{"title":"as -IoT:物联网中基于信任的自适应安全","authors":"Hamed Hellaoui, A. Bouabdallah, M. Koudil","doi":"10.1109/LCN.2016.101","DOIUrl":null,"url":null,"abstract":"Providing efficient security services in dynamic low-power environments as the Internet of Things (IoT) is a challenging task. The deployment of static security services will consume the energy even if it is not required in some situations, so this induces a waste of resources. In this paper, we introduce an efficient model for adaptive security in the IoT based on trust management. Most of existing adaptive security approaches lack of practical means to evaluate threats. On the other hand, trust management systems are designed to deal with selfish behaviors or internal attacks and not to assist cryptographic measures. Our solution evaluates the trust level related to the presence of security threats among nodes, and adapt consequently cryptographic measures. The obtained simulation results show that our solution reduces considerably energy consumption and remains yet secure.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"51 12 1","pages":"599-602"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"31","resultStr":"{\"title\":\"TAS-IoT: Trust-Based Adaptive Security in the IoT\",\"authors\":\"Hamed Hellaoui, A. Bouabdallah, M. Koudil\",\"doi\":\"10.1109/LCN.2016.101\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Providing efficient security services in dynamic low-power environments as the Internet of Things (IoT) is a challenging task. The deployment of static security services will consume the energy even if it is not required in some situations, so this induces a waste of resources. In this paper, we introduce an efficient model for adaptive security in the IoT based on trust management. Most of existing adaptive security approaches lack of practical means to evaluate threats. On the other hand, trust management systems are designed to deal with selfish behaviors or internal attacks and not to assist cryptographic measures. Our solution evaluates the trust level related to the presence of security threats among nodes, and adapt consequently cryptographic measures. The obtained simulation results show that our solution reduces considerably energy consumption and remains yet secure.\",\"PeriodicalId\":6864,\"journal\":{\"name\":\"2016 IEEE 41st Conference on Local Computer Networks (LCN)\",\"volume\":\"51 12 1\",\"pages\":\"599-602\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"31\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 41st Conference on Local Computer Networks (LCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LCN.2016.101\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCN.2016.101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Providing efficient security services in dynamic low-power environments as the Internet of Things (IoT) is a challenging task. The deployment of static security services will consume the energy even if it is not required in some situations, so this induces a waste of resources. In this paper, we introduce an efficient model for adaptive security in the IoT based on trust management. Most of existing adaptive security approaches lack of practical means to evaluate threats. On the other hand, trust management systems are designed to deal with selfish behaviors or internal attacks and not to assist cryptographic measures. Our solution evaluates the trust level related to the presence of security threats among nodes, and adapt consequently cryptographic measures. The obtained simulation results show that our solution reduces considerably energy consumption and remains yet secure.