دورية أكاديمية

Dynamic Trust-Based Device Legitimacy Assessment Towards Secure IoT Interactions.

التفاصيل البيبلوغرافية
العنوان: Dynamic Trust-Based Device Legitimacy Assessment Towards Secure IoT Interactions.
المؤلفون: Garagad, Vishwanath, Iyer, Nalini
المصدر: Journal of Communications Software & Systems; Sep2022, Vol. 18 Issue 3, p269-275, 7p
مصطلحات موضوعية: INTERNET of things, TRUST, ACCESS control
مستخلص: Establishing trust-based interactions in heterogeneously connected devices appears to be the prominent mechanism in addressing the prevailing concerns of confidence, reliability and privacy relevant in establishing secure interactions among connected devices in the network. Trust-based assessment of device legitimacy is evolving given IoT devices’ dynamic and heterogeneous nature and emerging adversaries. However, computation and application of trust level in establishing secure communications, access control and privacy domain are rarely discussed in the literature. To compute trust, based on the quality of service, direct interactions, and the relationship between devices, we introduce a multi-factor trust computation model that considers the multiple attributes of interactions in an IoT network of heterogeneous devices providing a wide range of data and services. Direct trust is estimated for quality of service considering the response time, reliability, consistency, and integrity attributes of devices. The time decay factor influences the credibility of computed trust over time. The policy-driven mechanism is employed to sift the devices and isolate the malicious ones. Extensive simulations validate the proposed model’s effectiveness using Contiki’s Cooja simulator for IoT networks. [ABSTRACT FROM AUTHOR]
Copyright of Journal of Communications Software & Systems is the property of Croatian Communications & Information Society and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:18456421
DOI:10.24138/jcomss-2021-0189