چکیده:
Smart applications with interconnected intelligent devices for sharing services arise serious security problems to the stability of this IoT complex and heterogeneous environment. Unless security considerations are analyzed and implemented properly in real time then IoT cannot be perceived as a pervasive network for the possible stakeholders. Current state of the art has analyzed trust-based security solutions as additional feature to application layer of the system which can identify and filter out the malicious nodes. In this paper we are proposing holistic trust management with edge computing mechanism to create trustworthy zones comprising different clusters, where Gateway on behalf of clusters will initiate migration of their nodes if falls below the defined Zone trust threshold level. The created zones are self-resilient against any malicious attacks and saves lots processing usage time and energy to address the security issues. By analyzing our proposed algorithm with other contemporary approaches to handle IoT security issues using trust mechanism, this approach is more precise in terms of protecting system against incurring malicious behavior, and also prolong the application operation duration by reducing communication and processing overhead.
خلاصه ماشینی:
Cluster Node Migration Oriented Holistic Trust Management Protocol for Ubiquitous and Pervasive IoT Network Anup Patnaik *Corresponding Author, Research Scholar, Department of Computer Science and Engineering, Centurion University of Technology and Management, Odisha, India.
In this paper we are proposing holistic trust management with edge computing mechanism to create trustworthy zones comprising different clusters, where Gateway on behalf of clusters will initiate migration of their nodes if falls below the defined Zone trust threshold level.
By analyzing our proposed algorithm with other contemporary approaches to handle IoT security issues using trust mechanism, this approach is more precise in terms of protecting system against incurring malicious behavior, and also prolong the application operation duration by reducing communication and processing overhead.
Good Mouthing Attacks: Provides good recommendation to fake objects to promote its trust value Bad Mouthing Attacks: Provides bad recommendation to good objects to demote its trust value Self-Promoting attacks: Provides good recommendation to itself to promote its trust value Selective forwarding attacks: Only forwards selected packets and drops other packets Sinkhole attack: creates the fake information and sends the route request to neighbor nodes Based on the previous research motivation in forming clusters in the network, our proposed approach here is extending the cluster to trustworthy zones formation, i.
With the gain of popularity of IoT in real time scenario connected with multiple heterogeneous devices, Mohan and Bhanu (2018) sensed the challenges inherent inside IoT life early and proposed the multi-dimensional trust aware routing framework considering social trust (direct and indirect trust) and also information trust to select next hop node.