Skip to main content

A Fuzzy Logic Based Trust-ABAC Model for the Internet of Things

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2019)

Abstract

The Internet of Things (IoT) integrates a large amount of everyday life devices from heterogeneous network environments, bringing a great challenge into security and reliability management. In order to cope with certain challenges posed by device capacity and the nature of IoT networks, a lightweight access control model is needed to resolve security and privacy issues. In this paper, we present Fuzzy logic based Trust-ABAC model, an access control model for the Internet of Things. Our model for the IoT is an improvement of our previous work Trust-ABAC [3] by a new Fuzzy logic-based model in which we consider an evaluation of trust based on recommendations and social relationship that can deal effectively with certain types of malicious behavior that intend to mislead other nodes. Results prove the performance of the proposed model and its capabilities to detect the collision and singular attacks with high precision.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Palattella, M.R., Dohler, M., Grieco, A., Rizzo, G., Torsner, J., Engel, T., Ladid, L.: Internet of things in the 5G era: enablers, architecture, and business models. IEEE J. Sel. Areas Commun. 34(3), 510–527 (2016)

    Article  Google Scholar 

  2. Akpakwu, G.A., Silva, B.J., Hancke, G.P., Abu-Mahfouz, A.M.: A survey on 5G networks for the internet of things: communication technologies and challenges. IEEE Access 5(12), 3619–3647 (2017)

    Google Scholar 

  3. Ouechtati, H., Azzouna, N.B.: Trust-ABAC towards an access control system for the internet of things. In: International Conference on Green, Pervasive, and Cloud Computing, pp. 75–89. Springer, Cham (2017)

    Google Scholar 

  4. Li, F.-H., Su, M., Shi, G.-Z., et al.: Research status and development trends of access control model. Dianzi Xuebao (Acta Electronica Sinica) 40(4), 805–813 (2012)

    Google Scholar 

  5. Blackstock, M., Lea, R.: IoT interoperability: a hub-based approach. In: 2014 International Conference on the Internet of Things (IOT), pp. 79–84. IEEE (2014)

    Google Scholar 

  6. Lampson, B.W.: Protection. In: 5th Princeton Symposium on Information Sciences and Systems, vol. 8, pp. 18–24 (1974)

    Google Scholar 

  7. Sandhu, R.S.: Lattice-based access control models. IEEE Comput. 26, 9–19 (1993)

    Article  Google Scholar 

  8. Sandhu, R.S., Coynek, E.J., Feinsteink, H.L., Youmank, C.E.: Role-based access control models. IEEE Comput. 29, 38–47 (1996)

    Article  Google Scholar 

  9. Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10, 1–34 (2006)

    Article  Google Scholar 

  10. Feng, F., Lin, C., Peng, D., Li, J.: A trust and context based access control model for distributed systems. In: The 10th IEEE International Conference on High Performance Computing and Communications, pp. 629–634 (2008)

    Google Scholar 

  11. Dan, N., Hua-Ji, S., Yuan, C., Jia-Hu, G.: Attribute based access control (ABAC)-based cross-domain access control in service-oriented architecture (SOA). In: Proceedings of the International Conference on Computer Science and Service System (CSSS 2012) (2012)

    Google Scholar 

  12. Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the social internet of things. IEEE Trans. Knowl. Data Eng. 26(5), 1253–1266 (2014)

    Article  Google Scholar 

  13. Sicari, S., Rizzardi, A., Grieco, L.A., et al.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)

    Article  Google Scholar 

  14. Saied, Y.B., Olivereau, A., Zeghlache, D., et al.: Trust management system design for the internet of things: a context-aware and multi-service approach. Comput. Secur. 39, 351–365 (2013)

    Article  Google Scholar 

  15. Smari, W.W., Clemente, P., Lalande, J.-F.: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system. Future Gener. Comput. Syst. 31, 147–168 (2014)

    Article  Google Scholar 

  16. Chen, D., Chang, G., Sun, D., et al.: Modeling access control for cyber-physical systems using reputation. Comput. Electric. Eng. 38(5), 1088–1101 (2012)

    Article  Google Scholar 

  17. Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R.: A fuzzy approach to trust based access control in internet of things. In: 2013 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems (VITAE), pp. 1–5. IEEE (2013)

    Google Scholar 

  18. Armando, A., Bezzi, M., Di Cerbo, F., et al.: Balancing trust and risk in access control. In: OTM Confederated International Conferences on the Move to Meaningful Internet Systems, pp. 660–676. Springer, Cham (2015)

    Google Scholar 

  19. Xia, F., Yang, L.T., Wang, L., et al.: Internet of things. Int. J. Commun. Syst. 25(9), 1101–1102 (2012)

    Article  Google Scholar 

  20. Douceur, J.R.: The sybil attack. In: International Workshop on Peer To Peer Systems. Springer, Berlin, Heidelberg (2002)

    Google Scholar 

  21. Bhuiyan, M.Z.A., Wu, J.: Collusion attack detection in networked systems. In: Proceedings of the 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (IEEE DASC 2016), p. 18 (2016)

    Google Scholar 

  22. Atzori, L., Iera, A., Morabito, G., et al.: The social internet of things (SIoT) when social networks meet the internet of things: concept, architecture and network characterization. Comput. Netw. 56(16), 3594–3608 (2012)

    Article  Google Scholar 

  23. Gong, S.: A collaborative filtering recommendation algorithm based on user clustering and item clustering. JSW 5(7), 745–752 (2010)

    Article  Google Scholar 

  24. Pham, M.C., Cao, Y., Klamma, R., et al.: A clustering approach for collaborative filtering recommendation using social network analysis. J. UCS 17(4), 583–604 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamdi Ouechtati .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ouechtati, H., Azzouna, N.B., Said, L.B. (2020). A Fuzzy Logic Based Trust-ABAC Model for the Internet of Things. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing, vol 926. Springer, Cham. https://doi.org/10.1007/978-3-030-15032-7_97

Download citation

Publish with us

Policies and ethics