{"title":"利用分布式信任管理方案防御物联网中的选择性攻击","authors":"C. V. L. Mendoza, J. H. Kleinschmidt","doi":"10.1109/ISCE.2016.7797367","DOIUrl":null,"url":null,"abstract":"In the Internet of Things (IoT) smart objects are able to provide or require specific services. The goal of this work is to identify malicious behavior of nodes performing selective attacks. In this type of attacks the nodes selectively decide what kind of service they will provide to the network, in order to save resources. We use a trust management model to detect such behavior. We perform network simulations using Contiki-OS to analyze the performance of the trust model. The simulation results show a good performance against nodes executing selective attacks.","PeriodicalId":193736,"journal":{"name":"2016 IEEE International Symposium on Consumer Electronics (ISCE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Defense for selective attacks in the IoT with a distributed trust management scheme\",\"authors\":\"C. V. L. Mendoza, J. H. Kleinschmidt\",\"doi\":\"10.1109/ISCE.2016.7797367\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the Internet of Things (IoT) smart objects are able to provide or require specific services. The goal of this work is to identify malicious behavior of nodes performing selective attacks. In this type of attacks the nodes selectively decide what kind of service they will provide to the network, in order to save resources. We use a trust management model to detect such behavior. We perform network simulations using Contiki-OS to analyze the performance of the trust model. The simulation results show a good performance against nodes executing selective attacks.\",\"PeriodicalId\":193736,\"journal\":{\"name\":\"2016 IEEE International Symposium on Consumer Electronics (ISCE)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Symposium on Consumer Electronics (ISCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCE.2016.7797367\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Symposium on Consumer Electronics (ISCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCE.2016.7797367","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Defense for selective attacks in the IoT with a distributed trust management scheme
In the Internet of Things (IoT) smart objects are able to provide or require specific services. The goal of this work is to identify malicious behavior of nodes performing selective attacks. In this type of attacks the nodes selectively decide what kind of service they will provide to the network, in order to save resources. We use a trust management model to detect such behavior. We perform network simulations using Contiki-OS to analyze the performance of the trust model. The simulation results show a good performance against nodes executing selective attacks.