针对物联网应用中设备信誉攻击的可信机制

IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS
Geetanjali Rathee, Chaker Abdelaziz Kerrache, Carlos T. Calafate, Houbing Song
{"title":"针对物联网应用中设备信誉攻击的可信机制","authors":"Geetanjali Rathee,&nbsp;Chaker Abdelaziz Kerrache,&nbsp;Carlos T. Calafate,&nbsp;Houbing Song","doi":"10.1002/ett.5011","DOIUrl":null,"url":null,"abstract":"<p>The Web-of-Things (WoT) seeks to simplify IoT management by providing an interface for controlling and monitoring the devices. To this end, it can provide several web-based applications focused on home automation, smart cities, smart agriculture and so forth. In particular, preventing device reputation attacks, which is one of the most significant threats to the WoT, is critical when considering the huge amount of information that is generated, processed and analyzed by the network. There may be situations where intruders deploy fake devices to introduce false information, downgrading the information from valid devices for their own benefits. Different authors have proposed various security methods and algorithms using machine learning, cryptographic or semantics-based methods. However, the existing mechanisms have various limitations in terms of accuracy, storage overhead, and computational/communication overheads, that still need to be addressed. The trusted mechanism can be considered as another way of ensuring security while transmitting the information through the Internet by identifying their legitimacy. Hence, the aim of this article is to propose a secure and trusted WoT framework using similarity index and community of interest similarity score schemes. The proposed mechanism is evaluated against existing schemes that consider both cryptographic and semantic parameters to ensure the security in the network by using metrics such as recommendations, decay time factor, and packet loss recovery rate.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 6","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A trusted mechanism against device reputation attacks in Web-of-Things applications\",\"authors\":\"Geetanjali Rathee,&nbsp;Chaker Abdelaziz Kerrache,&nbsp;Carlos T. Calafate,&nbsp;Houbing Song\",\"doi\":\"10.1002/ett.5011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The Web-of-Things (WoT) seeks to simplify IoT management by providing an interface for controlling and monitoring the devices. To this end, it can provide several web-based applications focused on home automation, smart cities, smart agriculture and so forth. In particular, preventing device reputation attacks, which is one of the most significant threats to the WoT, is critical when considering the huge amount of information that is generated, processed and analyzed by the network. There may be situations where intruders deploy fake devices to introduce false information, downgrading the information from valid devices for their own benefits. Different authors have proposed various security methods and algorithms using machine learning, cryptographic or semantics-based methods. However, the existing mechanisms have various limitations in terms of accuracy, storage overhead, and computational/communication overheads, that still need to be addressed. The trusted mechanism can be considered as another way of ensuring security while transmitting the information through the Internet by identifying their legitimacy. Hence, the aim of this article is to propose a secure and trusted WoT framework using similarity index and community of interest similarity score schemes. The proposed mechanism is evaluated against existing schemes that consider both cryptographic and semantic parameters to ensure the security in the network by using metrics such as recommendations, decay time factor, and packet loss recovery rate.</p>\",\"PeriodicalId\":23282,\"journal\":{\"name\":\"Transactions on Emerging Telecommunications Technologies\",\"volume\":\"35 6\",\"pages\":\"\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2024-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Transactions on Emerging Telecommunications Technologies\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/ett.5011\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.5011","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

物联网(WoT)旨在通过提供控制和监测设备的界面来简化物联网管理。为此,它可以提供若干基于网络的应用,重点关注家庭自动化、智能城市、智能农业等。特别是,考虑到网络生成、处理和分析的信息量巨大,防止设备信誉攻击(这是物联网面临的最主要威胁之一)至关重要。在某些情况下,入侵者可能会部署虚假设备,引入虚假信息,降低有效设备的信息等级,以谋取自身利益。不同的作者利用机器学习、密码学或基于语义的方法提出了各种安全方法和算法。然而,现有机制在准确性、存储开销、计算/通信开销等方面存在各种局限性,仍有待解决。可信机制可被视为通过识别信息的合法性来确保通过互联网传输信息时安全性的另一种方法。因此,本文的目的是利用相似性指数和兴趣社区相似性得分方案,提出一种安全可信的 WoT 框架。通过使用推荐值、衰减时间因子和数据包丢失恢复率等指标,对所提出的机制与现有方案进行了评估,后者同时考虑了加密和语义参数,以确保网络的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

A trusted mechanism against device reputation attacks in Web-of-Things applications

A trusted mechanism against device reputation attacks in Web-of-Things applications

The Web-of-Things (WoT) seeks to simplify IoT management by providing an interface for controlling and monitoring the devices. To this end, it can provide several web-based applications focused on home automation, smart cities, smart agriculture and so forth. In particular, preventing device reputation attacks, which is one of the most significant threats to the WoT, is critical when considering the huge amount of information that is generated, processed and analyzed by the network. There may be situations where intruders deploy fake devices to introduce false information, downgrading the information from valid devices for their own benefits. Different authors have proposed various security methods and algorithms using machine learning, cryptographic or semantics-based methods. However, the existing mechanisms have various limitations in terms of accuracy, storage overhead, and computational/communication overheads, that still need to be addressed. The trusted mechanism can be considered as another way of ensuring security while transmitting the information through the Internet by identifying their legitimacy. Hence, the aim of this article is to propose a secure and trusted WoT framework using similarity index and community of interest similarity score schemes. The proposed mechanism is evaluated against existing schemes that consider both cryptographic and semantic parameters to ensure the security in the network by using metrics such as recommendations, decay time factor, and packet loss recovery rate.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
8.90
自引率
13.90%
发文量
249
期刊介绍: ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims: - to attract cutting-edge publications from leading researchers and research groups around the world - to become a highly cited source of timely research findings in emerging fields of telecommunications - to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish - to become the leading journal for publishing the latest developments in telecommunications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信