Cargando…

Internet of things security evaluation mechanism based on meta attribute fluctuation

In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an indep...

Descripción completa

Detalles Bibliográficos
Autores principales: Liu, Zhe, Yuan, Yinghao, Zhao, Bo, Wang, Yixuan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10348552/
https://www.ncbi.nlm.nih.gov/pubmed/37450503
http://dx.doi.org/10.1371/journal.pone.0282630
_version_ 1785073690832011264
author Liu, Zhe
Yuan, Yinghao
Zhao, Bo
Wang, Yixuan
author_facet Liu, Zhe
Yuan, Yinghao
Zhao, Bo
Wang, Yixuan
author_sort Liu, Zhe
collection PubMed
description In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an independent subset of the security research in the IoT field. However, it should also be noted that the security attributes of IoT terminals can include many aspects, so judging the security of IoT terminals based on the overall security form is not enough for the security of terminal entities. This paper introduces the concept of volatility from the overall situation assessment to the meta attributes that constitute the overall security situation, and preliminarily realizes the construction of a concise model based on historical data to judge the meta attributes that may affect the overall security in the future. At the same time, a concise verification system is built based on the application scenario of the power IoT terminals currently under research to preliminarily realize trend prediction, further expand the trust evaluation of IoT terminals, and clarify the direction of further research.
format Online
Article
Text
id pubmed-10348552
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-103485522023-07-15 Internet of things security evaluation mechanism based on meta attribute fluctuation Liu, Zhe Yuan, Yinghao Zhao, Bo Wang, Yixuan PLoS One Research Article In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an independent subset of the security research in the IoT field. However, it should also be noted that the security attributes of IoT terminals can include many aspects, so judging the security of IoT terminals based on the overall security form is not enough for the security of terminal entities. This paper introduces the concept of volatility from the overall situation assessment to the meta attributes that constitute the overall security situation, and preliminarily realizes the construction of a concise model based on historical data to judge the meta attributes that may affect the overall security in the future. At the same time, a concise verification system is built based on the application scenario of the power IoT terminals currently under research to preliminarily realize trend prediction, further expand the trust evaluation of IoT terminals, and clarify the direction of further research. Public Library of Science 2023-07-14 /pmc/articles/PMC10348552/ /pubmed/37450503 http://dx.doi.org/10.1371/journal.pone.0282630 Text en © 2023 Liu et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Liu, Zhe
Yuan, Yinghao
Zhao, Bo
Wang, Yixuan
Internet of things security evaluation mechanism based on meta attribute fluctuation
title Internet of things security evaluation mechanism based on meta attribute fluctuation
title_full Internet of things security evaluation mechanism based on meta attribute fluctuation
title_fullStr Internet of things security evaluation mechanism based on meta attribute fluctuation
title_full_unstemmed Internet of things security evaluation mechanism based on meta attribute fluctuation
title_short Internet of things security evaluation mechanism based on meta attribute fluctuation
title_sort internet of things security evaluation mechanism based on meta attribute fluctuation
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10348552/
https://www.ncbi.nlm.nih.gov/pubmed/37450503
http://dx.doi.org/10.1371/journal.pone.0282630
work_keys_str_mv AT liuzhe internetofthingssecurityevaluationmechanismbasedonmetaattributefluctuation
AT yuanyinghao internetofthingssecurityevaluationmechanismbasedonmetaattributefluctuation
AT zhaobo internetofthingssecurityevaluationmechanismbasedonmetaattributefluctuation
AT wangyixuan internetofthingssecurityevaluationmechanismbasedonmetaattributefluctuation