A substantial body of literature exists on scalable trust evaluation models designed for IoT environments; however, these schemes cannot always be directly applied to SIoT networks due to their inability to handle the complex and dynamic nature of social interactions, as well as the increased scalability requirements. Therefore, this subsection only reviews the trust management schemes designed for SIoT with a focus on scalability and highlights their strengths and limitations. Subsequently, a brief review of lightweight trust management schemes designed for SIoT is presented, followed by a discussion of the conclusions drawn from this state-of-the-art review.
2.1. Scalable Trust Management Systems for SIoT
A community of interest-based trust management systems was proposed by [
25], which focuses on scalability, adaptability, and survivability (i.e., the resiliency of the proposed model—the device’s trust converges to ground truth even in the presence of malevolent nodes). This is an encounter- and activity-based protocol, each node only maintains trust evaluations for a specific number of nodes that share common interests to reduce computational overhead. The trust properties, such as subjectivity, honesty, cooperativeness and community of interests, are considered. The limited storage problem has been considered and a storage management strategy has been suggested for resource-constrained nodes, this way the proposed system is scalable for application in large-scale SIoT systems. In the case of limited or full storage, the storage management module discards previous trust values for the nodes that have trust scores below 50%; however, the effect of this mechanism on the proposed scheme has not been evaluated for SIoT environments. The proposed trust management protocol is only validated through simulations with 400 nodes, whereas real-world IoT systems can be comprised of thousands of devices, leaving its scalability and performance in larger networks unexplored.
Kokoris-Kogias et al. [
26] introduced a trust and reputation model for the SIoT (i.e., TRM-SIoT) based on the COSMOS project [
27] to enhance scalability and reliability. Each node evaluates the trust value of another node based on its own interactions/experiences. The reputation index can be determined either by consulting a node’s friends or from the management system used in COSMOS. An encoding mechanism has been designed to categorize the malicious behavior of nodes by combining several behavior anomalies such as malicious service provision, recommendations, and oscillating behaviors (i.e., behavioral anomalies are depicted by three-bit numbers, where ‘000’ refers to a completely honest node and the rest of the sequence indicates different degrees of maliciousness). The proposed model excludes malevolent peers from SIoT networks while offering relatively low computational overhead and high scalability due to the hybrid architecture. However, the authors assume that IoT objects have sufficient computational power and ability to connect to the internet and those that do not have this ability cannot be a part of the proposed trust management system. Nevertheless, these devices can use another node in the network as a gateway, but if the network is comprised of strictly resource-constrained nodes or no trustworthy device is available to be used as a gateway, then deploying the proposed model becomes challenging.
Abderrahim et al. [
28] developed a context-based trust management system considering several aspects: the scalability and dynamicity of IoT networks (i.e., varying contexts), social relationships, and a device’s ability/attributes. The system is capable of selecting the most trustworthy objects or service providers without requiring a prior history of objects using a decision tree mechanism. The proposed system is comprised of two modules: the trust module computes the contextual and reputation trust, and the learning module is responsible for classifying and predicting node behaviors. The Jaccard index (i.e., a statistic for measuring similarity or diversity between finite sets) has been used to compute social similarity among the objects. An objective approach has been designed to extract different trust values/indexes for varying contexts and services. Trust evaluations are stored in the trust manager and later supplied to the trust management server. Double penalties are imposed on maliciously behaving nodes. The authors acknowledge that IoT devices are resource-constrained and so is their battery life, hence it is not feasible to compute and store trust values on them. Having said that, a centralized architecture is proposed; therefore, a trusted server is always needed to install/configure the proposed scheme—this could lead to a single point of failure if the server is compromised. Moreover, an assumption has been made that it is very rare to find malicious nodes for co-location and co-ownership social relationships; based on this assumption initially high trust values are assigned to the nodes with the aforesaid relationships, and the nodes with relationships other those are rated relatively low during the bootstrapping period—a malicious node with a co-location relationship and a high trust value could benefit from this at least once and attack benign nodes in the network.
