IoT terminal security assessment system based on improved assessment method.
The Internet of Things (IoT) technology is widely used and has been improved in research. However, due to the extensiveness of IoT technology, the heterogeneity and diversity of the device structure, the number of attacks against IoT has increased dramatically, so we need a method that can effective...
Guardado en:
Autores principales: | , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Public Library of Science (PLoS)
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/0d3d61b122084960bf16b15d7241ec6e |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:0d3d61b122084960bf16b15d7241ec6e |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:0d3d61b122084960bf16b15d7241ec6e2021-12-02T20:14:45ZIoT terminal security assessment system based on improved assessment method.1932-620310.1371/journal.pone.0256881https://doaj.org/article/0d3d61b122084960bf16b15d7241ec6e2021-01-01T00:00:00Zhttps://doi.org/10.1371/journal.pone.0256881https://doaj.org/toc/1932-6203The Internet of Things (IoT) technology is widely used and has been improved in research. However, due to the extensiveness of IoT technology, the heterogeneity and diversity of the device structure, the number of attacks against IoT has increased dramatically, so we need a method that can effectively and actively determine safety. Considering the diversity of the terminal structure of IoT, a security method for the IoT terminal based on structural balance, method objectivity, and reliability is currently a challenging task. This paper introduces the idea of rate of change in mathematics into trust analysis, and forms three attribute sets based on trust interval and rate of change: discrete interval, change range, and change frequency. By calculating the above attributes of the entity's trust value, the entity's trust situation is obtained, and an overall assessment of the terminal entity's trust situation is made from the three levels of completeness, accuracy and objectivity. Under the premise of reducing encryption and other means, the above method can evaluate the trust state of the IoT terminal from the perspective of the data, and this evaluation method can provide a basis for the judgment of the IoT terminal more objectively and accurately.Zhe LiuZehao JinChenhan ShangguanPublic Library of Science (PLoS)articleMedicineRScienceQENPLoS ONE, Vol 16, Iss 9, p e0256881 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Medicine R Science Q |
spellingShingle |
Medicine R Science Q Zhe Liu Zehao Jin Chenhan Shangguan IoT terminal security assessment system based on improved assessment method. |
description |
The Internet of Things (IoT) technology is widely used and has been improved in research. However, due to the extensiveness of IoT technology, the heterogeneity and diversity of the device structure, the number of attacks against IoT has increased dramatically, so we need a method that can effectively and actively determine safety. Considering the diversity of the terminal structure of IoT, a security method for the IoT terminal based on structural balance, method objectivity, and reliability is currently a challenging task. This paper introduces the idea of rate of change in mathematics into trust analysis, and forms three attribute sets based on trust interval and rate of change: discrete interval, change range, and change frequency. By calculating the above attributes of the entity's trust value, the entity's trust situation is obtained, and an overall assessment of the terminal entity's trust situation is made from the three levels of completeness, accuracy and objectivity. Under the premise of reducing encryption and other means, the above method can evaluate the trust state of the IoT terminal from the perspective of the data, and this evaluation method can provide a basis for the judgment of the IoT terminal more objectively and accurately. |
format |
article |
author |
Zhe Liu Zehao Jin Chenhan Shangguan |
author_facet |
Zhe Liu Zehao Jin Chenhan Shangguan |
author_sort |
Zhe Liu |
title |
IoT terminal security assessment system based on improved assessment method. |
title_short |
IoT terminal security assessment system based on improved assessment method. |
title_full |
IoT terminal security assessment system based on improved assessment method. |
title_fullStr |
IoT terminal security assessment system based on improved assessment method. |
title_full_unstemmed |
IoT terminal security assessment system based on improved assessment method. |
title_sort |
iot terminal security assessment system based on improved assessment method. |
publisher |
Public Library of Science (PLoS) |
publishDate |
2021 |
url |
https://doaj.org/article/0d3d61b122084960bf16b15d7241ec6e |
work_keys_str_mv |
AT zheliu iotterminalsecurityassessmentsystembasedonimprovedassessmentmethod AT zehaojin iotterminalsecurityassessmentsystembasedonimprovedassessmentmethod AT chenhanshangguan iotterminalsecurityassessmentsystembasedonimprovedassessmentmethod |
_version_ |
1718374628272898048 |