Security Framework for Social Internet of Things: A Relativity Strength Approach

PDF (1348KB), PP.28-46

Views: 0 Downloads: 0

Author(s)

K. S. Santhosh Kumar 1 Hanumanthappa J. 1 S. P. Shiva Prakash 1,* Kirill Krinkin 2

1. Department of Studies in Computer Science, University of Mysore, Manasagangothri campus, Mysuru-570006, Karnataka, India

2. School of Computer Science and Engineering, Constructor University, Bremen, Germany

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2024.04.03

Received: 30 Dec. 2023 / Revised: 20 Feb. 2024 / Accepted: 7 Mar. 2024 / Published: 8 Aug. 2024

Index Terms

Security, Relative strength, Social Internet of Things, Decision Tree, Reinforcement Learning, Attacks

Abstract

The evolution of the Internet of Things (IoT) into the Social Internet of Things (SIoT) involves the integration of social networking features into smart devices. In this paradigm, smart devices emulate human social behavior by forming social relationships with other devices within the network. These relationships are leveraged for service discovery, emphasizing the need for robust security to foster collaboration and cooperation among devices. Security is paramount in the SIoT landscape, as malicious messages from devices can disrupt service functionality, impacting service quality and reliability. These challenges are particularly pronounced in social networks, introducing unique considerations such as heterogeneity and navigability. This study introduces a Security Framework for the Social Internet of Things, adopting a Relativity Strength Approach to enhance the security and reliability of IoT devices within social network contexts. The framework incorporates a relativity-based security model, utilizes Q-learning for efficient device navigation, and employs decision tree classification for assessing service availability. By optimizing hop counts and considering the strength of relationships between devices, the framework enhances security, resource utilization, and service reliability. The proposed security framework introduces a” Relationship key” derived from device-to-device relationships as a central element. This key, coupled with a standard 256-bit Advanced Encryption Standard (AES) algorithm, is employed for encryption and decryption processes. The relationship key technique ensures data protection during transmission, guaranteeing confidentiality and service integrity during network navigation. The system demonstrates an overall security effectiveness of 88.75%, showcasing its robustness in thwarting attacks and preventing unauthorized access. With an impressive overall communication efficiency of 91.75%, the framework minimizes errors and delays, facilitating optimal information trans- mission in smart environments. Furthermore, its 97.5% overall service availability assures a continuous and reliable user experience, establishing the framework’s capability to deliver secure, efficient, and highly accessible smart services.

Cite This Paper

K. S. Santhosh Kumar, Hanumanthappa J., S. P. Shiva Prakash, Kirill Krinkin, "Security Framework for Social Internet of Things: A Relativity Strength Approach", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.16, No.4, pp. 28-46, 2024. DOI:10.5815/ijieeb.2024.04.03

