Abstract
Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects to establish social relationships. Nonetheless, trust issues such as attacks have emerged. These attacks can influence service discovery results. A trust management mechanism has become a major challenge in the Social IoT to prevent these attacks and ensure qualified services. A few studies have addressed trust management issues, especially those that prevent trust attacks in Social IoT environments. However, most studies have been dedicated to detect offline attacks with or without specifying the type of attack performed. These works will not be able to prevent attacks by aborting transactions between users because their primary purpose is to detect an offline attack. In addition, they do not consider security properties. This research paper aims to provide a detailed survey on trust management mechanism to handle trust attacks in Social IoT. In this research paper, we compared the techniques and technologies whose common point is attack prevention and demonstrated that blockchain technology can play a key role in developing a trust management mechanism that can prevent trust attacks while maintaining security properties. Then, we proposed combining the Apache Spark Framework with blockchain technology to provide real-time attack prevention. This combination can assist in creating upgraded trust management mechanisms in Social IoT environments. These mechanisms aim to prevent attacks in real-time through considering the security properties. Lack of survey papers in the area of trust attack prevention in real-time stands for an important motivational factor for writing this paper. The current research paper highlights the potential of the blockchain technology and Apache Spark in terms of developing an upgraded trust management able to prevent trust attacks in real-time.This paper provides a comprehensive survey on trust management mechanisms and approaches to handle trust attacks in Social IoT. Lack of such papers increases the significance of this paper. It also offers potential future research directions in terms of real-time trust attack prevention.
Similar content being viewed by others
Data availability
The authors confirm that this article is a survey and does not involve the collection or use of raw data, as it primarily consists of a review and synthesis of existing literature. Therefore, there are no datasets associated with this research.
Abbreviations
- IoT:
-
Internet of Things
- SN:
-
Social Networks
- Social IoT:
-
Social Internet of Things
- ID Mgmt:
-
ID management
- OC:
-
Owner Control
- RM:
-
Relationship Management
- SD:
-
Service Discovery
- SC:
-
Service Composition
- TM:
-
Trustworthiness Management
- SPA:
-
Self-Promoting Attack
- DA:
-
Discriminatory Attack
- BMA:
-
Bad-Mouthing Attack
- BSA:
-
Ballot-Stuffing Attack
- OSA:
-
Opportunistic Service Attack
- OOA:
-
On-Off Attack
- TMM:
-
Trust Managment Mechanisms
- IDPIoT:
-
Intrusion Detection and Prevention system for the Internet of Things
- DoS:
-
Denial-of-Service attacks
- DDoS:
-
Distributed Denial-of-Service attacks
- XSS:
-
Cross-Site Scripting
- SQL:
-
Structured Query Language
- PoTA:
-
Proof of Trust Attacks
- MAC:
-
Medium Access Control layer
- BARS:
-
Blockchain-based Anonymous Reputation System
- VANETs:
-
Vehicular Ad-hoc NETworks
- SAGA-BC:
-
SPAM Attack Guard Algorithm Using Blockchain
- CoI:
-
Community of Interest
- OSN:
-
Online Social Network
- DOSN:
-
Decentralized OSN
- ML:
-
Machine Learning
- DL:
-
Deep Learning
- MLlib:
-
Machine Learning library
- RF:
-
Random Forest algorithm
- LR:
-
Logistic Regression algorithm
- SVM:
-
Support Vector Machine algorithm
- SGD:
-
Stochastic Gradient Descent
- DT:
-
Decision Tree algorithm
- S-DDoS:
-
Spark-based real-time DDoS detection system
- MLP:
-
Multi-Layer Perceptron
- IDS:
-
Intrusion Detection System
- UDP:
-
User Datagram Protocol
- UDP flooding:
-
DDoS attack type
- TCP:
-
