J. Sens. Actuator Networks最新文献

筛选
英文 中文
Homoglyph Attack Detection Model Using Machine Learning and Hash Function 基于机器学习和哈希函数的同音攻击检测模型
J. Sens. Actuator Networks Pub Date : 2022-09-16 DOI: 10.3390/jsan11030054
A. Almuhaideb, N. Aslam, Almaha Alabdullatif, Sarah Altamimi, Shooq Alothman, Amnah Alhussain, Waad Aldosari, Shikah J. Alsunaidi, K. Alissa
{"title":"Homoglyph Attack Detection Model Using Machine Learning and Hash Function","authors":"A. Almuhaideb, N. Aslam, Almaha Alabdullatif, Sarah Altamimi, Shooq Alothman, Amnah Alhussain, Waad Aldosari, Shikah J. Alsunaidi, K. Alissa","doi":"10.3390/jsan11030054","DOIUrl":"https://doi.org/10.3390/jsan11030054","url":null,"abstract":"Phishing is still a major security threat in cyberspace. In phishing, attackers steal critical information from victims by presenting a spoofing/fake site that appears to be a visual clone of a legitimate site. Several Unicode characters are visually identical to ASCII characters. This similarity in characters is generally known as homoglyphs. Malicious adversaries utilize homoglyphs in URLs and DNS domains to target organizations. To reduce the risks caused by phishing attacks, effective ways of detecting phishing websites are urgently required. This paper proposes a homoglyph attack detection model that combines a hash function and machine learning. There are two phases to the model approach. The machine was being trained during the development phase. The deployment phase involved deploying the model with a Java interface and testing the outcomes through actual user interaction. The results are more accurate when the URL is hashed, as any little changes to the URL can be recognized. The homoglyph detector can be developed as a stand-alone software that is used as the initial step in requesting a webpage as it enhances browser security and protects websites from phishing attempts. To verify the effectiveness, we compared the proposed model on several criteria to existing phishing detection methods. By using the hash function, the proposed security features increase the overall security of the homoglyph attack detection in terms of accuracy, integrity, and availability. The experiment results showed that the model can detect phishing sites with an accuracy of 99.8% using Random Forest, and the hash function improves the accuracy of homoglyph attack detection.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129209074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart-Contract-Based Automation for OF-RAN Processes: A Federated Learning Use-Case 基于智能合约的OF-RAN流程自动化:一个联邦学习用例
J. Sens. Actuator Networks Pub Date : 2022-09-13 DOI: 10.3390/jsan11030053
Jofina Jijin, Boon-Chong Seet, P. Chong
{"title":"Smart-Contract-Based Automation for OF-RAN Processes: A Federated Learning Use-Case","authors":"Jofina Jijin, Boon-Chong Seet, P. Chong","doi":"10.3390/jsan11030053","DOIUrl":"https://doi.org/10.3390/jsan11030053","url":null,"abstract":"The opportunistic fog radio access network (OF-RAN) expands its offloading computation capacity on-demand by establishing virtual fog access points (v-FAPs), comprising user devices with idle resources recruited opportunistically to execute the offloaded tasks in a distributed manner. OF-RAN is attractive for providing computation offloading services to resource-limited Internet-of-Things (IoT) devices from vertical industrial applications such as smart transportation, tourism, mobile healthcare, and public safety. However, the current OF-RAN design is lacking a trusted and distributed mechanism for automating its processes such as v-FAP formation and service execution. Motivated by the recent emergence of blockchain, with smart contracts as an enabler of trusted and distributed systems, we propose an automated mechanism for OF-RAN processes using smart contracts. To demonstrate how our smart-contract-based automation for OF-RAN could apply in real life, a federated deep learning (DL) use-case where a resource-limited client offloads the resource-intensive training of its DL model to a v-FAP is implemented and evaluated. The results validate the DL and blockchain performances of the proposed smart-contract-enabled OF-RAN. The appropriate setting of process parameters to meet the often competing requirements is also demonstrated.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128721621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis LoRaWAN中可信安全密钥管理服务器:建模与分析
J. Sens. Actuator Networks Pub Date : 2022-09-05 DOI: 10.3390/jsan11030052
Koketso Ntshabele, Bassey Isong, N. Gasela, A. Abu-Mahfouz
{"title":"A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis","authors":"Koketso Ntshabele, Bassey Isong, N. Gasela, A. Abu-Mahfouz","doi":"10.3390/jsan11030052","DOIUrl":"https://doi.org/10.3390/jsan11030052","url":null,"abstract":"The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally accepted and resilient LoRaWAN security model is challenging. Although several security models to maximize the security efficiency in LoRaWAN exist using the trusted key server to securely manage the keys, designing an optimum LoRaWAN security model is yet to be fully realized. Therefore, in this paper, we proposed two LoRaWAN security algorithms, A and B, for a trusted key management server (TKMS) to securely manage and distribute the keys amongst the entities. Algorithm B is an enhanced version of Algorithm A, which utilizes the security shortcomings