A multi-dimensional trust attestation solution in 5G-IoT

IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Digital Communications and Networks Pub Date : 2025-02-01 DOI:10.1016/j.dcan.2023.10.003
Xiangrong Li , Yu Zhang , Haotian Zhu , Yubo Wang , Junjia Huang
{"title":"A multi-dimensional trust attestation solution in 5G-IoT","authors":"Xiangrong Li ,&nbsp;Yu Zhang ,&nbsp;Haotian Zhu ,&nbsp;Yubo Wang ,&nbsp;Junjia Huang","doi":"10.1016/j.dcan.2023.10.003","DOIUrl":null,"url":null,"abstract":"<div><div>The core missions of IoT are to sense data, transmit data and give feedback to the real world based on the calculation of the sensed data. The trust of sensing source data and transmission network is extremely important to IoT security. 5G-IoT with its low latency, wide connectivity and high-speed transmission extends the business scenarios of IoT, yet it also brings new challenges to trust proof solutions of IoT. Currently, there is a lack of efficient and reliable trust proof solutions for massive dynamically connected nodes, while the existing solutions have high computational complexity and can't adapt to time-sensitive services in 5G-IoT scenarios. In order to solve the above problems, this paper proposes an adaptive multi-dimensional trust proof solution. Firstly, the static and dynamic attributes of sensing nodes are metricized, and the historical interaction as well as the recommendation information are combined with the comprehensive metric of sensing nodes, and a multi-dimensional fine-grained trusted metric model is established in this paper. Then, based on the comprehensive metrics, the sensing nodes are logically grouped and assigned with service levels to achieve the screening and isolation of malicious nodes. At the same time, the proposed solution reduces the energy consumption of the metric process and optimizes the impact of real-time metrics on the interaction latency. Simulation experiments show that the solution can accurately and efficiently identify malicious nodes and effectively guarantee the safe and trustworthy operation of 5G-IoT nodes, while having a small impact on the latency of the 5G network.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 1","pages":"Pages 225-233"},"PeriodicalIF":7.5000,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Communications and Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2352864823001542","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

The core missions of IoT are to sense data, transmit data and give feedback to the real world based on the calculation of the sensed data. The trust of sensing source data and transmission network is extremely important to IoT security. 5G-IoT with its low latency, wide connectivity and high-speed transmission extends the business scenarios of IoT, yet it also brings new challenges to trust proof solutions of IoT. Currently, there is a lack of efficient and reliable trust proof solutions for massive dynamically connected nodes, while the existing solutions have high computational complexity and can't adapt to time-sensitive services in 5G-IoT scenarios. In order to solve the above problems, this paper proposes an adaptive multi-dimensional trust proof solution. Firstly, the static and dynamic attributes of sensing nodes are metricized, and the historical interaction as well as the recommendation information are combined with the comprehensive metric of sensing nodes, and a multi-dimensional fine-grained trusted metric model is established in this paper. Then, based on the comprehensive metrics, the sensing nodes are logically grouped and assigned with service levels to achieve the screening and isolation of malicious nodes. At the same time, the proposed solution reduces the energy consumption of the metric process and optimizes the impact of real-time metrics on the interaction latency. Simulation experiments show that the solution can accurately and efficiently identify malicious nodes and effectively guarantee the safe and trustworthy operation of 5G-IoT nodes, while having a small impact on the latency of the 5G network.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
5G-IoT中的多维信任认证解决方案
物联网的核心任务是感知数据,传输数据,并根据感知数据的计算向现实世界反馈。传感源数据和传输网络的信任对物联网安全至关重要。5G-IoT以其低延迟、宽连接、高速传输的特性,拓展了物联网的业务场景,同时也给物联网的可信证明解决方案带来了新的挑战。目前缺乏针对海量动态连接节点的高效可靠的可信证明解决方案,现有解决方案计算复杂度高,无法适应5G-IoT场景下的时间敏感业务。为了解决上述问题,本文提出了一种自适应多维信任证明方案。首先,对感知节点的静态和动态属性进行度量,并将历史交互和推荐信息与感知节点的综合度量相结合,建立多维细粒度可信度量模型;然后,基于综合度量,对感知节点进行逻辑分组并分配服务等级,实现对恶意节点的筛选和隔离。同时,该方案降低了度量过程的能耗,优化了实时度量对交互延迟的影响。仿真实验表明,该方案能够准确高效地识别恶意节点,有效保障5G- iot节点的安全可信运行,同时对5G网络时延影响较小。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Digital Communications and Networks
Digital Communications and Networks Computer Science-Hardware and Architecture
CiteScore
12.80
自引率
5.10%
发文量
915
审稿时长
30 weeks
期刊介绍: Digital Communications and Networks is a prestigious journal that emphasizes on communication systems and networks. We publish only top-notch original articles and authoritative reviews, which undergo rigorous peer-review. We are proud to announce that all our articles are fully Open Access and can be accessed on ScienceDirect. Our journal is recognized and indexed by eminent databases such as the Science Citation Index Expanded (SCIE) and Scopus. In addition to regular articles, we may also consider exceptional conference papers that have been significantly expanded. Furthermore, we periodically release special issues that focus on specific aspects of the field. In conclusion, Digital Communications and Networks is a leading journal that guarantees exceptional quality and accessibility for researchers and scholars in the field of communication systems and networks.
期刊最新文献
A blockchain-based user-centric identity management toward 6G networks Editorial Board Cross-domain resources optimization for hybrid edge computing networks: Federated DRL approach Radio map estimation using a CycleGAN-based learning framework for 6G wireless communication Autonomous network management for 6G communication: A comprehensive survey
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1