{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T11:35:33Z","timestamp":1763552133308,"version":"build-2065373602"},"reference-count":39,"publisher":"MDPI AG","issue":"13","license":[{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Peer-to-peer (P2P) networking is becoming prevalent in Internet of Thing (IoT) platforms due to its low-cost low-latency advantages over cloud-based solutions. However, P2P networking suffers from several critical security flaws that expose devices to remote attacks, eavesdropping and credential theft due to malicious peers who actively work to compromise networks. Therefore, trust and reputation management systems are emerging to address this problem. However, most systems struggle to identify new smart models of malicious peers, especially those who cooperate together to harm other peers. This paper proposes an intelligent trust management system, namely, Trutect, to tackle this issue. Trutect exploits the power of neural networks to provide recommendations on the trustworthiness of each peer. The system identifies the specific model of an individual peer, whether good or malicious. The system also detects malicious collectives and their suspicious group members. The experimental results show that compared to rival trust management systems, Trutect raises the success rates of good peers at a significantly lower running time. It is also capable of accurately identifying the peer model.<\/jats:p>","DOI":"10.3390\/s21134484","type":"journal-article","created":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T02:44:39Z","timestamp":1625107479000},"page":"4484","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Managing Trust and Detecting Malicious Groups in Peer-to-Peer IoT Networks"],"prefix":"10.3390","volume":"21","author":[{"given":"Alanoud","family":"Alhussain","sequence":"first","affiliation":[{"name":"Computer Science Department, College of Computer and Information Sciences, King Saud University, Riyadh 11451, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6110-9657","authenticated-orcid":false,"given":"Heba","family":"Kurdi","sequence":"additional","affiliation":[{"name":"Computer Science Department, College of Computer and Information Sciences, King Saud University, Riyadh 11451, Saudi Arabia"},{"name":"Mechanical Engineering Department, School of Engineering, Massachusetts Institute of Technology (MIT), Cambridge, MA 02142, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8535-4729","authenticated-orcid":false,"given":"Lina","family":"Altoaimy","sequence":"additional","affiliation":[{"name":"Information Technology Department, College of Computer and Information Sciences, King Saud University, Riyadh 11451, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2021,6,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MC.2015.12","article-title":"Enabling the internet of things","volume":"48","author":"Want","year":"2015","journal-title":"Computer"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"de Mendon\u00e7a, F.L., da Cunha, D.F., Praciano, B.J., da Rosa Zanatta, M., da Costa, J.P.C., and de Sousa, R.T. (2019, January 3\u20134). P2PIoT: A peer-to-peer communication model for the internet of things. Proceedings of the 2019 Workshop on Communication Networks and Power Systems (WCNPS), Brasilia, Brazil.","DOI":"10.1109\/WCNPS.2019.8896313"},{"key":"ref_3","unstructured":"Chang, Z. (2021, June 08). Ernet of ThingsInside the Smart Home: IoT Device Threats and Attack Scenarios Inside the Smart Home: IoT Device Threats and Attack Scenarios. TREND MICRO RESEARCH. Available online: https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/inside-the-smart-home-iot-device-threats-and-attack-scenarios."},{"key":"ref_4","unstructured":"Davoudi, A., and Chatterjee, M. (2021, June 08). Modeling Trust for Rating Prediction in Recommender Systems. Available online: http:\/\/eecs.ucf.edu\/~anahita\/davoudi2016modeling.pdf."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/2934681","article-title":"Model-based collaborative personalized recommendation on signed social rating networks","volume":"16","author":"Costa","year":"2016","journal-title":"ACM Trans. Internet Technol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"6063456","DOI":"10.1155\/2018\/6063456","article-title":"A smart trust management method to detect on-off attacks in the internet of things","volume":"2018","author":"Caminha","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Borzymek, P., Sydow, M., and Wierzbicki, A. (2009, January 24\u201327). Enriching trust prediction model in social network with user rating similarity. Proceedings of the 2009 International Conference on Computational Aspects of Social Networks, Fontainebleau, France.","DOI":"10.1109\/CASoN.2009.30"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Akbani, R., Korkmaz, T., and Raju, G.V.S. (December, January 30). A machine learning based reputation system for defending against malicious node behavior. Proceedings of the IEEE GLOBECOM 2008\u20142008 IEEE Global Telecommunications Conference, New Orleans, LA, USA.","DOI":"10.1109\/GLOCOM.2008.ECP.408"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Wei, X., Ahmed, T., Chen, M., and Pathan, A.K. (February, January 30). PeerMate: A malicious peer detection algorithm for P2P systems based on MSPCA. Proceedings of the 2012 International Conference on Computing, Networking and Communications (ICNC), Maui, HI, USA.","DOI":"10.1109\/ICCNC.2012.6167537"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Srivatsa, M., Xiong, L., and Liu, L. (2005, January 10\u201314). TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. Proceedings of the 14th International Conference on World Wide Web, Chiba, Japan.","DOI":"10.1145\/1060745.1060808"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Yan, Z. (2010). An evaluation framework for reputation management systems. Trust Modeling and Management in Digital Environments: From Social Concept to System Development, IGI Global.","DOI":"10.4018\/978-1-61520-682-7"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1076","DOI":"10.1109\/TPDS.2016.2611660","article-title":"GroupTrust: Dependable trust management","volume":"28","author":"Fan","year":"2017","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Donato, D., Paniccia, M., Selis, M., Castillo, C., Cortese, G., and Leonardi, S. (2007, January 8). New metrics for reputation management in P2P networks. Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web, Banff, Alberta.","DOI":"10.1145\/1244408.1244421"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"L\u00f3pez, J., and Maag, S. (2015, January 20\u201322). Towards a generic trust management framework using a machine-learning-based trust model. Proceedings of the 2015 IEEE Trustcom\/BigDataSE\/ISPA, Helsinki, Finland.","DOI":"10.1109\/Trustcom.2015.528"},{"key":"ref_15","unstructured":"Song, W., and Phoha, V.V. (2004, January 9). Neural network-based reputation model in a distributed system. Proceedings of the IEEE International Conference on e-Commerce Technology, San Diego, CA, USA."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1159","DOI":"10.1016\/j.comcom.2013.04.003","article-title":"Trust-based security for the OLSR routing protocol","volume":"36","author":"Adnane","year":"2013","journal-title":"Comput. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3729","DOI":"10.1007\/s11227-015-1543-4","article-title":"Leveraging information security and computational trust for cybersecurity","volume":"72","author":"Villalba","year":"2016","journal-title":"J. Supercomput."},{"key":"ref_18","first-page":"1","article-title":"Trust model for reliable file exchange in cloud computing","volume":"4","author":"Canedo","year":"2012","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"ref_19","unstructured":"Canedo, E.D., de Oliveira Albuquerque, R., and de Sousa, R.T. (2011). Trust model for file sharing in cloud computing. The Second International Conference on Cloud Computing, GRIDs, and Virtualization, ACM."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Kurdi, H., Althnian, A., Abdulghani, M., and Alkharji, S. (2020). An Adjusted Free-Market-Inspired Approach to Mitigate Free-Riding Behavior in Peer-to-Peer Fog Computing. Electronics, 9.","DOI":"10.3390\/electronics9122027"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/TPDS.2007.1021","article-title":"PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing","volume":"18","author":"Zhou","year":"2007","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.ins.2015.11.015","article-title":"An interval type-2 fuzzy logic based framework for reputation management in Peer-to-Peer e-commerce","volume":"333","author":"Acampora","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_23","first-page":"159","article-title":"Self-enforcing protocols via co-utile reputation management","volume":"367\u2013368","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., and Garcia-Molina, H. (2003, January 20\u201324). The Eigentrust algorithm for reputation management in P2P networks. Proceedings of the 12th International Conference on World Wide Web, Budapest, Hungary.","DOI":"10.1145\/775240.775242"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"3534","DOI":"10.1007\/s11227-018-2669-y","article-title":"A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments","volume":"75","author":"Kurdi","year":"2019","journal-title":"J. Supercomput."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Patwary, A., Naha, R., Garg, S., Battula, S., Patwary, A.K., Aghasian, E., Amin, M., Mahanti, A., and Gong, M. (2021). Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control. Electronics, 10.","DOI":"10.3390\/electronics10101171"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2130006","DOI":"10.1142\/S0218126621300063","article-title":"A Survey on Internet of Things: Applications, Recent Issues, Attacks, and Security Mechanisms","volume":"30","author":"Radhika","year":"2021","journal-title":"J. Circuits Syst. Comput."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/1120717.1120721","article-title":"A non-manipulable trust system based on EigenTrust","volume":"5","author":"Abrams","year":"2005","journal-title":"SIGecom Exch."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1016\/j.procs.2016.08.056","article-title":"An EigenTrust-based hybrid trust model in P2P file sharing networks","volume":"94","author":"Lu","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_30","first-page":"315","article-title":"HonestPeer: An enhanced eigentrust algorithm for reputation management in p2p systems","volume":"27","author":"Kurdi","year":"2015","journal-title":"J. King Saud. Univ. Comput. Inf. Sci."},{"key":"ref_31","unstructured":"J\u00f8sang, A., Hayward, R., and Pope, S. (2006, January 29\u201331). Trust network analysis with subjective logic. Proceedings of the Twenty-Ninth Australasian Computer Science Conference (ACSW 2006), Hobart, Australia."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1109\/TIFS.2018.2866319","article-title":"A multimodal deep learning method for android malware detection using various features","volume":"14","author":"Kim","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"McLachlan, G.J. (1992). Discriminant Analysis and Statistical Pattern Recognition, Wiley.","DOI":"10.1002\/0471725293"},{"key":"ref_34","unstructured":"Mitchell, T.M. (1997). Machine Learning, McGraw Hill."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"700","DOI":"10.1111\/coin.12022","article-title":"A generic trust framework for large-scale open systems using machine learning","volume":"30","author":"Liu","year":"2014","journal-title":"Comput. Intell."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.future.2017.09.060","article-title":"ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks","volume":"79","author":"Ma","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Hauke, S., Biedermann, S., M\u00fchlh\u00e4user, M., and Heider, D. (2013, January 16\u201318). On the application of supervised machine learning to trustworthiness assessment. Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, VIC, Australia.","DOI":"10.1109\/TrustCom.2013.5"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Dang, Q., and Ignat, C. (2017, January 15\u201317). dTrust: A simple deep learning approach for social recommendation. Proceedings of the 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), San Jose, CA, USA.","DOI":"10.1109\/CIC.2017.00036"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Zhang, D., Yu, F., Yang, R., and Tang, H. (2019, January 25\u201329). A Deep Reinforcement Learning-based Trust Management Scheme for Software-defined Vehicular Networks. Proceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications\u2014DIVANet\u201918, Miami Beach, FL, USA.","DOI":"10.1145\/3272036.3272037"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/13\/4484\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:23:52Z","timestamp":1760163832000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/13\/4484"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,30]]},"references-count":39,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2021,7]]}},"alternative-id":["s21134484"],"URL":"https:\/\/doi.org\/10.3390\/s21134484","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,6,30]]}}}