Cargando…
IoT terminal security assessment system based on improved assessment method
The Internet of Things (IoT) technology is widely used and has been improved in research. However, due to the extensiveness of IoT technology, the heterogeneity and diversity of the device structure, the number of attacks against IoT has increased dramatically, so we need a method that can effective...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8425574/ https://www.ncbi.nlm.nih.gov/pubmed/34496004 http://dx.doi.org/10.1371/journal.pone.0256881 |
_version_ | 1783749874659885056 |
---|---|
author | Liu, Zhe Jin, Zehao Shangguan, Chenhan |
author_facet | Liu, Zhe Jin, Zehao Shangguan, Chenhan |
author_sort | Liu, Zhe |
collection | PubMed |
description | The Internet of Things (IoT) technology is widely used and has been improved in research. However, due to the extensiveness of IoT technology, the heterogeneity and diversity of the device structure, the number of attacks against IoT has increased dramatically, so we need a method that can effectively and actively determine safety. Considering the diversity of the terminal structure of IoT, a security method for the IoT terminal based on structural balance, method objectivity, and reliability is currently a challenging task. This paper introduces the idea of rate of change in mathematics into trust analysis, and forms three attribute sets based on trust interval and rate of change: discrete interval, change range, and change frequency. By calculating the above attributes of the entity’s trust value, the entity’s trust situation is obtained, and an overall assessment of the terminal entity’s trust situation is made from the three levels of completeness, accuracy and objectivity. Under the premise of reducing encryption and other means, the above method can evaluate the trust state of the IoT terminal from the perspective of the data, and this evaluation method can provide a basis for the judgment of the IoT terminal more objectively and accurately. |
format | Online Article Text |
id | pubmed-8425574 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-84255742021-09-09 IoT terminal security assessment system based on improved assessment method Liu, Zhe Jin, Zehao Shangguan, Chenhan PLoS One Research Article The Internet of Things (IoT) technology is widely used and has been improved in research. However, due to the extensiveness of IoT technology, the heterogeneity and diversity of the device structure, the number of attacks against IoT has increased dramatically, so we need a method that can effectively and actively determine safety. Considering the diversity of the terminal structure of IoT, a security method for the IoT terminal based on structural balance, method objectivity, and reliability is currently a challenging task. This paper introduces the idea of rate of change in mathematics into trust analysis, and forms three attribute sets based on trust interval and rate of change: discrete interval, change range, and change frequency. By calculating the above attributes of the entity’s trust value, the entity’s trust situation is obtained, and an overall assessment of the terminal entity’s trust situation is made from the three levels of completeness, accuracy and objectivity. Under the premise of reducing encryption and other means, the above method can evaluate the trust state of the IoT terminal from the perspective of the data, and this evaluation method can provide a basis for the judgment of the IoT terminal more objectively and accurately. Public Library of Science 2021-09-08 /pmc/articles/PMC8425574/ /pubmed/34496004 http://dx.doi.org/10.1371/journal.pone.0256881 Text en © 2021 Liu et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Liu, Zhe Jin, Zehao Shangguan, Chenhan IoT terminal security assessment system based on improved assessment method |
title | IoT terminal security assessment system based on improved assessment method |
title_full | IoT terminal security assessment system based on improved assessment method |
title_fullStr | IoT terminal security assessment system based on improved assessment method |
title_full_unstemmed | IoT terminal security assessment system based on improved assessment method |
title_short | IoT terminal security assessment system based on improved assessment method |
title_sort | iot terminal security assessment system based on improved assessment method |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8425574/ https://www.ncbi.nlm.nih.gov/pubmed/34496004 http://dx.doi.org/10.1371/journal.pone.0256881 |
work_keys_str_mv | AT liuzhe iotterminalsecurityassessmentsystembasedonimprovedassessmentmethod AT jinzehao iotterminalsecurityassessmentsystembasedonimprovedassessmentmethod AT shangguanchenhan iotterminalsecurityassessmentsystembasedonimprovedassessmentmethod |