期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Enhancing Energy Efficiency with a Dynamic Trust Measurement Scheme in Power Distribution Network
1
作者 Yilei Wang Xin Sun +4 位作者 Guiping Zheng Ahmar Rashid Sami Ullah Hisham Alasmary Muhammad Waqas 《Computers, Materials & Continua》 SCIE EI 2024年第3期3909-3927,共19页
The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the e... The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the edge convergence layer and the end sensing layer,with the former using intelligent fusion terminals for real-time data collection and processing.However,the influx of multiple low-voltage in the smart grid raises higher demands for the performance,energy efficiency,and response speed of the substation fusion terminals.Simultaneously,it brings significant security risks to the entire distribution substation,posing a major challenge to the smart grid.In response to these challenges,a proposed dynamic and energy-efficient trust measurement scheme for smart grids aims to address these issues.The scheme begins by establishing a hierarchical trust measurement model,elucidating the trust relationships among smart IoT terminals.It then incorporates multidimensional measurement factors,encompassing static environmental factors,dynamic behaviors,and energy states.This comprehensive approach reduces the impact of subjective factors on trust measurements.Additionally,the scheme incorporates a detection process designed for identifying malicious low-voltage end sensing units,ensuring the prompt identification and elimination of any malicious terminals.This,in turn,enhances the security and reliability of the smart grid environment.The effectiveness of the proposed scheme in pinpointing malicious nodes has been demonstrated through simulation experiments.Notably,the scheme outperforms established trust metric models in terms of energy efficiency,showcasing its significant contribution to the field. 展开更多
关键词 IIoT trusted measure energy efficient
下载PDF
Behavior Measurement Model Based on Prediction and Control of Trusted Network 被引量:5
2
作者 Gong Bei Zhang Jianbiao +1 位作者 Shen Changxiang Zhang Xing 《China Communications》 SCIE CSCD 2012年第5期117-128,共12页
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation... In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones. 展开更多
关键词 trusted network behavioral predic-tive control SIMILARITY trust measurement
下载PDF
Multiway Dynamic Trust Chain Model on Virtual Machine for Cloud Computing 被引量:1
3
作者 Jie Zhu Guoyuan Lin +2 位作者 Fucheng You Huaqun Liu Chunru Zhou 《China Communications》 SCIE CSCD 2016年第7期83-91,共9页
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed... This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system.A trust chain construction module is designed in a virtual machine monitor.Through dynamic monitoring,it achieves the purpose of transferring integrity between virtual machine.A cloud system with a trust authentication function is implemented on the basis of the model,and its practicability is shown. 展开更多
关键词 cloud computing virtual machine trustworthiness measurement dynamic trust transfer
下载PDF
Trust Attestation Mechanism for the Sensing Layer Nodes of Internet of Things 被引量:1
4
作者 WANG Yubo GONG Bei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第4期337-345,共9页
The main function of Internet of Things is to collect and transmit data.At present,the data transmission in Internet of Things lacks effective trust attestation mechanism and trust traceability mechanism of data sourc... The main function of Internet of Things is to collect and transmit data.At present,the data transmission in Internet of Things lacks effective trust attestation mechanism and trust traceability mechanism of data source.To solve the above problems,a trust attestation mechanism for sensing layer nodes is presented.First a trusted group is established,and the node which is going to join the group needs to attest its identity and key attributes to the higher level node.Then the dynamic trust measurement value of the node can be obtained by measuring the node data transmission behavior.Finally the node encapsulates the key attributes and trust measurement value to use short message group signature to attest its trust to the challenger.This mechanism can measure the data sending and receiving behaviors of sensing nodes and track the data source,and it does not expose the privacy information of nodes and the sensing nodes can be traced effectively.The trust measurement for sensing nodes and verification is applicable to Internet of Things and the simulation experiment shows the trust attestation mechanism is flexible,practical and efficient.Besides,it can accurately and quickly identify the malicious nodes at the same time.The impact on the system performance is negligible. 展开更多
关键词 Internet of Things source of data trust measurement trust attestation
原文传递
Dynamic Measurement Protocol in Infrastructure as a Service 被引量:1
5
作者 Shuang Xiang Bo Zhao +1 位作者 An Yang Tao Wei 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第5期470-477,共8页
Infrastructure as a Service (laaS) has brought advantages to users because virtualization technology hides the details of the physical resources, but this leads to the problem of users being unable to perceive their... Infrastructure as a Service (laaS) has brought advantages to users because virtualization technology hides the details of the physical resources, but this leads to the problem of users being unable to perceive their security. This defect has obstructed cloud computing from wide-spread popularity and development. To solve this problem, a dynamic measurement protocol in laaS is presented in this paper. The protocol makes it possible for the user to get the real-time security status of the resources, thereby solving the problem of guaranteeing dynamic credibility. This changes the cloud service security provider from the operator to the users themselves. This study has verified the security of the protocol by means of Burrow-Abadi-Needham (BAN) logic, and the result shows that it can satisfy requirements for innovation, privacy, and integrity. Finally, based on different laaS platforms, this study has conducted a performance analysis to demonstrate that this protocol is reliable, secure, and efficient. 展开更多
关键词 Burrow-Abadi-Needham (BAN) logic real-time security trusted dynamic measurement
原文传递
vCerberus:A DRTM System Based on Virtualization Technology
6
作者 CHEN Wenzhi ZHANG Zhipeng YANG Jianhua HE Qinming 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期185-189,共5页
This paper presents vCerberus, a novel hypervisor to provide trusted and isolated code execution within virtual domains vCerberus is considerably tiny, while allowing secure sensitive codes to be executed in an isolat... This paper presents vCerberus, a novel hypervisor to provide trusted and isolated code execution within virtual domains vCerberus is considerably tiny, while allowing secure sensitive codes to be executed in an isolated circumstance from the virtual ddmain, and can be attested by a remote party in an efficient way. These properties will be guaranteed even if the guest operating system is malicious. This protects the secure sensitive codes against the malicious codes in the Guest OS, e.g., the kernel rootkits. We present an approach to dynamically measure and isolate the launch environment on the virtual machines based on the para-virtualization technology and a novel virtualization of trusted platform module (TPM). Our performance experiment result shows that the overhead introduced by vCerberus is minimized; the performance of the launch environment in vCerberus is as competitive as the guest OS running on mainstream hypervisors. 展开更多
关键词 trusted computing para-virtualization dynamic root of trust for measurement (DRTM) trusted platform module (TPM)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部