Cargando…

IoT terminal security assessment system based on improved assessment method

The Internet of Things (IoT) technology is widely used and has been improved in research. However, due to the extensiveness of IoT technology, the heterogeneity and diversity of the device structure, the number of attacks against IoT has increased dramatically, so we need a method that can effective...

Descripción completa

Detalles Bibliográficos
Autores principales: Liu, Zhe, Jin, Zehao, Shangguan, Chenhan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8425574/
https://www.ncbi.nlm.nih.gov/pubmed/34496004
http://dx.doi.org/10.1371/journal.pone.0256881
_version_ 1783749874659885056
author Liu, Zhe
Jin, Zehao
Shangguan, Chenhan
author_facet Liu, Zhe
Jin, Zehao
Shangguan, Chenhan
author_sort Liu, Zhe
collection PubMed
description The Internet of Things (IoT) technology is widely used and has been improved in research. However, due to the extensiveness of IoT technology, the heterogeneity and diversity of the device structure, the number of attacks against IoT has increased dramatically, so we need a method that can effectively and actively determine safety. Considering the diversity of the terminal structure of IoT, a security method for the IoT terminal based on structural balance, method objectivity, and reliability is currently a challenging task. This paper introduces the idea of rate of change in mathematics into trust analysis, and forms three attribute sets based on trust interval and rate of change: discrete interval, change range, and change frequency. By calculating the above attributes of the entity’s trust value, the entity’s trust situation is obtained, and an overall assessment of the terminal entity’s trust situation is made from the three levels of completeness, accuracy and objectivity. Under the premise of reducing encryption and other means, the above method can evaluate the trust state of the IoT terminal from the perspective of the data, and this evaluation method can provide a basis for the judgment of the IoT terminal more objectively and accurately.
format Online
Article
Text
id pubmed-8425574
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-84255742021-09-09 IoT terminal security assessment system based on improved assessment method Liu, Zhe Jin, Zehao Shangguan, Chenhan PLoS One Research Article The Internet of Things (IoT) technology is widely used and has been improved in research. However, due to the extensiveness of IoT technology, the heterogeneity and diversity of the device structure, the number of attacks against IoT has increased dramatically, so we need a method that can effectively and actively determine safety. Considering the diversity of the terminal structure of IoT, a security method for the IoT terminal based on structural balance, method objectivity, and reliability is currently a challenging task. This paper introduces the idea of rate of change in mathematics into trust analysis, and forms three attribute sets based on trust interval and rate of change: discrete interval, change range, and change frequency. By calculating the above attributes of the entity’s trust value, the entity’s trust situation is obtained, and an overall assessment of the terminal entity’s trust situation is made from the three levels of completeness, accuracy and objectivity. Under the premise of reducing encryption and other means, the above method can evaluate the trust state of the IoT terminal from the perspective of the data, and this evaluation method can provide a basis for the judgment of the IoT terminal more objectively and accurately. Public Library of Science 2021-09-08 /pmc/articles/PMC8425574/ /pubmed/34496004 http://dx.doi.org/10.1371/journal.pone.0256881 Text en © 2021 Liu et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Liu, Zhe
Jin, Zehao
Shangguan, Chenhan
IoT terminal security assessment system based on improved assessment method
title IoT terminal security assessment system based on improved assessment method
title_full IoT terminal security assessment system based on improved assessment method
title_fullStr IoT terminal security assessment system based on improved assessment method
title_full_unstemmed IoT terminal security assessment system based on improved assessment method
title_short IoT terminal security assessment system based on improved assessment method
title_sort iot terminal security assessment system based on improved assessment method
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8425574/
https://www.ncbi.nlm.nih.gov/pubmed/34496004
http://dx.doi.org/10.1371/journal.pone.0256881
work_keys_str_mv AT liuzhe iotterminalsecurityassessmentsystembasedonimprovedassessmentmethod
AT jinzehao iotterminalsecurityassessmentsystembasedonimprovedassessmentmethod
AT shangguanchenhan iotterminalsecurityassessmentsystembasedonimprovedassessmentmethod