{"title":"基于信任的方案,采用物联网架构的证据推理","authors":"Alexandros G. Fragkiadakis, E. Tragos","doi":"10.1109/WF-IoT.2016.7845509","DOIUrl":null,"url":null,"abstract":"IoT architectures heavily depend on wireless resource-constrained nodes that collect and transmit a plethora of information. The broadband wireless medium enables malicious nodes to perform a number of attacks. Cryptographic means along with trust-based schemes are often deployed to combat these attacks. We propose a centralised trust-based scheme where all nodes monitor their neighbors, and report their findings to a fusion center. Each report is followed by a reliability measure, computed using the Signal-to-Interference-plus-Noise-Ratio. Fusion is performed employing a belief distribution with reliability method. We consider malicious nodes that periodically drop packets based on some probability. The evaluation results show that the proposed scheme can accurately detect the malicious behavior.","PeriodicalId":373932,"journal":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A trust-based scheme employing evidence reasoning for IoT architectures\",\"authors\":\"Alexandros G. Fragkiadakis, E. Tragos\",\"doi\":\"10.1109/WF-IoT.2016.7845509\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IoT architectures heavily depend on wireless resource-constrained nodes that collect and transmit a plethora of information. The broadband wireless medium enables malicious nodes to perform a number of attacks. Cryptographic means along with trust-based schemes are often deployed to combat these attacks. We propose a centralised trust-based scheme where all nodes monitor their neighbors, and report their findings to a fusion center. Each report is followed by a reliability measure, computed using the Signal-to-Interference-plus-Noise-Ratio. Fusion is performed employing a belief distribution with reliability method. We consider malicious nodes that periodically drop packets based on some probability. The evaluation results show that the proposed scheme can accurately detect the malicious behavior.\",\"PeriodicalId\":373932,\"journal\":{\"name\":\"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WF-IoT.2016.7845509\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WF-IoT.2016.7845509","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A trust-based scheme employing evidence reasoning for IoT architectures
IoT architectures heavily depend on wireless resource-constrained nodes that collect and transmit a plethora of information. The broadband wireless medium enables malicious nodes to perform a number of attacks. Cryptographic means along with trust-based schemes are often deployed to combat these attacks. We propose a centralised trust-based scheme where all nodes monitor their neighbors, and report their findings to a fusion center. Each report is followed by a reliability measure, computed using the Signal-to-Interference-plus-Noise-Ratio. Fusion is performed employing a belief distribution with reliability method. We consider malicious nodes that periodically drop packets based on some probability. The evaluation results show that the proposed scheme can accurately detect the malicious behavior.