期刊文献+

基于节点行为的物联网动态综合信任评估方法

A DYNAMIC COMPREHENSIVE TRUST EVALUATION METHOD FOR INTERNET OF THINGS BASED ON NODE BEHAVIOR
下载PDF
导出
摘要 物联网节点由于所处环境复杂多变且无人监管,易受损或被捕获而成为内部攻击的源头。针对这种情况,提出基于物联网节点行为的动态综合信任评估方法。基于节点交互时的多种行为特征来计算节点的直接信任,并提出节点的自信度和推荐信任度作为权重系数参考。通过共同邻居节点获取推荐信任以缩短发现恶意节点的时间,并采用时间衰减因子和历史评估窗口来保证信任的时效性。实验结果表明,通过节点的异常行为变化能及时识别恶意节点,降低网络的能耗,具有良好的适应性和抵抗性。 The nodes of the internet of things(IoT)have become the source of internal attacks due to their complex and unsupervised environment,which are easily be captured or damaged.In response to this situation,a dynamic comprehensive trust evaluation method based on the behavior of IoT nodes is proposed.This method calculated the direct evaluation value of the node based on the multiple behavior characteristics of the node during interaction,and the confidence and recommendation trust of nodes were proposed as the reference of weight coefficients.On this basis,the recommended evaluation value of the node was obtained through the common neighbor node to shorten the time for discovering malicious nodes,and the time decay factor and historical evaluation window were used to ensure the timeliness of trust.The experimental results show that the malicious nodes can be identified timely through the abnormal behavior changes of nodes,which reduces the energy consumption of the network,and has good adaptability and resistance.
作者 舒港丽 刘一凡 郭嘉宝 Shu Gangli;Liu Yifan;Guo Jiabao(School of Cyber Science and Engineering,Wuhan University,Wuhan 430000,Hubei,China)
出处 《计算机应用与软件》 北大核心 2024年第6期320-328,335,共10页 Computer Applications and Software
基金 国家自然科学基金联合基金项目(U1936122) 中央高校基本科研业务费专项资金项目(2042017kf024) 中国工程科技发展战略湖北研究院咨询研究项目(212000005) 武汉市应用基础前沿项目(2018010401011295)。
关键词 物联网 信任评估 信任因子 推荐信任 Internet of things Trust evaluation Trust factor Recommendation trust
  • 相关文献

参考文献7

二级参考文献54

  • 1Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Dale, J, Dinolt, G, eds. Proc. of the 17th Syrup. on Security and Privacy. Oakland: IEEE Computer Society Press, 1996. 164-173.
  • 2Ellison CM, Franz B, Rivest R, Thomas BM, Ylonen T. Simple public key infrastructure certificate theory. IETF RFC 2693, 1999.
  • 3Li NG, Mitchell JC. RT: A role-based trust-management framework. In: Werner B, ed. Proc. of the 3rd DARPA Information Survivability Conf. and Exposition (DISCEX Ⅲ). Washington: IEEE Computer Society Press, 2003. 201-212.
  • 4Freudenthal E, Pesin T, Port L, Keenan E, Karamcheti V. dRBAC: Distributed role-based access control for dynamic coalition environments. Technical Report, TR2001-819, New York University, 2001.
  • 5Li NH, Mitchell JC, Winsborough WH. Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM, 2005,52(3):474-514.
  • 6Seng CY, Arbaugh WA. A secure trust establishment model. In: Werner B, ed. Proc. of the IEEE Int'l Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006). Piscataway: IEEE Computer Society, 2006.78-85.
  • 7Ryutov T, Neuman C. Trust based approach for improving data reliability in industrial sensor networks. In: Etalle S, Marsh S, eds. Proc. of the IFIP Int'l Federation for Information, Vol.238. Boston: Springer-Verlag, 2007. 349-365.
  • 8Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A. Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks. In: Proc. of the SenSys 2003. New York: ACM Press, 2003. 324-325.
  • 9Oaneriwal S, Srivastava M. Reputation-based framework for high integrity sensor networks. In: Proc. of the 2nd ACM Workshop on Security ofAd Hoc and Sensor Networks (SASN 2004). New York: ACM Press, 2004.66-77.
  • 10Krasniewski MD, Varadharajan P, Rabeler B, Bagchi S, Hu YC. TIBFIT: Trust index based fault tolerance for ability data faults in sensor. In: Werner B, ed. Proc. of the Int'l Conf. on Dependable Systems and Networks (DSN). Piscataway: IEEE Computer Society, 2005. 672-681.

共引文献139

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部