Reference

[1]Chen, I.-R., Bao, F., & Guo, J. (2016). Trust-Based Service Management for Social Internet of Things Systems. IEEE Transactions on Dependable and Secure Computing, 13(6), 684-696. https://doi.org/10.1109/TDSC.2015.2420552.
[2]Jadhav, B. & Patil, S. C. (2016). Wireless Home monitoring using Social Internet of Things (SIoT). In International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, India, 925-929. https://doi.org/10.1109/ICACDOT.2016.7877722.
[3]Han, G., Zhou, L., Wang, H., Zhang, W., & Chan, S. (2017). A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things. Future Gener. Comput. Syst., 82, 689-697. https://doi.org/10.1016/j.future.2017.08.044.
[4]Ruggeri, G. & Briante, O. (2017). A framework for IoT and E-Health systems integration based on the social Internet of Things paradigm. In International Symposium on Wireless Communication Systems (ISWCS), Bologna, Italy, 426- 431. https://doi.org/10.1109/ISWCS.2017.8108152.
[5]Roopa, M. S., Valla, D., Buyya, R., Venugopal, K. R., Iyengar, S. S., & Patnaik, L. M. (2018). SSSSS: Search for So- cial Similar Smart devices in SIoT. In Fourteenth International Conference on Information Processing (ICINPRO), Bangalore, India, 1-6. https://doi.org/10.1109/ICINPRO43533.2018.9096686.
[6]Amin, F., Abbasi, R., Rehman, A., & Choi, G.S. (2019). An Advanced Algorithm for Higher Network Navigation in Social Internet of Things Using Small-World Networks. Sensors (Basel, Switzerland), 19. https://doi.org/10.3390/s19092007.
[7]Bhavsar, S.A., Pandit, B.Y., & Modi, K.J. (2019). Social Internet of Things. In Advances in Systems Analysis, Software Engineering, and High Performance Computing. https://doi.org/10.4018/978-1-5225-7790-4.ch010.
[8]Patnaik, L.M., Venugopal, K.R., Iyengar, S.S., Buyya, R., & Roopam, S. (2020). DRCM: Dynamic Relationship Creation and Management in Social Internet of Things (SIoT). https://doi.org/10.1504/ijiitc.2020.10033966.
[9]Azad, M.A., Bag, S., Hao, F., & Shalaginov, A. (2020). Decentralized Self-Enforcing Trust Management System for Social Internet of Things. IEEE Internet of Things Journal, 7, 2690-2703. https://doi.org/10.1109/JIOT.2019.2962282.
[10]Wang, B., Sun, Y., Duong, T. Q., Nguyen, L. D., & Zhao, N. (2020). Popular Matching for Security-Enhanced Resource Allocation in Social Internet of Flying Things. IEEE Transactions on Communications, 68(8), 5087-5101. https://doi.org/10.1109/TCOMM.2020.2995223.
[11]Kalyani, G. & Shilpa Shashikant Chaudhari (2020). An efficient approach for enhancing security in Internet of Things using the optimum authentication key. International Journal of Computers and Applications, 42, 306-314. https://doi.org/10.1080/1206212X.2019.1619277.
[12]Mawgoud, A.A., Taha, M.H.N., & Khalifa, N.E.M. (2020). Security Threats of Social Internet of Things in the Higher Education Environment. In Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications. Studies in Computational Intelligence, vol 846, Springer, Cham. https://doi.org/10.1007/978-3-030-24513-9_9.
[13]Rehman, A., Paul, A., Rehman, A. U., Amin, F., Asif, R. M., & Rahmatov, N. (2020). An Efficient Friendship Selection Mechanism for an Individual’s Small World in Social Internet of Things. In International Conference on Engineering and Emerging Technologies (ICEET), Lahore, Pakistan, 1-6. https://doi.org/10.1109/ICEET48479.2020.9048234.
[14]Malekshahi Rad, M., Rahmani, A.M., Sahafi, A. et al. Social Internet of Things: vision, challenges, and trends. Hum. Cent. Comput. Inf. Sci. 10, 52 (2020). https://doi.org/10.1186/s13673-020-00254-6
[15]Krishna, M. Bala & Lorenz, P. (2021). Location, Context, and Social Devicesives Using Knowledge-Based Rules and Conflict Resolution for Security in Internet of Things. IEEE Internet of Things Journal, 8(1), 407-417. https://doi.org/10.1109/JIOT.2020.3008771.
[16]Farhadi, B., Rahmani, A.M., Asghari, P., & Hosseinzadeh, M. (2021). Friendship selection and management in social internet of things: A systematic review. Comput. Networks, 201, 108568. https://doi.org/10.1016/j.comnet.2021.108568.
[17]Jose´ Ramo´n Saura, Domingo Ribeiro-Soriano, Daniel Palacios-Marque´s, Setting Privacy “by Default” in Social IoT: Theorizing the Challenges and Directions in Big Data Research, Big Data Research, Volume 25,2021,100245, ISSN 2214-5796. https://doi.org/10.1016/j.bdr.2021.100245.
[18]Hussain, T., Yang, B., Rahman, H.U., Iqbal, A., Ali, F., & Shah, B. (2022). Improving Source location privacy in social Internet of Things using a hybrid phantom routing technique. Comput. Secur., 123, 102917. https://doi.org/10.1016/j.cose.2022.102917.
[19]Abdelghani, W., Amous, I., Zayani, C.A. et al. (2022). Dynamic and scalable multi-level trust management model for Social Internet of Things. J Supercomput, 78, 8137–8193. https://doi.org/10.1007/s11227-021-04205-5.
[20]Sagar, S., Mahmood, A., Sheng, Q.Z., Pabani, J.K., & Zhang, W. (2022). Understanding the Trustworthiness Management in the Social Internet of Things: A Survey. ArXiv, abs/2202.03624.
[21]Dhillon, P., & Singh, M. (2022). An ontology-oriented service framework for social IoT. Comput. Secur., 122, 102895. https://doi.org/10.1016/j.cose.2022.102895
[22]Vaibhava Lakshmi, R., Deepak, G., Santhanavijayan, A., & Radha, S. (2022). Search for Social Smart devices Constituting Sensor Ontology, Social IoT and Social Network Interaction. Sixth International Conference on I- SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 60-65. https://doi.org/10.1109/I-SMAC55078.2022.9987249.
[23]Wu, B., Zhong, L., Yao, L., & Ye, Y. (2022). EAGCN: An Efficient Adaptive Graph Convolutional Network for Item Recommendation in Social Internet of Things. IEEE Internet of Things Journal, 9(17), 16386-16401.https://doi.org/10.1109/JIOT.2022.3151400.
[24]Maniveena & Kalaiselvi (2023). Social IoT Security and Privacy. In Advanced Computing and Communication Technologies for High Performance Applications (ACCTHPA), Ernakulam, India, 1-7. https://doi.org/10.1109/ACCTHPA57160.2023.10083356.
[25]Mohan Das, R., Arun Kumar, U., Gopinath, S. et al. (2023). A novel deep learning-based approach for detecting attacks in social IoT. Soft Comput.https://doi.org/10.1007/s00500-023-08389-1.
[26]Mustafa, R. U., McGibney, A., & Rea, S. (2023). Trust Analysis to Identify Malicious Nodes in the Social Internet of Things. In International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 1-9. https://doi.org/10.1016/j.knosys.2021.107479.
[27]Santhosh Kumar, K.S., Hanumanthappa, J., Shiva Prakash, S.P., Krinkin, K. (2023). Relationship-Based AES Security Model for Social Internet of Things. In: Kulkarni, A.J., Mirjalili, S., Udgata, S.K. (eds) Intelligent Systems and Applications. Lecture Notes in Electrical Engineering, vol 959. Springer, Singapore. https://doi.org/10.1007/978-981-19-6581-4_12
[28]Akli, A., Chougdali, K. (2023). IoT Trust Management as an SIoT Enabler Overcoming Security Issues. In: Abd El-Latif, A.A., Maleh, Y., Mazurczyk, W., ELAffendi, M., I. Alkanhal, M. (eds) Advances in Cybersecurity, Cyber- crimes, and Smart Emerging Technologies. CCSET 2022. Engineering Cyber-Physical Systems and Critical Infrastructures, vol 4. Springer, Cham.https://doi.org/10.1007/978-3-031-21101-0_10.
[29]Meriem Chiraz Zouzou, Mohamed Shahawy, Elhadj Benkhelifa and Hisham Kholidy, (2023). SIoTSim: Simulator for Social Internet of Things. 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS). 149-155. https://doi.org/10.1109/IOTSMS59855.2023.10325812.