Cargando…
Internet of things security evaluation mechanism based on meta attribute fluctuation
In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an indep...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10348552/ https://www.ncbi.nlm.nih.gov/pubmed/37450503 http://dx.doi.org/10.1371/journal.pone.0282630 |
_version_ | 1785073690832011264 |
---|---|
author | Liu, Zhe Yuan, Yinghao Zhao, Bo Wang, Yixuan |
author_facet | Liu, Zhe Yuan, Yinghao Zhao, Bo Wang, Yixuan |
author_sort | Liu, Zhe |
collection | PubMed |
description | In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an independent subset of the security research in the IoT field. However, it should also be noted that the security attributes of IoT terminals can include many aspects, so judging the security of IoT terminals based on the overall security form is not enough for the security of terminal entities. This paper introduces the concept of volatility from the overall situation assessment to the meta attributes that constitute the overall security situation, and preliminarily realizes the construction of a concise model based on historical data to judge the meta attributes that may affect the overall security in the future. At the same time, a concise verification system is built based on the application scenario of the power IoT terminals currently under research to preliminarily realize trend prediction, further expand the trust evaluation of IoT terminals, and clarify the direction of further research. |
format | Online Article Text |
id | pubmed-10348552 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-103485522023-07-15 Internet of things security evaluation mechanism based on meta attribute fluctuation Liu, Zhe Yuan, Yinghao Zhao, Bo Wang, Yixuan PLoS One Research Article In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an independent subset of the security research in the IoT field. However, it should also be noted that the security attributes of IoT terminals can include many aspects, so judging the security of IoT terminals based on the overall security form is not enough for the security of terminal entities. This paper introduces the concept of volatility from the overall situation assessment to the meta attributes that constitute the overall security situation, and preliminarily realizes the construction of a concise model based on historical data to judge the meta attributes that may affect the overall security in the future. At the same time, a concise verification system is built based on the application scenario of the power IoT terminals currently under research to preliminarily realize trend prediction, further expand the trust evaluation of IoT terminals, and clarify the direction of further research. Public Library of Science 2023-07-14 /pmc/articles/PMC10348552/ /pubmed/37450503 http://dx.doi.org/10.1371/journal.pone.0282630 Text en © 2023 Liu et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Liu, Zhe Yuan, Yinghao Zhao, Bo Wang, Yixuan Internet of things security evaluation mechanism based on meta attribute fluctuation |
title | Internet of things security evaluation mechanism based on meta attribute fluctuation |
title_full | Internet of things security evaluation mechanism based on meta attribute fluctuation |
title_fullStr | Internet of things security evaluation mechanism based on meta attribute fluctuation |
title_full_unstemmed | Internet of things security evaluation mechanism based on meta attribute fluctuation |
title_short | Internet of things security evaluation mechanism based on meta attribute fluctuation |
title_sort | internet of things security evaluation mechanism based on meta attribute fluctuation |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10348552/ https://www.ncbi.nlm.nih.gov/pubmed/37450503 http://dx.doi.org/10.1371/journal.pone.0282630 |
work_keys_str_mv | AT liuzhe internetofthingssecurityevaluationmechanismbasedonmetaattributefluctuation AT yuanyinghao internetofthingssecurityevaluationmechanismbasedonmetaattributefluctuation AT zhaobo internetofthingssecurityevaluationmechanismbasedonmetaattributefluctuation AT wangyixuan internetofthingssecurityevaluationmechanismbasedonmetaattributefluctuation |