Smart City Gnosys

Smart city article details

Title A Dynamic Trust-Related Attack Detection Model For Iot Devices And Services Based On The Deep Long Short-Term Memory Technique
ID_Doc 1610
Authors Alghofaili Y.; Rassam M.A.
Year 2023
Published Sensors, 23, 8
DOI http://dx.doi.org/10.3390/s23083814
Abstract The integration of the cloud and Internet of Things (IoT) technology has resulted in a significant rise in futuristic technology that ensures the long-term development of IoT applications, such as intelligent transportation, smart cities, smart healthcare, and other applications. The explosive growth of these technologies has contributed to a significant rise in threats with catastrophic and severe consequences. These consequences affect IoT adoption for both users and industry owners. Trust-based attacks are the primary selected weapon for malicious purposes in the IoT context, either through leveraging established vulnerabilities to act as trusted devices or by utilizing specific features of emerging technologies (i.e., heterogeneity, dynamic nature, and a large number of linked objects). Consequently, developing more efficient trust management techniques for IoT services has become urgent in this community. Trust management is regarded as a viable solution for IoT trust problems. Such a solution has been used in the last few years to improve security, aid decision-making processes, detect suspicious behavior, isolate suspicious objects, and redirect functionality to trusted zones. However, these solutions remain ineffective when dealing with large amounts of data and constantly changing behaviors. As a result, this paper proposes a dynamic trust-related attack detection model for IoT devices and services based on the deep long short-term memory (LSTM) technique. The proposed model aims to identify the untrusted entities in IoT services and isolate untrusted devices. The effectiveness of the proposed model is evaluated using different data samples with different sizes. The experimental results showed that the proposed model obtained a 99.87% and 99.76% accuracy and F-measure, respectively, in the normal situation, without considering trust-related attacks. Furthermore, the model effectively detected trust-related attacks, achieving a 99.28% and 99.28% accuracy and F-measure, respectively. © 2023 by the authors.
Author Keywords deep learning; Internet of Things; long short-term memory; trust management; trust-related attacks


Similar Articles


Id Similarity Authors Title Published
18089 View0.92Ullah F.; Salam A.; Amin F.; Khan I.A.; Ahmed J.; Zaib S.A.; Choi G.S.Deep Trust: A Novel Framework For Dynamic Trust And Reputation Management In The Internet Of Things (Iot)-Based NetworksIEEE Access, 12 (2024)
11751 View0.894Huber B.; Kandah F.; Skjellum A.Beast: Behavior As A Service For Trust Management In Iot DevicesFuture Generation Computer Systems, 144 (2023)
9015 View0.892Souissi H.; Mahamat M.; Jaber G.; Lakhlef H.; Bouabdallah A.Analyses Of Recent Advances On Machine Learning-Based Trust Management For Mobile Iot Applications2022 30th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2022 (2022)
5644 View0.888Ahmadi K.; Javidan R.A Trust Based Anomaly Detection Scheme Using A Hybrid Deep Learning Model For Iot Routing Attacks MitigationIET Information Security, 2024, 1 (2024)
29330 View0.885Luo Z.J.; Pitera W.A.; Zhao S.; Lu Z.; Sagduyu Y.E.How Can The Adversary Effectively Identify Cellular Iot Devices Using Lstm Networks?WiseML 2023 - Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning (2023)
21437 View0.884Patil S.S.; Patil S.P.; Sapate S.G.Dynamic Trust Management For Community-Based Application Using IotAIP Conference Proceedings, 2717 (2023)
36064 View0.881Alfahaid A.; Alalwany E.; Almars A.M.; Alharbi F.; Atlam E.; Mahgoub I.Machine Learning-Based Security Solutions For Iot Networks: A Comprehensive SurveySensors, 25, 11 (2025)
59102 View0.879Dhelim S.; Aung N.; Kechadi M.T.; Ning H.; Chen L.; Lakas A.Trust2Vec: Large-Scale Iot Trust Management System Based On Signed Network EmbeddingsIEEE Internet of Things Journal, 10, 1 (2023)
2167 View0.878Gotarane V.; Abimannan S.; Hussain S.; Irshad R.R.A Hybrid Framework Leveraging Whale Optimization And Deep Learning With Trust-Index For Attack Identification In Iot NetworksIEEE Access, 12 (2024)
33508 View0.873Saini K.S.; Chaudhary S.Investigation On Attack Detection In Iot Networks: A Study And Analysis Of The Existing Machine Learning And Deep Learning Techniques3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025 (2025)