Sciddurlo et al. [
29] proposed a multi-layered architecture for SIoT to ensure trusted and scalable service provision. Utilizing a fog-based approach, computational tasks are distributed across various layers, enhancing both scalability and fault tolerance. In the initial fog layer, the trust management system assesses the trustworthiness of service providers (i.e., trust is computed by combining the sociality factor, which evaluates direct and indirect social relationships, and the reputation, which aggregates direct feedback, indirect friend feedback, and non-friend feedback to provide a comprehensive trust value for each service provider) and oversees resource availability, directing service requests to reliable and available nodes to prevent network congestion and boost service reliability. The second fog layer integrates blockchain technology to securely share services, relationships, and trust values across different organizations and service domains, thereby maintaining data integrity and scalability. Through computer simulations, the authors have shown that this architecture significantly enhances service provisioning speed and effectively manages high traffic loads better than conventional methods. Furthermore, the advantage of this multi-layered fog computing approach lies in its ability to reduce the burden on individual IoT devices by distributing tasks. However, managing the communication overhead among multiple fog nodes will be a significant challenge to achieve scalability.
Abdelghani et al. [
3] proposed a dynamic and scalable multi-level trust management model (i.e., DLS-STM) tailored to SIoT environments. The model introduces a multidimensional trust framework incorporating user trust (i.e., the user’s ability to deliver reliable services and their honesty in offering truthful and representative feedback and recommendations—composed using key metrics such as credibility, reputation, direct experience, rating frequency, rating trends, similarity, relationship strength, and fluctuation); device trust (i.e., the device’s ability to execute the required service—uses the metrics computing capacity, storage capacity, device security, and energy limitation of a device) and service trust (i.e., the ability of a service to meet the user’s request—uses metrics such as response time, availability, success rate, and latency). The model is designed to be resilient against various trust attacks, such as ballot-stuffing, bad-mouthing, self-promotion, discriminatory, on-off, and opportunistic attacks, etc., through an attack detection module that employs machine learning algorithms (i.e., Naive Bayes, Radial Basis Function Networks, and Multi-Layer Perceptron). Nevertheless, in a large-scale SIoT environment, the employed machine learning algorithms can introduce significant overhead due to their computationally intensive nature [
30], potentially overwhelming trusted nodes despite the distributed approach, and this will lead to slower response times and decreased overall system performance as the network grows. A hybrid propagation strategy is used, which combines centralized and decentralized approaches to efficiently disseminate trust values within the SIoT network—by leveraging trustful nodes and distributed hash tables for trust calculations and storage, the model alleviates the computational burden on individual nodes, thereby enhancing scalability. However, the reliance on trustful nodes could introduce potential bottlenecks or single points of failure if an adequate count of trustful/fog nodes are not deployed or present in the SIoT network [
31,
32].
Sagar et al. [
33] argues that most of the existing trust models proposed for SIoT are unable to validate their model due to the unavailability of the datasets. Therefore, they proposed a scalable and robust platform named SCaRT-SIoT. The platform is composed of three layers: the perception layer (sensors, actuators, and edge devices), the network layer (routers and gateways), and the application layer (cloud/servers). SCaRT-SIoT employs various trust metrics such as packet delivery ratio (PDR), social similarity (friendships and communities of interest), and direct trust observations to evaluate the trustworthiness of objects within the network. The platform is demonstrated using Raspberry Pi Zero devices integrated with AWS IoT Core as the edge server. The platform records detailed interaction data between objects, including the time of interaction, the IDs of interacting objects, packets forwarded and dropped, PDR, friendships, and community affiliations. However, the platform’s scalability is poorly validated due to its reliance on external cloud services such as AWS IoT Core—in real-world scenarios, network latency and potential cloud service downtime could drastically impair the platform’s ability to handle large volumes of data in real time; the use of basic hardware like Raspberry Pi Zero devices for prototype validation—though these low-cost devices are suitable for basic tasks, they are not indicative of the diverse and often more resource-intensive hardware found in practical SIoT deployments; and the lack of comprehensive performance analysis including stress and load testing to evaluate the platform’s performance under high data loads and increased numbers of connected devices.