of Algorithm A. We employed two formal analysis methods in the modelling, results analysis, and verification. The Scyther security verification tool was used for algorithm modelling and analysis against all possible attacks, while BAN logic was used to prove the logical correctness of the proposed algorithms. The results indicate that BAN logic feasibly proves the model logic correctness and the security claims employed in Scyther are reliable metrics for assessing the algorithms’ security efficiency. The security claims proved that the security algorithm is more secure and reliable as no attacks were detected across all entities in the enhanced-Algorithm B, unlike in Algorithm A. Moreover, the application of hashing minimizes computation cost and time for authentication and message integrity as compared to symmetric and asymmetric encryption. However, the proposed algorithm is yet to be verified as completely lightweight.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125118763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient and Privacy-Preserving Certificate Activation for V2X Pseudonym Certificate Revocation 针对V2X假名证书吊销的高效且保护隐私的证书激活
J. Sens. Actuator Networks Pub Date : 2022-09-01 DOI: 10.3390/jsan11030051
Jan Wantoro, M. Mambo
{"title":"Efficient and Privacy-Preserving Certificate Activation for V2X Pseudonym Certificate Revocation","authors":"Jan Wantoro, M. Mambo","doi":"10.3390/jsan11030051","DOIUrl":"https://doi.org/10.3390/jsan11030051","url":null,"abstract":"Vehicle to everything (V2X) technology allows the broader development of driving safety, efficiency, and comfort. Because the vehicles can quickly send and receive frequent messages from other vehicles and nearby devices, e.g., cooperative awareness message applications on the intelligent transport system (ITS), V2X requires a good security and privacy protection system to make the messages reliable for the ITS requirements. The existing standards developed in the US and Europe use many short valid period pseudonym certificates to meet the security and privacy requirements. However, this method has difficulty ensuring that revoked pseudonym certificates are treated as revoked by any vehicles because distributing revocation information on a wireless vehicular network with intermittent and rapidly changing topology is demanding. A promising approach to solving this problem is the periodic activation of released pseudonym certificates. Initially, it releases all required pseudonym certificates for a certain period to the vehicle, and pseudonym certificates can be used only after receiving an activation code. Such activation-code-based schemes have a common problem in the inefficient use of network resources between the road-side unit (RSU) and vehicles. This paper proposes an efficient and privacy-preserving activation code distribution strategy solving the problem. By adopting the unicast distribution model of modified activation code for pseudonym certificate (ACPC), our scheme can obtain benefits of efficient activation code distribution. The proposed scheme provides small communication resource usage in the V2X network with various channel options for delivering activation codes in a privacy preserved manner.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123733311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Resolution-Based Coherent Photonic Radar Sensor for Multiple Target Detections 基于高分辨率的多目标相干光子雷达传感器
J. Sens. Actuator Networks Pub Date : 2022-08-28 DOI: 10.3390/jsan11030049
Sushank Chaudhary, Abhishek Sharma, Sunita Khichar, Xuan Tang, Xian Wei, L. Wuttisittikulkij
{"title":"High Resolution-Based Coherent Photonic Radar Sensor for Multiple Target Detections","authors":"Sushank Chaudhary, Abhishek Sharma, Sunita Khichar, Xuan Tang, Xian Wei, L. Wuttisittikulkij","doi":"10.3390/jsan11030049","DOIUrl":"https://doi.org/10.3390/jsan11030049","url":null,"abstract":"The last decade witnessed remarkable growth in the number of global road accidents. To minimize road accidents, transportation systems need to become more intelligent. Multiple detection of target vehicles under adverse weather conditions is one of the primary challenges of autonomous vehicles. Photonic radar sensors may become the promising technology to detect multiple targets to realize autonomous vehicles. In this work, high-speed photonic radar is designed to detect multiple targets by incorporating a cost-effective wavelength division multiplexing (WDM) scheme. Numerical simulations of the proposed WDM-based photonic radar is demonstrated in terms of received power and signal to noise (SNR) ratio. The performance of the proposed photonic radar is also investigated under diverse weather conditions, particularly low, medium, and thick fog. The proposed photonic radar demonstrated a significant range resolution of 7 cm when the target was placed at 80 m distance from the photonic radar sensor-equipped vehicle. In addition to this, traditional microwave radar is demonstrated to prove the effectiveness of the proposed photonic radar.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116057842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Use of Machine Learning for Early Detection of Knee Osteoarthritis and Quantifying Effectiveness of Treatment Using Force Platform 机器学习在膝关节骨关节炎早期检测中的应用及使用力平台量化治疗效果
J. Sens. Actuator Networks Pub Date : 2022-08-23 DOI: 10.3390/jsan11030048
