This is an open access article distributed under the CC BY-NC-ND 4.0 terms and conditions.
Volume 14 article 356 pages: 75-83
Social Internet of Things is a new paradigm that integrates Internet of things and Social Networks. Several challenges exist in building Social Internet of Things (SIoT). Very limited research has been carried out in the past 7 years to build a reliable Social Internet of Things community. A major threat with Social Things is Sybil attacks. Since SIoT is comprised of autonomous objects/nodes, tracking fake identities is an open problem. This paper proposes a new mechanism to identify Sybils in communities of Social Internet of Things. This paper aims at (i) identifying communities among Social Internet of Things using Community_Infer algorithm. Using the properties of Social Networks and ACO heuristics various communities among the Social Internet of Things were identified. (ii) The communities are checked for existence of Sybils. The algorithm Detect_Sybil detects and classifies the number of Sybils in each communities. Compared to existing schemes the proposed method classifies communities accurately with a high modularity score.
A. P. Fiske, ““The four elementary forms of sociality: framework for a unified theory of social relations“, Psychological review, vol. 99, 1992.
A.MeenaKowshalya, Dr.M.L.Valarmathi, “Secure and Efficient Ciphertext Policy Attribute Based Encryption without key Escrow Problem“, International Journal of Emerging Engineering Research and Technology, Vol 2, No 2, pp:126-130, 2014.
Aaron Clauset, M.E.J.Newman, Cristopher Moore, “Finding community structure in very large networks“, Phys. Rev. E 70, 066111 ,2004.
Alan Mislove, Ansley Post, Peter Druschel, Krishna P. Gummadi, Ostra,“ “leveraging trust to thwart unwanted communication“, Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pp.15-30, April 16-18, 2008, San Francisco, California
Alice Cheng , Eric Friedman, “Sybilproof reputation mechanisms“, Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, August 22-22, 2005, Philadelphia, Pennsylvania, USA
Bao.F and Chen.I.R, 2012 Dynamic Trust Management for the Internet of Things Applications , International Workshop on Self Aware IoT, San Jose, California, USA, pp:1-6.
Blum C, Dorigo M, the hypercube framework for Ant Colony Optimization, IEEE Transactions on Systems, Man, and Cybernetics, Vol 34, No 2, pp : 1161 – 1172, 2004.
Dorigo, M. Maniezzo, V. Colorni, A, “Ant system: optimization by a colony of cooperating agents“, IEEE Transactions on Systems, Man, and Cybernetics, Vol:26 , No:1, 1996.
Dr. M. L. Valarmathi, A.Meena Kowshalya, “Improved Network Navigability and Service Search in Social Internet of Things (SIoT)“, International Journal of Research and Scientific Innovation, Vol 3, No 11, pp: 75-77, 2015. 28
G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS, 2009
H. Yu , P. B. Gibbons , M. Kaminsky and F. Xiao „SybilLimit: A near-optimal social network defense against sybil attacks“, Proc. 2008 IEEE Symp. Security and Privacy, pp.3 -17 2008
Haifeng Yu, Kaminsky, M, Gibbons, P.B, Flaxman, A.D., „SybilGuard: Defending Against Sybil Attacks via Social Networks“, IEEE/ACM Transactions on Networking, Vol:16, Issue:3, pp:576- 589, June 2008.
J Ruan, W Zhang, “An efficient spectral algorithm for network community discovery and its applications to biological and social networks“, Seventh IEEE International Conference on Data Mining, pp: 643-648, 2007.
J. Duch, A. Arenas, “Community detection in complex networks using Extremal Optimization“, Physical Review E, vol. 72, 027104, 2005
Karsten Steinhaeuser, Nitesh V Chawla, “Community Detection in a Large Real-World Social Network“, Social Computing, Behavioral Modeling, and Prediction, Springer, pp 168-175, 2008.
M. E. J. Newman, “Fast algorithm for detecting community structure in networks“, Phys. Rev. E 69, 066133 ,2004
M. E. J. Newman, “Modularity and community structure in networks“, Proceddings of National Acadamey of Sciences of United States of America, vol. 103 no. 23, pp: 8577-858, 2006.
M. Nitti, R. Girau, and L. Atzori, “Trustworthiness Management in the Social Internet of Things“, IEEE Transactions on Knowledge and Data Management, Vol. 26, Issue No. 5, 2014, pp. 1-11.
N. Tran, J. Li, L. Subramanian, and S. Chow. Optimal Sybil-resilient Node Admission Control. In INFOCOM, Apr. 2011.
Newman MEJ, Girvan M, “Finding and evaluating community structure in networks“, Phys Rev E 69:026113
Pablo M. Gleiser and Leon Danon. Community structure in jazz. Advances in Complex Systems, 6(4):565-573, 2003.
R.Levien, A.Aiken, “Attack Resistant Trust Metrics for Public Key Certificates“, in Proceedings of 7th USENIX Security Symposium, pp. 229-242, Texas, 1998.
Supreet Reddy Mandala et al, “Clustering Social Networks using Ant Colony Optimization“, Operational Research ,Vol 13, No 1, pp 47-65. April 2013.
Usha Nandini Raghavan, Reka Albert, Soundar Kumara, “Near linear time algorithm to detect community structures in large-scale networks“, Physics Review E 76, 036106 (2007)
Valarmathi.M.L, Kowshalya.M, Aarthi.M, 2015 Research Challenges in the Social Internet of Things (SIoT) A Survey, Proceedings of National Conference on Science Research and Information Technology :128-133
W. W. Zachary, An information flow model for conflict and fission in small groups, Journal of Anthropological Research 33, 452-473 ,1977
Wei Wei ; Fengyuan Xu ; Tan, C.C. ; Qun Li, “SybilDefender: Defend against sybil attacks in large social networks“, Proceeding of IEEE InfoComm, PP: 1951-1959, March 2012.
Yan ,Lihua Yin, “A Security Routing Mechanism against
Sybil Attacks in Mobile Social Networks“, APWeb Workshops,pp.325-332, Springer,