Abstract

Accurate prediction of the trust relationship is the basis for trusted access and secure interaction between Internet of things nodes. To evaluate the degree of trust, a trust metric is assigned to every node depending on its several attributes. Normal nodes in Internet of things tend to suffer collusion attacks from malicious nodes; thus, the accuracy of the trust measurement decreases. To enhance the security of interaction between massive Internet of things nodes, we propose a multidimensional attribute trust model and a dynamic maintenance mechanism of a trusted group. The proposed model provides a reference for the selection and evaluation of node multidimensional attribute factors to adapt to different Internet of things application scenarios. The dispersion of satisfaction records is used to discover abnormal data and weaken its influence on the calculation of the node’s comprehensive trust evaluation. The construction of trusted groups provides an architectural foundation for the application of group signature that maintains low network overhead. The performance of multidimensional attribute trust model and dynamic maintenance mechanism is verified using Netlogo. Simulation results show the efficiency of the proposed model to classify the malicious nodes and honest nodes, as well as to build a trusted group that could ensure honest nodes occupy the major proportion.

Highlights

  • IoT (Internet of things) consists of multiple information sensors

  • We proposed an multidimensional attribute trust model (MATM) for the IoT trustworthiness relationship depending on the associate attributes of nodes

  • The trust relationship prediction is based on the trust value provided by nodes in a certain transmission radius

Read more

Summary

Introduction

IoT (Internet of things) consists of multiple information sensors. These entities interact with others to implement intelligent perception, recognition, and management of objects and process through various network access. The focus of relevant research about security is mainly divided into two aspects: privacy preservation mechanism and trust evaluation scheme For the former, scholars have proposed algorithms to conceal the physical status[5] while maintaining a low resource consumption[6]. As for the latter, an efficient and comprehensive interaction mechanism for trusted access of IoT nodes needs to be considered in a targeted manner. Massive IoT nodes require more efficient, fine-grained, and reliable trust modeling. This has become a huge challenge for the security of trust access in IoT.

Related work
Related works
TDcj ð20Þ
Findings
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.