A. Prabhakar, Srikanth Prabhu, Aayush Agrawal, Siddhisa Banerjee, A. Joshua, Y. Kamat, Gopal Nath, Saptarshi Sengupta
{"title":"Use of Machine Learning for Early Detection of Knee Osteoarthritis and Quantifying Effectiveness of Treatment Using Force Platform","authors":"A. Prabhakar, Srikanth Prabhu, Aayush Agrawal, Siddhisa Banerjee, A. Joshua, Y. Kamat, Gopal Nath, Saptarshi Sengupta","doi":"10.3390/jsan11030048","DOIUrl":"https://doi.org/10.3390/jsan11030048","url":null,"abstract":"Knee osteoarthritis is one of the most prevalent chronic diseases. It leads to pain, stiffness, decreased participation in activities of daily living and problems with balance recognition. Force platforms have been one of the tools used to analyse balance in patients. However, identification in early stages and assessing the severity of osteoarthritis using parameters derived from a force plate are yet unexplored to the best of our knowledge. Combining artificial intelligence with medical knowledge can provide a faster and more accurate diagnosis. The aim of our study is to present a novel algorithm to classify the occurrence and severity of knee osteoarthritis based on the parameters derived from a force plate. Forty-four sway movements graphs were measured. The different machine learning algorithms, such as K-Nearest Neighbours, Logistic Regression, Gaussian Naive Bayes, Support Vector Machine, Decision Tree Classifier and Random Forest Classifier, were implemented on the dataset. The proposed method achieves 91% accuracy in detecting sway variation and would help the rehabilitation specialist to objectively identify the patient’s condition in the initial stage and educate the patient about disease progression.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123341928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Edge Intelligence in Smart Grids: A Survey on Architectures, Offloading Models, Cyber Security Measures, and Challenges 智能电网中的边缘智能:架构、卸载模型、网络安全措施和挑战的调查
J. Sens. Actuator Networks Pub Date : 2022-08-21 DOI: 10.3390/jsan11030047
Daisy Nkele Molokomme, A. Onumanyi, A. Abu-Mahfouz
{"title":"Edge Intelligence in Smart Grids: A Survey on Architectures, Offloading Models, Cyber Security Measures, and Challenges","authors":"Daisy Nkele Molokomme, A. Onumanyi, A. Abu-Mahfouz","doi":"10.3390/jsan11030047","DOIUrl":"https://doi.org/10.3390/jsan11030047","url":null,"abstract":"The rapid development of new information and communication technologies (ICTs) and the deployment of advanced Internet of Things (IoT)-based devices has led to the study and implementation of edge computing technologies in smart grid (SG) systems. In addition, substantial work has been expended in the literature to incorporate artificial intelligence (AI) techniques into edge computing, resulting in the promising concept of edge intelligence (EI). Consequently, in this article, we provide an overview of the current state-of-the-art in terms of EI-based SG adoption from a range of angles, including architectures, computation offloading, and cybersecurity concerns. The basic objectives of this article are fourfold. To begin, we discuss EI and SGs separately. Then we highlight contemporary concepts closely related to edge computing, fundamental characteristics, and essential enabling technologies from an EI perspective. Additionally, we discuss how the use of AI has aided in optimizing the performance of edge computing. We have emphasized the important enabling technologies and applications of SGs from the perspective of EI-based SGs. Second, we explore both general edge computing and architectures based on EI from the perspective of SGs. Thirdly, two basic questions about computation offloading are discussed: what is computation offloading and why do we need it? Additionally, we divided the primary articles into two categories based on the number of users included in the model, either a single user or a multiple user instance. Finally, we review the cybersecurity threats with edge computing and the methods used to mitigate them in SGs. Therefore, this survey comes to the conclusion that most of the viable architectures for EI in smart grids often consist of three layers: device, edge, and cloud. In addition, it is crucial that computation offloading techniques must be framed as optimization problems and addressed effectively in order to increase system performance. This article typically intends to serve as a primer for emerging and interested scholars concerned with the study of EI in SGs.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"37 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114006760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Molecularly Imprinted Polymer-Based Optical Sensor for Isopropanol Vapor 基于分子印迹聚合物的异丙醇蒸汽光学传感器
J. Sens. Actuator Networks Pub Date : 2022-08-09 DOI: 10.3390/jsan11030046
A. K. Pathak, P. Limprapassorn, N. Kongruttanachok, C. Viphavakit
