Cluster Node Migration Oriented Holistic Trust Management Protocol for Ubiquitous and Pervasive IoT Network

سال انتشار: 1400
نوع سند: مقاله ژورنالی
زبان: فارسی
مشاهده: 126

فایل این مقاله در 19 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JITM-13-1_006

تاریخ نمایه سازی: 25 بهمن 1400

چکیده مقاله:

Smart applications with interconnected intelligent devices for sharing services arise serious security problems to the stability of this IoT complex and heterogeneous environment. Unless security considerations are analyzed and implemented properly in real time then IoT cannot be perceived as a pervasive network for the possible stakeholders. Current state of the art has analyzed trust-based security solutions as additional feature to application layer of the system which can identify and filter out the malicious nodes. In this paper we are proposing holistic trust management with edge computing mechanism to create trustworthy zones comprising different clusters, where Gateway on behalf of clusters will initiate migration of their nodes if falls below the defined Zone trust threshold level. The created zones are self-resilient against any malicious attacks and saves lots processing usage time and energy to address the security issues. By analyzing our proposed algorithm with other contemporary approaches to handle IoT security issues using trust mechanism, this approach is more precise in terms of protecting system against incurring malicious behavior, and also prolong the application operation duration by reducing communication and processing overhead.

کلیدواژه ها:

Internet of Things ، Heterogeneous environment ، Clustering ، Oriented Holistic trust management

نویسندگان

Patnaik

Research Scholar, Department of Computer Science and Engineering, Centurion University of Technology and Management, Odisha, India.

Mallik

School of Applied Sciences, Centurion University of Technology and Management, Odisha, India.

Vamsi Krishna

Department of Computer Science and Engineering, Chaitanya College of science and Technology, Madhapatnam, Kakinada, India.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Abhijit J, P., & G. Syam Prasad, D. (۲۰۱۸). Trust ...
  • Alshehri, M. D., Hussain, F. K., & Hussain, O. K. ...
  • Behera, T. M., Mohapatra, S. K., Samal, U. C., Khan, ...
  • Chen, J., Tian, Z., Cui, X., Yin, L., & Wang, ...
  • Dedeoglu, V., Jurdak, R., Putra, G. D., Dorri, A., & ...
  • Fernandez-Gago, C., Moyano, F., & Lopez, J. (۲۰۱۷). Modeling trust ...
  • Juneja, A., Juneja, S., Bali, V., & Mahajan, S. Multi-Criterion ...
  • Juneja, S., Singh, S., & Bali, V. (۲۰۱۷). Research Paper ...
  • Khanna, T., Nand, P., & Bali, V. (۲۰۲۰). Permissioned Blockchain ...
  • Krishna, M. B. (۲۰۱۶). Security and trust management for the ...
  • Maddar, H., Kammoun, W., & Youssef, H. (۲۰۱۸). Effective distributed ...
  • Meng, W., Li, W., Su, C., Zhou, J., & Lu, ...
  • Mohan, A., & Bhanu Bhaskara, D. (۲۰۱۸). Multi-dimensional trust aware ...
  • Oumaima Ben Abderrahim, Mouhamed Houcine Elhdhili & Leila Saidane, (۲۰۱۶). ...
  • Pourghebleh, B., & Hayyolalam, V. (۲۰۱۹). A comprehensive and systematic ...
  • Shah, B., Iqbal, F., Abbas, A., & Kim, K. I. ...
  • Tragos, E. Z., Bernabe, J. B., Staudemeyer, R. C., Luis, ...
  • Wang, J. P., Bin, S., Yu, Y., & Niu, X. ...
  • نمایش کامل مراجع