Magdich et al. [
34] proposed a hybrid trust update method that combines event-driven and time-driven approaches to adapt to the evolving behaviors of SIoT nodes, thereby maintaining accurate and reliable trust scores within the SIoT environments. In addition, the model employs a decentralized architecture for trust propagation, distributing the computation and storage of trust metrics across the network to enhance scalability and reduce the risk of bottlenecks and single points of failure. Experiments are conducted to demonstrate the model’s theoretical scalability by showing that it can maintain high accuracy, precision, recall, and F-measure values even as the proportion of malicious nodes increases. However, the evaluation does not fully capture the complexities and challenges of scalability in real-world SIoT environments such as communication overhead, computational load, varying network conditions, etc.
Rouzbahani and Taghiyareh [
35] proposed a scalable trust management system (i.e., SCoTMan) for SIoT that leverages smart contracts and social interactions using the hyperledger fabric platform to calculate both direct and indirect trust values. Direct trust is computed using a Bayesian approach with exponential decay based on satisfaction feedback, while indirect trust is calculated using recommendations from nodes selected on the basis of social metrics such as friendship, interest, and contact similarity, all measured using the Jaccard similarity coefficient. SCoTMan minimizes computational and storage overhead by selectively storing the relevant interaction records. Furthermore, the model incorporates memory constraints to limit the total storage cost by capping the number of memory units each user can use, ensuring that storage remains manageable and scalable as the network grows. The scalability of SCoTMan is validated through experiments under different transaction rates (from 10 to 400 transactions per second) and storage limitations (by setting the maximum number of memory units per user to 10 and 20, as well as an unlimited condition, to ensure efficient operation under real-world constraints). However, the model’s performance under high node turnover rates, which are common in SIoT networks, can lead to frequent recalculations and increased overhead affecting the overall scalability of the model.
Jung et al.’s [
4] TASS (i.e., trust augmented social strength framework for SIoT service composition) integrates a social strength metric (e.g., shared usage and spatial proximity) with adaptive trust estimation that combines time-decayed direct evidence and socially weighted indirect recommendations from socially similar peers, thereby enabling decentralized partner selection in SIoT and, in principle, supporting reduced coordination overhead, distributed decision making, and resilience against malicious entities/attacks, which are all vital features for achieving scalability in large, heterogeneous SIoT environments. Older interactions gradually lose influence, while the system adaptively balances personal reliability with community reputation. Nonetheless, their scalability claim remains insufficiently substantiated, and its real-world scale is unclear because there is no empirical analysis of computational and communication costs in large, dynamic networks. Key hyperparameters (i.e.,
,
,
,
) are tuned but not stress tested for changing networks or uneven connections.
Moeinaddini et al. [
6] proposed a decentralized, self-adaptive trust model (SATM-SIoT) that offloads trust computation to fog nodes, augments local MLP classifiers with federated learning (FL), and employs a MAPE-K loop to adapt the “malicious” threshold based on observed hostility. The authors aimed to couple scalability with adaptivity and resource awareness in SIoT. Each potential service provider is scored using a small set of signals: social connection strength, position in the network, the past reliability of recommenders, a simple capability class for computing and energy limits, and four behavior measures that capture overall quality, usefulness, steadiness, and fluctuation; these signals feed a small neural network on the edge server that classifies providers into broad trust levels, with short rolling histories to cap cost, and repeated bad behavior eventually triggers blocking; periodically the edge servers aggregate their local models so future classifications benefit from wider experience. However, there is no clear accounting of computation, memory, or network overhead per request or per model sharing round; the evaluation is limited to a small simulated setup with optimistic assumptions about reliable links and honest infrastructure. Coordination across edge servers, especially how block decisions propagate and recover, is underspecified, and key thresholds, history sizes, and capability classes are set heuristically without sensitivity or stability analysis.
