Securing Internet-of-Things Systems Through Implicit and Explicit Reputation Models
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bordel, Bona | - |
dc.contributor.author | Alcarria, Ramon | - |
dc.contributor.author | Martin De Andres, Diego | - |
dc.contributor.author | You, Ilsun | - |
dc.date.accessioned | 2021-08-11T13:44:01Z | - |
dc.date.available | 2021-08-11T13:44:01Z | - |
dc.date.issued | 2018 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/6851 | - |
dc.description.abstract | Internet-of-Things (IoT) systems are usually composed of thousands of different components among hardware devices and different software modules. In order to address the design of these complex systems, different abstraction layers are usually defined. However, as these layers are isolated, highlevel components always have uncertainty about the nature of the low-level components they relate with. In particular, as low-level component identities are not known by user applications, and current IoT systems are vulnerable to the injection of new components and to the modification of the behavior of existing ones (adequate security solutions at the network level for these problems have not been found yet), the reliability of the received data is generally compromised. In this context, new mechanisms are required to avoid the interactions or directly remove the malicious components relying on high-level information. This paper describes a statistical framework to discover IoT components with malicious behaviors, using a hybrid reputation model. On the one hand, an implicit reputation definition is employed, based on the observations made by a certain IoT component and other modules it relies on. On the other hand, an explicit reputation model considers a scheme of recommendations and negative grades. The proposed solution is evaluated in a simulation scenario by using the NS3 simulator, in order to perform an experimental validation. | - |
dc.format.extent | 17 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Securing Internet-of-Things Systems Through Implicit and Explicit Reputation Models | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/ACCESS.2018.2866185 | - |
dc.identifier.scopusid | 2-s2.0-85051799396 | - |
dc.identifier.wosid | 000445425600001 | - |
dc.identifier.bibliographicCitation | IEEE Access, v.6, pp 47472 - 47488 | - |
dc.citation.title | IEEE Access | - |
dc.citation.volume | 6 | - |
dc.citation.startPage | 47472 | - |
dc.citation.endPage | 47488 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | TRUST MANAGEMENT | - |
dc.subject.keywordPlus | IOT | - |
dc.subject.keywordAuthor | Information systems | - |
dc.subject.keywordAuthor | Internet-of-Things | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | reputation | - |
dc.subject.keywordAuthor | uncertainty | - |
dc.subject.keywordAuthor | pervasive sensing | - |
dc.subject.keywordAuthor | knowledge discovery | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.