面向安全物联网交互的动态基于信任的设备合法性评估

IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of Communications Software and Systems Pub Date : 2022-01-01 DOI:10.24138/jcomss-2021-0189
Vishwanath G. Garagad, N. Iyer
{"title":"面向安全物联网交互的动态基于信任的设备合法性评估","authors":"Vishwanath G. Garagad, N. Iyer","doi":"10.24138/jcomss-2021-0189","DOIUrl":null,"url":null,"abstract":"—Establishing trust-based interactions in heteroge- neously connected devices appears to be the prominent mechanism in addressing the prevailing concerns of confidence, re- liability and privacy relevant in establishing secure interactions among connected devices in the network. Trust-based assessment of device legitimacy is evolving given IoT devices’ dynamic and heterogeneous nature and emerging adversaries. However, computation and application of trust level in establishing secure communications, access control and privacy domain are rarely discussed in the literature. To compute trust, based on the quality of service, direct interactions, and the relationship between devices, we introduce a multi-factor trust computation model that considers the multiple attributes of interactions in an IoT network of heterogeneous devices providing a wide range of data and services. Direct trust is estimated for quality of service considering the response time, reliability, consistency, and integrity attributes of devices. The time decay factor influences the credibility of computed trust over time. The policy-driven mechanism is employed to sift the devices and isolate the mali- cious ones. Extensive simulations validate the proposed model’s effectiveness using Contiki’s Cooja simulator for IoT networks.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.6000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Dynamic Trust-Based Device Legitimacy Assessment Towards Secure IoT Interactions\",\"authors\":\"Vishwanath G. Garagad, N. Iyer\",\"doi\":\"10.24138/jcomss-2021-0189\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"—Establishing trust-based interactions in heteroge- neously connected devices appears to be the prominent mechanism in addressing the prevailing concerns of confidence, re- liability and privacy relevant in establishing secure interactions among connected devices in the network. Trust-based assessment of device legitimacy is evolving given IoT devices’ dynamic and heterogeneous nature and emerging adversaries. However, computation and application of trust level in establishing secure communications, access control and privacy domain are rarely discussed in the literature. To compute trust, based on the quality of service, direct interactions, and the relationship between devices, we introduce a multi-factor trust computation model that considers the multiple attributes of interactions in an IoT network of heterogeneous devices providing a wide range of data and services. Direct trust is estimated for quality of service considering the response time, reliability, consistency, and integrity attributes of devices. The time decay factor influences the credibility of computed trust over time. The policy-driven mechanism is employed to sift the devices and isolate the mali- cious ones. Extensive simulations validate the proposed model’s effectiveness using Contiki’s Cooja simulator for IoT networks.\",\"PeriodicalId\":38910,\"journal\":{\"name\":\"Journal of Communications Software and Systems\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Communications Software and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.24138/jcomss-2021-0189\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Communications Software and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24138/jcomss-2021-0189","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 1

摘要

-在异构连接设备中建立基于信任的交互似乎是解决普遍存在的信任、责任和隐私问题的重要机制,这些问题与在网络中连接设备之间建立安全交互有关。鉴于物联网设备的动态和异构性质以及新兴对手,基于信任的设备合法性评估正在不断发展。然而,文献中很少讨论信任等级在建立安全通信、访问控制和隐私域等方面的计算和应用。为了计算信任,基于服务质量、直接交互和设备之间的关系,我们引入了一个多因素信任计算模型,该模型考虑了提供广泛数据和服务的异构设备组成的物联网网络中交互的多个属性。直接信任是根据设备的响应时间、可靠性、一致性和完整性等属性来估计服务质量的。随着时间的推移,时间衰减因素会影响计算信任的可信度。采用策略驱动机制对设备进行筛选,对恶意设备进行隔离。广泛的仿真验证了所提出模型的有效性,使用Contiki的Cooja模拟器用于物联网网络。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Dynamic Trust-Based Device Legitimacy Assessment Towards Secure IoT Interactions
—Establishing trust-based interactions in heteroge- neously connected devices appears to be the prominent mechanism in addressing the prevailing concerns of confidence, re- liability and privacy relevant in establishing secure interactions among connected devices in the network. Trust-based assessment of device legitimacy is evolving given IoT devices’ dynamic and heterogeneous nature and emerging adversaries. However, computation and application of trust level in establishing secure communications, access control and privacy domain are rarely discussed in the literature. To compute trust, based on the quality of service, direct interactions, and the relationship between devices, we introduce a multi-factor trust computation model that considers the multiple attributes of interactions in an IoT network of heterogeneous devices providing a wide range of data and services. Direct trust is estimated for quality of service considering the response time, reliability, consistency, and integrity attributes of devices. The time decay factor influences the credibility of computed trust over time. The policy-driven mechanism is employed to sift the devices and isolate the mali- cious ones. Extensive simulations validate the proposed model’s effectiveness using Contiki’s Cooja simulator for IoT networks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Communications Software and Systems
Journal of Communications Software and Systems Engineering-Electrical and Electronic Engineering
CiteScore
2.00
自引率
14.30%
发文量
28
审稿时长
8 weeks
期刊最新文献
Assessment of Transmitted Power Density in the Planar Multilayer Tissue Model due to Radiation from Dipole Antenna Signature-based Tree for Finding Frequent Itemsets Friendy: A Deep Learning based Framework for Assisting in Young Autistic Children Psychotherapy Interventions Ensemble of Local Texture Descriptor for Accurate Breast Cancer Detection from Histopathologic Images Comparison of Similarity Measures for Trajectory Clustering - Aviation Use Case
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1