Abstract

The Internet of Things (IoT) technology is widely used and has been improved in research. However, due to the extensiveness of IoT technology, the heterogeneity and diversity of the device structure, the number of attacks against IoT has increased dramatically, so we need a method that can effectively and actively determine safety. Considering the diversity of the terminal structure of IoT, a security method for the IoT terminal based on structural balance, method objectivity, and reliability is currently a challenging task. This paper introduces the idea of rate of change in mathematics into trust analysis, and forms three attribute sets based on trust interval and rate of change: discrete interval, change range, and change frequency. By calculating the above attributes of the entity’s trust value, the entity’s trust situation is obtained, and an overall assessment of the terminal entity’s trust situation is made from the three levels of completeness, accuracy and objectivity. Under the premise of reducing encryption and other means, the above method can evaluate the trust state of the IoT terminal from the perspective of the data, and this evaluation method can provide a basis for the judgment of the IoT terminal more objectively and accurately.

Highlights

  • IntroductionWhen entering the 21st century, the goal of the Internet of Things (IoT) is to enable objects in the physical world to communicate with the digital or network world [4]

  • This paper introduces the concept of continuous trust value, and builds a multi-level discrete level model based on the formation of trust change rate; integrates the multi-level discrete trust model and the multi-level trust model of continuous probability distribution in the security assessment of the terminal entity of the Internet of Things (IoT) to trust the entity

  • Considering that the sudden change of trust value and other factors have an impact on the accuracy of trust-based security evaluation, this paper introduces the concept of rate of change to evaluate the trust state from the perspectives of the magnitude and frequency of change; while improving the accuracy of trust evaluation

Read more

Summary

Introduction

When entering the 21st century, the goal of the IoT is to enable objects in the physical world to communicate with the digital or network world [4]. The vision of the IoT is based on research in many fields, including big data, machine learning, edge computing, wireless sensor networks, etc. The botnet launched a DDOS attack on the American domain name resolution service provider Dyn by controlling a large number of IoT devices, which caused a large area of network disconnection in the eastern United States, and many popular websites stopped serving [6]. In agricultural and industrial environments, if the IoT sensors are operating normally, they may not be inspected for a long time, and they are likely to be directly captured by attackers [7].

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.