The presented review covers a spectrum of studies, from early trust management models to recently developed models and platforms for SIoT as detailed in
Table 1, with a particular emphasis on scalability. Several key insights have been identified: most trust models, such as [
25,
26,
28], emphasize the aspect of scalability but often fall short in real-world validation and handling large-scale SIoT networks effectively. While real-world validation is feasible, the unavailability of suitable SIoT validation environments poses a significant barrier. Therefore, the proposed work evaluates scalability in a simulated SIoT environment comprising 10,000 nodes. Architectures proposed by [
28,
29] enhance scalability through centralized and fog-based approaches, yet they fail to address the extensive coordination and overhead issues inherent in such deployments. The proposed trust model (i.e., MMTE) is designed to be lightweight, thereby mitigating the overhead concerns indicated in these studies. Abdelghani et al. [
3] presents a scalable model utilizing machine learning but faces potential bottlenecks due to the computational demands of these algorithms. In contrast, the MMTE model avoids computationally complex mechanisms while composing, computing, and aggregating trust or making trust decisions. Sagar et al. [
33] demonstrates a platform with practical scalability but is constrained by its dependence on external cloud services and basic hardware, which may not scale efficiently in diverse real-world SIoT environments—the proposed mechanism (i.e., trust spheres) ensures scalability without dependence on external services. The performance of Rouzbahani and Taghiyareh [
35]’s model decreases as the node turnover rate increases; conversely, the MMTE model and trust spheres together are engineered to maintain robust scalability ensuring consistent performance despite fluctuations in the node turnover rate. Furthermore, the models (e.g., [
3,
25,
26,
28]) have demonstrated their utility in separating malicious nodes from benign ones; MMTE enhances this capability by ensuring more accurate identification of malicious behavior or entities. Moeinaddini et al. [
6] made optimistic assumptions regarding trustworthy links, and Jung et al.’s [
4] claim of improved scalability remains insufficiently substantiated; however the proposed MMTE model makes no such assumptions and evaluates scalability with a varying number of nodes. In conclusion, while advancements have been made, the practical scalability in large and resource-constrained SIoT environments remains a critical challenge to be addressed, necessitating further research and optimization.
2.2. Lightweight Trust Management Systems for SIoT
Cai et al. [
24] proposed TIRec (i.e, a lightweight trust inference model), which integrates direct and indirect trust relationships with rating data to enhance service recommendations by introducing a user-weighted centrality metric and employing a lightweight trust path selection algorithm to infer indirect trust relationships effectively countering malicious behaviors and improving recommendation accuracy. Experimental results on three real-world datasets demonstrate that TIRec outperforms existing methods, particularly in scenarios with sparse data and cold start users. The path selection algorithm however uses breadth-first search and constructs offline dictionaries for all users to store comprehensive weighted centrality values. While these processes are intended to be performed offline, the initial computation and storage requirements can be significant, especially in large-scale SIoT networks with many users and trust relationships.
Amiri-Zarandi et al. [
20] proposed LBTM (i.e., a lightweight trust evaluation scheme for SIoT utilizing social information of IoT entities and smart contracts on an Ethereum-based private blockchain). Trust in LBTM is computed by combining direct and indirect trust evaluations; direct trust is updated based on feedback from interactions using a time decay factor, while indirect trust is calculated as a weighted average of trust evaluations from other nodes (counselors), with weights determined by social ties and past interactions. The overall trust value is then a weighted sum of these direct and indirect trust values. However, the continuous updating and calculation of direct and indirect trust values require significant computational resources. The trust path selection algorithm and the generation of counselor lists, which involve the computation of social ties and dynamic updates, impose additional processing burdens. Therefore, these processes can strain the limited computational capacities of IoT devices, particularly in large and dynamic SIoT networks.