Transmission Control Protocol
- TCP flooding:
-
DDoS attack type
- ICMP:
-
Internet Control Message Protocol
- ICMP flooding:
-
DDoS attack type
- SSK-DDoS:
-
Spark Streaming and Kafka to classify different types of DDoS attacks
- RFID:
-
Radio Frequency Identification
- NFC:
-
Near Field Communication
- GPS:
-
Global Positioning System
References
Ramanathan, A.: A multi-level trust management scheme for the Internet of Things. University of Nevada, Las Vegas (2015)
Abdelghani, W., Zayani, C. A., Amous, I., Sèdes, F., Florence: Trust management in social internet of things: a survey, Conference on e-Business, e-Services and e-Society, pp. 430–441, Springer (2016)
Roopa, MS., Pattar, Santosh, Buyya, Rajkumar, Venugopal, Kuppanna Rajuk, Iyengar, SS, Patnaik, LM: Social Internet of Things (SIoT): Foundations, thrust areas, systematic review and future directions, Computer Communications, pp. 32–57, Elsevier (2019)
Masmoudi, M., Abdelghani, W., Amous, I., Sèdes, F., Florence: Deep Learning for Trust-Related Attacks Detection in Social Internet of Things, International Conference on e-Business Engineering, pp. 389–404, Springer (2020)
Alghofaili, Y., Rassam, M.A.: A dynamic trust-related attack detection model for IoT devices and services based on the deep long short-term memory technique. Sensors 23(8), 3814 (2023)
Alam, S., Zardari, S., Shamsi, J.A.: Blockchain-based trust and reputation management in SIoT. Electronics 11(23), 3871 (2022)
Abderrahim, O. B., Elhdhili, M. H., Saidane, L.: TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things, The 13th international wireless communications and mobile computing conference (IWCMC), pp. 747–752, IEEE (2017)
Abdelghani, W., Zayani, C. A., Amous, I., Sèdes, F., Florence: Trust evaluation model for attack detection in social internet of things, international conference on risks and security of internet and systems, pp. 48–64, Springer (2018)
Lee, G.M., Truong, N.B.: A reputation and knowledge based trust service platform for trustworthy social internet of things, Innovations in Clouds, Internet and Networks. ICIN), MDPI AG (2016)
Masmoudi, M., Zayani, C. A., Amous, I., Sèdes, F., Florence: A New Blockchain-Based trust management model, The 25th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, pp. 389–404, Elsevier (2021)
Xia, H., Xiao, F., Zhang, S. S., Hu, C. Q., Cheng, X. Z.: Trustworthiness inference framework in the social Internet of Things: A context-aware approach, IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 838–846, IEEE (2019)
Talbi, S., Bouabdallah, A.: Interest-based trust management scheme for social internet of things. J. Ambient Intell. Humanized Comput. 11(3), 1129–1140 (2020)
Bakhsh, S.T., Alghamdi, S., Alsemmeari, R.A., Hassan, S.R.: An adaptive intrusion detection and prevention system for Internet of Things. Int. J. Distrib. Sensor Netw. 15(11), 1550147719888109 (2019)
Azeez, N. A., Bada, T. M., Misra, S., Adewumi, A., Van der Vyver, C., Ahuja, R.: Intrusion detection and prevention systems: an updated review, data management, analytics and innovation, pp. 685–696, Springer (2020)
Kenkre, P. S., Pai, A., Colaco, L.: Real time intrusion detection and prevention system, Proceedings of the 3rd international conference on frontiers of intelligent computing: theory and applications (FICTA), pp. 405–411, Springer (2015)
Calvaresi, D., Dubovitskaya, A., Calbimonte, J. P., Taveter, K., Schumacher, M.: Multi-agent systems and blockchain: Results from a systematic literature review, international conference on practical applications of agents and multi-agent systems, pp. 110–126, Springer (2018)
Gorasiya, D. V.: Comparison of open-source data stream processing engines: spark streaming, flink and storm, Technical report (2019)
Perera, S., Perera, A., Hakimzadeh, K. : Reproducible experiments for comparing apache flink and apache spark on public clouds, arXiv preprint arXiv:1610.04493 (2016)
