A Fuzzy Logic Based Trust-ABAC Model for the Internet of Things

The Internet of Things (IoT) integrates a large amount of everyday life devices from heterogeneous network environments, bringing a great challenge into security and reliability management. In order to cope with certain challenges posed by device capacity and the nature of IoT networks, a lightweight access control model is needed to resolve security and privacy issues. In this paper, we present Fuzzy logic based Trust-ABAC model, an access control model for the Internet of Things. Our model for the IoT is an improvement of our previous work Trust-ABAC [3] by a new Fuzzy logic-based model in which we consider an evaluation of trust based on recommendations and social relationship that can deal effectively with certain types of malicious behavior that intend to mislead other nodes. Results prove the performance of the proposed model and its capabilities to detect the collision and singular attacks with high precision.

[1]  Jie Wu,et al.  Collusion Attack Detection in Networked Systems , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[2]  Michael Blackstock,et al.  IoT interoperability: A hub-based approach , 2014, 2014 International Conference on the Internet of Things (IOT).

[3]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[4]  Patrice Clemente,et al.  An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system , 2014, Future Gener. Comput. Syst..

[5]  Maria Rita Palattella,et al.  Internet of Things in the 5G Era: Enablers, Architecture, and Business Models , 2016, IEEE Journal on Selected Areas in Communications.

[6]  Djamal Zeghlache,et al.  Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..

[7]  Elisa Bertino,et al.  GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.

[8]  Chen Yuan,et al.  Attribute Based Access Control (ABAC)-Based Cross-Domain Access Control in Service-Oriented Architecture (SOA) , 2012, 2012 International Conference on Computer Science and Service System.

[9]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[10]  Guiran Chang,et al.  Modeling access control for cyber-physical systems using reputation , 2012, Comput. Electr. Eng..

[11]  Ravi S. Sandhu,et al.  Lattice-based access control models , 1993, Computer.

[12]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[13]  Alessandro Armando,et al.  Balancing Trust and Risk in Access Control , 2015, OTM Conferences.

[14]  Matthias Jarke,et al.  A Clustering Approach for Collaborative Filtering Recommendation Using Social Network Analysis , 2011, J. Univers. Comput. Sci..

[15]  Junshan Li,et al.  A Trust and Context Based Access Control Model for Distributed Systems , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[16]  Nadia Ben Azzouna,et al.  Trust-ABAC Towards an Access Control System for the Internet of Things , 2017, GPC.

[17]  Neeli R. Prasad,et al.  A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.

[18]  Songjie Gong A Collaborative Filtering Recommendation Algorithm Based on User Clustering and Item Clustering , 2010, J. Softw..

[19]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[20]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[21]  Ma Jian-feng,et al.  Research Status and Development Trends of Access Control Model , 2012 .

[22]  Christos Faloutsos,et al.  Epidemic thresholds in real networks , 2008, TSEC.

[23]  Gerhard P. Hancke,et al.  A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges , 2018, IEEE Access.