Hasan et al. [
36] target routing in socially oriented and opportunistic IoT and propose a trust-based next-hop selection scheme that fuses two local signals [i.e., social interest compatibility and behavioral reliability via probabilistic inference (i.e., Bayesian updates with Jeffrey’s conditioning)], thereby minimizing computation, memory, and messaging overhead on resource-constrained SIoT. The scheme emphasizes lightweightness by relying only on locally available, firsthand information and single-hop decision making rather than global reputation exchange. Despite the local design, the model maintains a per-interest, per-neighbor state and performs floating-point probability updates; but the work does not quantify RAM per neighbor or MCU-level cycle/energy costs.
Jmal et al. [
37] introduced a hybrid trust framework that combines zero-knowledge proofs (ZKPs) for authentication and FL for trust evaluation within SIoT environments. To compute trust, each node locally trains on six lightweight metrics including reputation change rate, rating consistency, rating disparity, temporal rating pattern, negative rating ratio, and proximity-based rating similarity, to classify interactions as normal or malicious. These local model weights are then aggregated into a global trust model via a blockchain coordinated consensus (i.e., FedProx-inspired), enabling decentralized trust evaluation without sharing raw data. This process produces each node’s trust value while preserving privacy and minimizing data transmission. From a lightweightness perspective, this study achieves modest gains through compact proof structures and selective feature sets, but remains computationally heavy in the key generation, model training, and synchronisation phases.
Lightweight solutions for SIoT are available, providing various applications such as securing communications within SIoT networks [
38], and implementing privacy-preserving protocols for vehicle-to-grid (V2G) applications in SIoT [
39,
40] etc. On the other hand, several lightweight trust management systems for IoT, e.g., [
19,
21,
41,
42,
43] also exist; however, they often do not consider the contextual information inherent in the SIoT environments, such as types of social relationships, interaction history, user preferences, dynamic network topology, etc. Thus, this review is confined to lightweight trust management systems specifically designed for SIoT (summarized in
Table 2). It is also noteworthy that most trust management systems in SIoT do not emphasize lightweightness as a key design feature and are more focused on the comprehensive/accurate trust evaluation while ignoring the resource constraints associated with the SIoT paradigm.
In addressing the challenges of trust management in heterogeneous networked systems such as SIoT, a fundamental dichotomy is always confronted: the comprehensiveness of trust assessment versus resource constraints in data collection, processing, storage, and dissemination [
44]. Mostly, trust management frameworks tend to amass extensive records of trust-related data (e.g., opinions/feedback, data regarding prior trust transactions, and data regarding network structure/proximity, etc.). While it is irrefutable that a richer set of trust metrics can potentially yield more accurate trust evaluations, this approach invariably demands significant resource allocation, which is not always possible in the SIoT networks due to limited computational power, energy consumption, memory constraints, communication overhead, scalability issues, and device heterogeneity, etc. Recognizing the necessity to balance thoroughness with efficiency, this work advocates for a strategy that prioritizes the collection of minimal data required for effective trust assessment. To this end, a novel concept of ’micro-moments’ is introduced—concise yet informative snapshots of interactions/moments. This approach narrows the focus to pivotal interactions, streamlining the trust assessment process while maintaining its integrity and relevance. This approach not only aligns with the resource constraints inherent in heterogeneous systems such as SIoT but also offers a pragmatic solution to achieving a balanced and resource-aware trust evaluation. Moreover, as observed with some reputation-based trust management systems, there is a risk of manipulation through Sybil attacks or false feedback. By focusing on direct observation of the device’s behavior in micro-moments, MMTE inherently reduces its vulnerability to such attacks, enhancing the robustness of trust assessments. Furthermore, while many existing systems quantify trust based on the volume of interactions (e.g., frequency of communications or amount of data exchanged), MMTE emphasizes the quality of interactions. This approach recognizes that a few significant interactions can be more telling of a device’s trustworthiness than numerous trivial exchanges because significant interactions often encompass critical tasks that directly impact performance, making them more indicative of a device’s true trustworthiness than a high volume of less consequential activities. While MMTE aims to minimize data collection to enhance efficiency, there is a delicate balance to maintain as insufficient data could lead to incomplete or inaccurate trust assessments.