Securing Internet-of-Things Systems Through Implicit and Explicit Reputation Modelsopen access
- Authors
- Bordel, Bona; Alcarria, Ramon; Martin De Andres, Diego; You, Ilsun
- Issue Date
- 2018
- Publisher
- Institute of Electrical and Electronics Engineers Inc.
- Keywords
- Information systems; Internet-of-Things; security; reputation; uncertainty; pervasive sensing; knowledge discovery
- Citation
- IEEE Access, v.6, pp 47472 - 47488
- Pages
- 17
- Journal Title
- IEEE Access
- Volume
- 6
- Start Page
- 47472
- End Page
- 47488
- URI
- https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/6851
- DOI
- 10.1109/ACCESS.2018.2866185
- ISSN
- 2169-3536
- Abstract
- Internet-of-Things (IoT) systems are usually composed of thousands of different components among hardware devices and different software modules. In order to address the design of these complex systems, different abstraction layers are usually defined. However, as these layers are isolated, highlevel components always have uncertainty about the nature of the low-level components they relate with. In particular, as low-level component identities are not known by user applications, and current IoT systems are vulnerable to the injection of new components and to the modification of the behavior of existing ones (adequate security solutions at the network level for these problems have not been found yet), the reliability of the received data is generally compromised. In this context, new mechanisms are required to avoid the interactions or directly remove the malicious components relying on high-level information. This paper describes a statistical framework to discover IoT components with malicious behaviors, using a hybrid reputation model. On the one hand, an implicit reputation definition is employed, based on the observations made by a certain IoT component and other modules it relies on. On the other hand, an explicit reputation model considers a scheme of recommendations and negative grades. The proposed solution is evaluated in a simulation scenario by using the NS3 simulator, in order to perform an experimental validation.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Engineering > Department of Information Security Engineering > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/6851)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.