cyber-physical systems using reputation. Comput. Electric. Eng. 38(5), 1088–1101 (2012)
Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R.: A fuzzy approach to trust based access control in internet of things. In: 2013 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems (VITAE), pp. 1–5. IEEE (2013)
Armando, A., Bezzi, M., Di Cerbo, F., et al.: Balancing trust and risk in access control. In: OTM Confederated International Conferences on the Move to Meaningful Internet Systems, pp. 660–676. Springer, Cham (2015)
Xia, F., Yang, L.T., Wang, L., et al.: Internet of things. Int. J. Commun. Syst. 25(9), 1101–1102 (2012)
Douceur, J.R.: The sybil attack. In: International Workshop on Peer To Peer Systems. Springer, Berlin, Heidelberg (2002)
Bhuiyan, M.Z.A., Wu, J.: Collusion attack detection in networked systems. In: Proceedings of the 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (IEEE DASC 2016), p. 18 (2016)
Atzori, L., Iera, A., Morabito, G., et al.: The social internet of things (SIoT) when social networks meet the internet of things: concept, architecture and network characterization. Comput. Netw. 56(16), 3594–3608 (2012)
Gong, S.: A collaborative filtering recommendation algorithm based on user clustering and item clustering. JSW 5(7), 745–752 (2010)
Pham, M.C., Cao, Y., Klamma, R., et al.: A clustering approach for collaborative filtering recommendation using social network analysis. J. UCS 17(4), 583–604 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Ouechtati, H., Azzouna, N.B., Said, L.B. (2020). A Fuzzy Logic Based Trust-ABAC Model for the Internet of Things. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing, vol 926. Springer, Cham. https://doi.org/10.1007/978-3-030-15032-7_97
Download citation
DOI: https://doi.org/10.1007/978-3-030-15032-7_97
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15031-0
Online ISBN: 978-3-030-15032-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)