OATAO - Open Archive Toulouse Archive Ouverte Open Access Week

Trust Evaluation Model for Attack Detection in Social Internet of Things

Abdelghani, Wafa and Zayani, Corinne Amel and Amous, Ikram and Sèdes, Florence Trust Evaluation Model for Attack Detection in Social Internet of Things. (2018) In: CRISIS 2018 - 13th International Conference on Risks and Security of Internet and Systems, 16 October 2018 - 18 October 2018 (Arcachon, France).

[img]
Preview
(Document in English)

PDF (Author's version) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
547kB

Official URL: https://doi.org/10.1007/978-3-030-12143-3_5

Abstract

Social Internet of Things (SIoT) is a paradigm in which the Internet of Things (IoT) concept is fused with Social Networks for allowing both people and objects to interact in order to offer a variety of attractive services and applications. However, with this emerging paradigm, people feel wary and cautious. They worry about revealing their data and violating their privacy. Without trustworthy mechanisms to guarantee the reliability of user’s communications and interactions, the SIoT will not reach enough popularity to be considered as a cutting-edge technology. Accordingly, trust management becomes a major challenge to provide qualified services and improved security. Several works in the literature have dealed with this problem and have proposed different trust-models. Nevertheless, proposed models aim to rank the best nodes in the SIoT network. This does not allow to detect different types of attack or malicious nodes. Hence, we overcome these issues through proposing a new trust evaluation model, able to detect malicious nodes, block and isolate them, in order to obtain a reliable and resilient system. For this, we propose new features to describe and quantify the different behaviors that operate in such system. We formalized and implemented a new function learned and built based on supervised learning, to analyze different features and distinguish malicious behavior from benign ones. Experimentation made on a real data set prove the resilience and the performance of our trust model.

Item Type:Conference or Workshop Item (Paper)
Additional Information:This paper appears in Lecture Notes in Computer Science book series(LNCS, volume 11391). ISBN 978-3-030-12142-6
HAL Id:hal-02296115
Audience (conference):International conference proceedings
Uncontrolled Keywords:
Institution:French research institutions > Centre National de la Recherche Scientifique - CNRS (FRANCE)
Université de Toulouse > Institut National Polytechnique de Toulouse - Toulouse INP (FRANCE)
Université de Toulouse > Université Toulouse III - Paul Sabatier - UT3 (FRANCE)
Université de Toulouse > Université Toulouse - Jean Jaurès - UT2J (FRANCE)
Université de Toulouse > Université Toulouse 1 Capitole - UT1 (FRANCE)
Other partners > Université de Sfax (TUNISIA)
Laboratory name:
Statistics:download
Deposited On:24 Sep 2019 16:35

Repository Staff Only: item control page