{"title":"Molecularly Imprinted Polymer-Based Optical Sensor for Isopropanol Vapor","authors":"A. K. Pathak, P. Limprapassorn, N. Kongruttanachok, C. Viphavakit","doi":"10.3390/jsan11030046","DOIUrl":"https://doi.org/10.3390/jsan11030046","url":null,"abstract":"Recent advances have allowed the monitoring of several volatile organic compounds (VOCs) in human exhaled breath, and many of them are being utilized as a biomarker to diagnose several diseases, including diabetes. Among several VOCs, isopropanol (IPA) has been reported as a common volatile compound in the exhaled breath of patients with type 1 and type 2 diabetes. In this article, an experimental approach is discussed to develop a highly selective and sensitive IPA vapor sensor system. The fabricated sensor is comprised of a small and portable glass slide coated with molecularly imprinted polymer containing specific binding sites compatible with IPA molecules. The developed sensor is based on the wavelength interrogation technique. The fabricated device is analyzed for the detection of IPA vapor with different concentrations varying from 50% to 100%. The sensor exhibits maximum sensitivities of 0.37, 0.30, and 0.62 nm/%IPA, respectively, for 30, 60, and 90 min, respectively, and an excellent sensitivity of 0.63 nm/%IPA for 120 min exposure along with good selectivity among a similar class of VOCs. The major features of the sensor i.e., small size, portability, cost-effectiveness, high sensitivity, and good selectivity, make it a potential candidate for diabetes monitoring. The promising results of the sensor illustrate its potential in diabetes monitoring applications.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126937711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adversarial Attacks on Heterogeneous Multi-Agent Deep Reinforcement Learning System with Time-Delayed Data Transmission 时延数据传输异构多智能体深度强化学习系统的对抗性攻击
J. Sens. Actuator Networks Pub Date : 2022-08-09 DOI: 10.3390/jsan11030045
Neshat Elhami Fard, R. Selmic
{"title":"Adversarial Attacks on Heterogeneous Multi-Agent Deep Reinforcement Learning System with Time-Delayed Data Transmission","authors":"Neshat Elhami Fard, R. Selmic","doi":"10.3390/jsan11030045","DOIUrl":"https://doi.org/10.3390/jsan11030045","url":null,"abstract":"This paper studies the gradient-based adversarial attacks on cluster-based, heterogeneous, multi-agent, deep reinforcement learning (MADRL) systems with time-delayed data transmission. The structure of the MADRL system consists of various clusters of agents. The deep Q-network (DQN) architecture presents the first cluster’s agent structure. The other clusters are considered as the environment of the first cluster’s DQN agent. We introduce two novel observations in data transmission, termed on-time and time-delay observations. The proposed observations are considered when the data transmission channel is idle, and the data is transmitted on time or delayed. By considering the distance between the neighboring agents, we present a novel immediate reward function by appending a distance-based reward to the previously utilized reward to improve the MADRL system performance. We consider three types of gradient-based attacks to investigate the robustness of the proposed system data transmission. Two defense methods are proposed to reduce the effects of the discussed malicious attacks. We have rigorously shown the system performance based on the DQN loss and the team reward for the entire team of agents. Moreover, the effects of the various attacks before and after using defense algorithms are demonstrated. The theoretical results are illustrated and verified with simulation examples.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133556303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them 传感器网络环境:攻击和保护它们的信任管理模型综述
J. Sens. Actuator Networks Pub Date : 2022-08-08 DOI: 10.3390/jsan11030043
Kealan Mannix, Aengus Gorey, Donna O’Shea, T. Newe
{"title":"Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them","authors":"Kealan Mannix, Aengus Gorey, Donna O’Shea, T. Newe","doi":"10.3390/jsan11030043","DOIUrl":"https://doi.org/10.3390/jsan11030043","url":null,"abstract":"Over the past decade, new technologies have driven the rise of what is being termed as the fourth industrial revolution. The introduction of this new revolution is amalgamating the cyber and physical worlds, bringing with it many benefits, such as the advent of industry 4.0, the internet of things, cloud technologies and smart homes and cities. These new and exciting areas are poised to have significant advantages for society; they can increase the efficiency of many systems and increase the quality of life of people. However, these emerging technologies can potentially have downsides, if used incorrectly or maliciously by bad entities. The rise of the widespread use of sensor networks to allow the mentioned systems to function has brought with it many security vulnerabilities that conventional “hard security” measures cannot mitigate. It is for this reason that a new “soft security” approach is being taken in conjunction with the conventional security means. Trust models offer an efficient way of mitigating the threats posed by malicious entities in networks that conventional security methods may not be able to combat. This paper discusses the general structure of a trust model, the environments they are used in and the attack types they are used to defend against. The work aims to provide a comprehensive review of the wide assortment of trust parameters and methods used in trust models. The work discusses which environments and network types each of these parameters and calculation methods would be suited to. Finally, a design study is provided to demonstrate how a trust model design will differ between two different industry 4.0 networks.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129007901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书