U. Rehman, Amir Ali, H. M. Bilal, Muhammad Asif Razzaq, Seong-Bae Park, Sungyoung Lee
{"title":"一种新的智能环境下可信设备相互信任评估方法","authors":"U. Rehman, Amir Ali, H. M. Bilal, Muhammad Asif Razzaq, Seong-Bae Park, Sungyoung Lee","doi":"10.1109/imcom53663.2022.9721756","DOIUrl":null,"url":null,"abstract":"With the technological tsunami, the Internet of Things (IoT) has evolved our life with smart services such as healthcare, transportation, homes, and industries. Along with these benefits, different security and privacy issues have become a part of our daily life. Researchers from around the world have proposed efficient and reliable solutions to mitigate these challenges. However, limited studies have considered insider threats. In this paper, we have proposed a trust evaluation method, which considered the root cause of trust-relevant attacks such as self-promotion, bad-mouthing, ballot stuffing, and on- off attacks. The proposed approach uses low computation for calculating the trust score. Therefore, it can be deployed on IoT devices, fog nodes, and gateways to ensure mutual trust among the communicating entities.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Novel Mutual Trust Evaluation Method for Identification of Trusted Devices in Smart Environment\",\"authors\":\"U. Rehman, Amir Ali, H. M. Bilal, Muhammad Asif Razzaq, Seong-Bae Park, Sungyoung Lee\",\"doi\":\"10.1109/imcom53663.2022.9721756\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the technological tsunami, the Internet of Things (IoT) has evolved our life with smart services such as healthcare, transportation, homes, and industries. Along with these benefits, different security and privacy issues have become a part of our daily life. Researchers from around the world have proposed efficient and reliable solutions to mitigate these challenges. However, limited studies have considered insider threats. In this paper, we have proposed a trust evaluation method, which considered the root cause of trust-relevant attacks such as self-promotion, bad-mouthing, ballot stuffing, and on- off attacks. The proposed approach uses low computation for calculating the trust score. Therefore, it can be deployed on IoT devices, fog nodes, and gateways to ensure mutual trust among the communicating entities.\",\"PeriodicalId\":367038,\"journal\":{\"name\":\"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/imcom53663.2022.9721756\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/imcom53663.2022.9721756","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Novel Mutual Trust Evaluation Method for Identification of Trusted Devices in Smart Environment
With the technological tsunami, the Internet of Things (IoT) has evolved our life with smart services such as healthcare, transportation, homes, and industries. Along with these benefits, different security and privacy issues have become a part of our daily life. Researchers from around the world have proposed efficient and reliable solutions to mitigate these challenges. However, limited studies have considered insider threats. In this paper, we have proposed a trust evaluation method, which considered the root cause of trust-relevant attacks such as self-promotion, bad-mouthing, ballot stuffing, and on- off attacks. The proposed approach uses low computation for calculating the trust score. Therefore, it can be deployed on IoT devices, fog nodes, and gateways to ensure mutual trust among the communicating entities.