Xiangrong Li , Yu Zhang , Haotian Zhu , Yubo Wang , Junjia Huang
{"title":"A multi-dimensional trust attestation solution in 5G-IoT","authors":"Xiangrong Li , Yu Zhang , Haotian Zhu , Yubo Wang , Junjia Huang","doi":"10.1016/j.dcan.2023.10.003","DOIUrl":null,"url":null,"abstract":"<div><div>The core missions of IoT are to sense data, transmit data and give feedback to the real world based on the calculation of the sensed data. The trust of sensing source data and transmission network is extremely important to IoT security. 5G-IoT with its low latency, wide connectivity and high-speed transmission extends the business scenarios of IoT, yet it also brings new challenges to trust proof solutions of IoT. Currently, there is a lack of efficient and reliable trust proof solutions for massive dynamically connected nodes, while the existing solutions have high computational complexity and can't adapt to time-sensitive services in 5G-IoT scenarios. In order to solve the above problems, this paper proposes an adaptive multi-dimensional trust proof solution. Firstly, the static and dynamic attributes of sensing nodes are metricized, and the historical interaction as well as the recommendation information are combined with the comprehensive metric of sensing nodes, and a multi-dimensional fine-grained trusted metric model is established in this paper. Then, based on the comprehensive metrics, the sensing nodes are logically grouped and assigned with service levels to achieve the screening and isolation of malicious nodes. At the same time, the proposed solution reduces the energy consumption of the metric process and optimizes the impact of real-time metrics on the interaction latency. Simulation experiments show that the solution can accurately and efficiently identify malicious nodes and effectively guarantee the safe and trustworthy operation of 5G-IoT nodes, while having a small impact on the latency of the 5G network.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 1","pages":"Pages 225-233"},"PeriodicalIF":7.5000,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Communications and Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2352864823001542","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
The core missions of IoT are to sense data, transmit data and give feedback to the real world based on the calculation of the sensed data. The trust of sensing source data and transmission network is extremely important to IoT security. 5G-IoT with its low latency, wide connectivity and high-speed transmission extends the business scenarios of IoT, yet it also brings new challenges to trust proof solutions of IoT. Currently, there is a lack of efficient and reliable trust proof solutions for massive dynamically connected nodes, while the existing solutions have high computational complexity and can't adapt to time-sensitive services in 5G-IoT scenarios. In order to solve the above problems, this paper proposes an adaptive multi-dimensional trust proof solution. Firstly, the static and dynamic attributes of sensing nodes are metricized, and the historical interaction as well as the recommendation information are combined with the comprehensive metric of sensing nodes, and a multi-dimensional fine-grained trusted metric model is established in this paper. Then, based on the comprehensive metrics, the sensing nodes are logically grouped and assigned with service levels to achieve the screening and isolation of malicious nodes. At the same time, the proposed solution reduces the energy consumption of the metric process and optimizes the impact of real-time metrics on the interaction latency. Simulation experiments show that the solution can accurately and efficiently identify malicious nodes and effectively guarantee the safe and trustworthy operation of 5G-IoT nodes, while having a small impact on the latency of the 5G network.
期刊介绍:
Digital Communications and Networks is a prestigious journal that emphasizes on communication systems and networks. We publish only top-notch original articles and authoritative reviews, which undergo rigorous peer-review. We are proud to announce that all our articles are fully Open Access and can be accessed on ScienceDirect. Our journal is recognized and indexed by eminent databases such as the Science Citation Index Expanded (SCIE) and Scopus.
In addition to regular articles, we may also consider exceptional conference papers that have been significantly expanded. Furthermore, we periodically release special issues that focus on specific aspects of the field.
In conclusion, Digital Communications and Networks is a leading journal that guarantees exceptional quality and accessibility for researchers and scholars in the field of communication systems and networks.