Rubin, J.: BTCSpark: Scalable analysis of the Bitcoin blockchain using spark, Dec, 16, pp. 1–14 (2015)
Dutta, D., Ch, T., Das, S., Tripathy, B. K.: Social Internet of Things (SIoT): transforming smart object to social object, NCMAC 2015 Conference Proceedings (2015)
Gulati, N., Kaur, P. D.: When things become friends: a semantic perspective on the social internet of things, smart innovations in communication and computational sciences, pp. 149–159, Springer (2019)
Chen, Z., Ling, R., Huang, C.M., Zhu, X.: A scheme of access service recommendation for the Social Internet of Things. Int. J. Commun. Syst. 29(4), 694–706 (2016)
Zheng, L., Zhang, H., Han, W., Zhou, X., He, J., Zhang, Z., Wang, J., Technologies, applications, and governance in the internet of things. Internet of things-Global technological and societal trends, From smart environments and spaces to green ICT (2011)
Jayasinghe, U., Lee, G.M., Um, T.W., Shi, Q.: Machine learning based trust computational model for IoT services. IEEE Trans. Sustain. Comput. 4, 39–52 (2018)
Beldjilali, B: Gestion de Confiance dans le Cloud Computing, Université d’Oran (2016)
Guo, J., Chen, R., Tsai, J.J.: A survey of trust computation models for service management in internet of things systems. Comput. Commun. 97, 1–14 (2017)
Ekbatanifard, G., Yousefi, O.: A novel trust management model in the social internet of things. J. Adv. Comput. Eng. Technol. 5(2), 57–70 (2019)
Mendoza, C.V.L., Kleinschmidt, J.H.: A distributed trust management mechanism for the Internet of things using a multi-service approach. Wireless Pers. Commun. 103, 2501–2513 (2018)
Kumar, J Senthil, Sivasankar, G., Nidhyananthan, S Selva: An artificial intelligence approach for enhancing trust between social iot devices in a network, toward social internet of things (SIoT): Enabling Technologies, Architectures and Applications, pp. 183–196, Springer (2020)
Kowshalya, A Meena, Valarmathi, ML: Trust management for reliable decision making among social objects in the Social Internet of Things, IET Networks, 6, pp. 75–80, Wiley Online Library (2017)
Dagorn, Nathalie: Détection et prévention d’intrusion: présentation et limites (2006)
Kowshalya, A.M., Valarmathi, M.L.: Trust management in the social internet of things. Wireless Pers. Commun. 96, 2681–2691 (2017)
Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the social internet of things. IEEE Trans. Knowl. Data Eng. 26(5), 1253–1266 (2013)
Feng, B., Li, Q., Ji, Y., Guo, D., Meng, X.: Stopping the cyberattack in the early stage: assessing the security risks of social network users. Secur. Commun. Netw. 2019(1), 3053418 (2019)
Farishta, K.R., Singh, V.K., Rajeswari, D.: XSS attack prevention using machine learning. World Rev. Sci., Technol. Sustain. Dev. 18(1), 45–50 (2022)
Khan, A.S., Balan, K., Javed, Y., Tarmizi, S., Abdullah, J.: Secure trust-based blockchain architecture to prevent attacks in VANET. Sensors 19(22), 4954 (2019)
Lu, Z., Liu, W., Wang, Q., Qu, G., Liu, Z.: A privacy-preserving trust model based on blockchain for VANETs. IEEE Access 6, 45655–45664 (2018)
Nakayama, K., Moriyama, Y., Oshima, C.: An algorithm that prevents spam attacks using blockchain. Int. J. Adv. Comput. Sci. Appl. 9(7), 204–208 (2018)
Ibrahim, R.F., Abu Al-Haija, Q., Ahmad, A.: DDoS attack prevention for internet of thing devices using ethereum blockchain technology. Sensors 22(18), 6806 (2022)
Ilyas, B., Kumar, A., Setitra, M.A., Bensalem, Z.A., Lei, H.: Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology. Trans. Emerg. Telecommun. Technol. 34(4), e4729 (2023)
Ansari, M.F., Sharma, P.K.: Dash, Bibhu. Prevention of phishing attacks using AI-based Cybersecurity Awareness Training, Prevention (2022)
Kathirkamanathan, N., Thevarasa, B., Mahadevan, G., Skandhakumar, N., Kuruwitaarachchi, N.: Prevention of DDoS attacks targeting financial services using supervised machine learning and stacked LSTM, International conference for Convergence in Technology (I2CT), pp. 1–5, IEEE (2022)
