DOI: 10.5937/jaes14-10176
This is an open access article distributed under the CC BY-NC-ND 4.0 terms and conditions.

Volume 14 article 356 pages: 75-83
Social Internet of Things is a new paradigm that integrates Internet of things and Social Networks. Several challenges exist in building Social Internet of Things (SIoT). Very limited research has been carried out in the past 7 years to build a reliable Social Internet of Things community. A major threat with Social Things is Sybil attacks. Since SIoT is comprised of autonomous objects/nodes, tracking fake identities is an open problem. This paper proposes a new mechanism to identify Sybils in communities of Social Internet of Things. This paper aims at (i) identifying communities among Social Internet of Things using Community_Infer algorithm. Using the properties of Social Networks and ACO heuristics various communities among the Social Internet of Things were identified. (ii) The communities are checked for existence of Sybils. The algorithm Detect_Sybil detects and classifies the number of Sybils in each communities. Compared to existing schemes the proposed method classifies communities accurately with a high modularity score.
A. P.
Fiske, ““The four
elementary forms of sociality: framework for a unified theory of social
relations“, Psychological
review, vol. 99, 1992.
A.MeenaKowshalya,
Dr.M.L.Valarmathi, “Secure and Efficient Ciphertext Policy Attribute Based Encryption
without key Escrow Problem“, International Journal of Emerging Engineering
Research and Technology, Vol 2, No 2, pp:126-130, 2014.
Aaron Clauset,
M.E.J.Newman, Cristopher Moore, “Finding community structure in very large networks“,
Phys. Rev. E 70, 066111 ,2004.
Alan
Mislove, Ansley Post, Peter Druschel, Krishna P. Gummadi, Ostra,“ “leveraging trust to thwart unwanted
communication“, Proceedings of the 5th USENIX Symposium on Networked Systems
Design and Implementation, pp.15-30, April 16-18, 2008, San Francisco,
California
Alice Cheng
, Eric Friedman, “Sybilproof
reputation mechanisms“, Proceedings of the 2005 ACM SIGCOMM workshop on
Economics of peer-to-peer systems, August 22-22, 2005, Philadelphia,
Pennsylvania, USA
Bao.F and Chen.I.R,
2012 Dynamic Trust Management for the Internet of Things Applications ,
International Workshop on Self Aware IoT, San Jose, California, USA, pp:1-6.
Blum C,
Dorigo M, the hypercube framework for Ant Colony Optimization, IEEE Transactions
on Systems, Man, and Cybernetics, Vol 34, No 2, pp : 1161 – 1172, 2004.
Dorigo, M.
Maniezzo, V. Colorni, A, “Ant system: optimization by a colony of cooperating agents“, IEEE
Transactions on Systems, Man, and Cybernetics, Vol:26 , No:1, 1996.
Dr. M. L. Valarmathi,
A.Meena Kowshalya, “Improved Network Navigability and Service Search in Social
Internet of Things (SIoT)“, International Journal of Research and Scientific
Innovation, Vol 3, No 11, pp: 75-77, 2015. 28
G. Danezis
and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In
NDSS, 2009
H. Yu , P.
B. Gibbons , M. Kaminsky and F. Xiao „SybilLimit: A near-optimal social network
defense against sybil attacks“, Proc. 2008 IEEE Symp. Security and Privacy, pp.3
-17 2008
Haifeng Yu,
Kaminsky, M, Gibbons, P.B, Flaxman, A.D., „SybilGuard: Defending Against Sybil Attacks via Social Networks“, IEEE/ACM
Transactions on Networking, Vol:16, Issue:3, pp:576- 589, June 2008.
J Ruan, W
Zhang, “An
efficient spectral algorithm for network community discovery and its
applications to biological and social networks“, Seventh IEEE International Conference
on Data Mining, pp: 643-648, 2007.
J. Duch, A.
Arenas, “Community detection in complex networks using Extremal Optimization“, Physical
Review E, vol. 72, 027104, 2005
Karsten
Steinhaeuser, Nitesh V Chawla, “Community Detection in a Large Real-World
Social Network“, Social
Computing, Behavioral Modeling, and Prediction, Springer, pp 168-175, 2008.
M. E. J.
Newman, “Fast
algorithm for detecting community structure in networks“, Phys. Rev. E 69,
066133 ,2004
M. E. J.
Newman, “Modularity
and community structure in networks“, Proceddings of National Acadamey of Sciences of United States of
America, vol. 103 no. 23, pp: 8577-858, 2006.
M. Nitti,
R. Girau, and L. Atzori, “Trustworthiness Management in the Social Internet of Things“, IEEE
Transactions on Knowledge and Data Management, Vol. 26, Issue No. 5, 2014, pp.
1-11.
N. Tran, J.
Li, L. Subramanian, and S. Chow. Optimal Sybil-resilient Node Admission Control. In INFOCOM, Apr. 2011.
Newman MEJ,
Girvan M, “Finding and
evaluating community structure in networks“, Phys Rev E 69:026113
Pablo M.
Gleiser and Leon Danon. Community structure in jazz. Advances in Complex Systems,
6(4):565-573, 2003.
R.Levien,
A.Aiken, “Attack
Resistant Trust Metrics for Public Key Certificates“, in Proceedings of 7th USENIX
Security Symposium, pp. 229-242, Texas, 1998.
Supreet
Reddy Mandala et al, “Clustering Social Networks using Ant Colony Optimization“,
Operational Research ,Vol 13, No 1, pp 47-65. April 2013.
Usha
Nandini Raghavan, Reka Albert, Soundar Kumara, “Near linear time algorithm to detect community structures in large-scale
networks“, Physics Review E 76, 036106 (2007)
Valarmathi.M.L,
Kowshalya.M, Aarthi.M, 2015 Research Challenges in the Social Internet of
Things (SIoT) A Survey, Proceedings of National Conference on Science Research
and Information Technology :128-133
W. W.
Zachary, An information flow model for conflict and fission in small groups,
Journal of Anthropological Research 33, 452-473 ,1977
Wei Wei ;
Fengyuan Xu ; Tan, C.C. ; Qun Li, “SybilDefender: Defend against sybil attacks
in large social networks“, Proceeding of IEEE InfoComm, PP: 1951-1959, March
2012.
Yan ,Lihua Yin, “A Security Routing Mechanism against
Sybil Attacks in Mobile Social Networks“, APWeb Workshops,pp.325-332, Springer,
2014.