期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Building a Trust Model for Secure Data Sharing(TM-SDS)in Edge Computing Using HMAC Techniques
1
作者 K.Karthikeyan P.Madhavan 《Computers, Materials & Continua》 SCIE EI 2022年第6期4183-4197,共15页
With the rapid growth of Internet of Things(IoT)based models,and the lack amount of data makes cloud computing resources insufficient.Hence,edge computing-based techniques are becoming more popular in present research... With the rapid growth of Internet of Things(IoT)based models,and the lack amount of data makes cloud computing resources insufficient.Hence,edge computing-based techniques are becoming more popular in present research domains that makes data storage,and processing effective at the network edges.There are several advanced features like parallel processing and data perception are available in edge computing.Still,there are some challenges in providing privacy and data security over networks.To solve the security issues in Edge Computing,Hash-based Message Authentication Code(HMAC)algorithm is used to provide solutions for preserving data from various attacks that happens with the distributed network nature.This paper proposed a Trust Model for Secure Data Sharing(TM-SDS)with HMAC algorithm.Here,data security is ensured with local and global trust levels with the centralized processing of cloud and by conserving resources effectively.Further,the proposed model achieved 84.25%of packet delivery ratio which is better compared to existing models in the resulting phase.The data packets are securely transmitted between entities in the proposed model and results showed that proposed TM-SDS model outperforms the existing models in an efficient manner. 展开更多
关键词 Secure data sharing edge computing global trust levels parallel processing
下载PDF
An access control scheme for distributed Internet of Things based on adaptive trust evaluation and blockchain
2
作者 Wenxian Jiang Zerui Lin Jun Tao 《High-Confidence Computing》 2023年第1期75-83,共9页
The Internet of Things(IoT)has the characteristics of limited resources and wide range of points.Aiming at the problems of policy centralization and single point of failure in traditional access control schemes,a dist... The Internet of Things(IoT)has the characteristics of limited resources and wide range of points.Aiming at the problems of policy centralization and single point of failure in traditional access control schemes,a distributed access control method based on adaptive trust evaluation and smart contract is proposed to provide fine-grained,flexible and scalable authorization for IoT devices with limited resources.Firstly,a modular access control architecture with integrated blockchain is proposed to achieve hierarchical management of IoT devices.Secondly,an IoT trust evaluation model called AITTE based on adaptive fusion weights is designed to effectively improve the identification of illegal access requests from malicious nodes.Finally,an attribute-based access control model using smart contract called AACSC which is built,which consists of attribute set contract(ASC),registration contract(RC),state judgment contract(SJC),authority permission management contract(AMC),and access control contract(ACC).As experimental results show,the scheme can effectively solve the problem of access security in resource-constrained IoT environments.Moreover,it also ensures the reliability and efficiency of the access control implementation process. 展开更多
关键词 Internet of Things Access control Blockchain Smart contract trust level Evaluation model
原文传递
Developing a reliable route protocol for mobile self-organization networks
3
作者 Shaohu Li Bei Gong 《High-Confidence Computing》 EI 2024年第3期1-12,共12页
Mobile ad hoc networks(MANETs),which correspond to a novel wireless technology,are widely used in Internet of Things(IoT)systems such as drones,wireless sensor networks,and military or disaster relief communication.Fr... Mobile ad hoc networks(MANETs),which correspond to a novel wireless technology,are widely used in Internet of Things(IoT)systems such as drones,wireless sensor networks,and military or disaster relief communication.From the perspective of communication and data collection,the success rate of collaborations between nodes in mobile ad hoc networks and reliability of data collection mainly depend on whether the nodes in the network operate normally,namely,according to the established network rules.However,mobile ad hoc networks are vulnerable to attacks targeting transmission channels and nodes owing to their dynamic evolution,openness,and distributed characteristics.Therefore,during the network operation,it is necessary to classify and detect the behavior and characteristics of each node.However,most existing research only analyzes and considers responses against a single or small number of attacks.To address these issues,this article first systematically analyzed and classified common active attacks in MANETs.Then,a node trust model was proposed based on the characteristics of various attacks;subsequently,a new secure routing protocol,namely,TC-AODV,was proposed.This protocol has minimal effect on the original communication dynamics and can effectively deal with Packet drop,wormhole,Session hijacking,and other main attacks in MANETs.The NS3 simulation results show that the proposed routing protocol attains good transmission performance,can effectively identify various attacks and bypass malicious nodes,and securely complete the communication process. 展开更多
关键词 Mobile ad hoc networks AODV trust level Secure routing protocol Reliable path
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部