Kebede, S.D., Tiwari, B., Tiwari, V., Chandravanshi, K.: Predictive machine learning-based integrated approach for DDoS detection and prevention. Multimed. Tools Appl. 81, 4185–4211 (2022)
Afanasyev, I., Kolotov, A., Rezin, R., Danilov, K., Kashevnik, A., Jotsov, V.: Blockchain solutions for multi-agent robotic systems: Related work and open questions, Proceedings of the 24th conference of open innovations association FRUCT, 76, FRUCT Oy (2019)
Mikroyannidis, A., Third, A., Domingue, J., Bachler, M., Quick, K. A.: Blockchain Applications in Lifelong Learning and the Role of the Semantic Blockchain, Blockchain Technology Applications in Education, pp. 16–41, IGI Global (2020)
Iqbal, R., Butt, T.A., Afzaal, M., Salah, K.: Trust management in social internet of vehicles: factors, challenges, blockchain, and fog solutions. Int. J. Distrib. Sensor Netw. 15(1), 1550147719825820 (2019)
Guidi, B.: When blockchain meets online social networks. Pervasive Mobile Comput. 62, 101–131 (2020)
Panarello, A., Tapas, N., Merlino, G., Longo, F., Puliafito, A.: Blockchain and iot integration: a systematic survey. Sensors 18(8), 2575 (2018)
Smik, B: Blockchain technologies adapted for data manipulation in IoT, Masaryk University Faculty of Informatics (2018)
Awan, M.J., Farooq, U., Babar, H.M.A., Yasin, A., Nobanee, H., Hussain, M., Zain, A.M.: Real-time DDoS attack detection system using big data approach. Sustainability 13(19), 10743 (2021)
Patil, N.V., Rama Krishna, C., Kumar, K.: S-DDoS: Apache spark based real-time DDoS detection system. J. Intell. Fuzzy Syst. 38(5), 6527–6535 (2020)
Marir, N., Wang, H., Feng, G., Li, B., Jia, M.: Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark. IEEE Access 6, 59657–59671 (2018)
Saravanan, S.: Performance evaluation of classification algorithms in the design of Apache Spark based intrusion detection system, The 5th international conference on communication and electronics systems (ICCES), pp. 443–447, IEEE (2020)
Zhang, H., Dai, S., Li, Y., Zhang, W.: Real-time distributed-random-forest-based network intrusion detection system using Apache spark, The 37th international performance computing and communications conference (IPCCC), pp. 1–7, IEEE (2018)
Masmoudi, M., Amous, I., Zayani, C. A., Sèdes, F., Florence: Real-Time Mitigation of Trust-Related Attacks with Blockchain and Apache Spark, The 12th International Conference on Model and Data Engineering, MEDI (2023)
Han, D., Bi, K., Liu, H., Jia, J.: A DDoS attack detection system based on spark framework. Comput. Sci. Inf. Syst. 14(3), 769–788 (2017)
Abid, A., Jemili, F.: Intrusion detection based on graph oriented big data analytics. Procedia Comput. Sci. 176, 572–581 (2020)
Zhou, B., Li, J., Wu, J., Guo, S., Gu, Y., Li, Z.: Machine-learning-based online distributed denial-of-service attack detection using spark streaming, IEEE international conference on communications (ICC), pp. 1–6, IEEE (2018)
Wirz, L., Tanthanathewin, R., Ketphet, A., Fugkeaw, S.: Design and development of A cloud-based IDS using Apache Kafka and Spark Streaming, The 19th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp. 1–6, IEEE (2022)
Patil, N.V., Krishna, C.R., Kumar, K.: SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks. Cluster Comput. 25(2), 1355–1372 (2022)
Assefi, M., Behravesh, E., Liu, G., Tafti, A. P.: Big data machine learning using apache spark MLlib, IEEE international conference on big data (big data), pp. 3492–3498 (2017)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no Conflict of interest.
Ethical approval
The authors declare full compliance with ethical standards. This article does not contain any studies involving humans or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Masmoudi, M., Amous, I., Zayani, C.A. et al. Trust attack prevention based on Spark-blockchain in social IoT: a survey. Int. J. Inf. Secur. 23, 3179–3198 (2024). https://doi.org/10.1007/s10207-024-00885-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-024-00885-1