...
首页> 外文期刊>Information Processing & Management >Robust Decentralised Trust Management for the Internet of Things by Using Game Theory
【24h】

Robust Decentralised Trust Management for the Internet of Things by Using Game Theory

机译:利用博弈论,强大的分散信托管理对事物互联网

获取原文
获取原文并翻译 | 示例
           

摘要

Due to the large scale of the typical deployments and the involvement of moving objects to the Internet of Things, participating nodes opportunistically establish data exchanging connections, spanning across multiple organizations and security domains. This opportunistic behavior causes the impossibility of defining valid security policies to rule node authorization, and the ineffectiveness of traditional static access control models based on roles or attributes. Trust management is a promising solution to complement these conventional rules and models by realizing a more dynamic security approach and regulating connection request acceptance or rejection based on monitored behaviors. As a centralized authority cannot be established within multi-tenant and large scale infrastructures, decentralized approaches have recently emerged, supported by the blockchain technology, and applied to the case of useful Internet of Things implementations. However, they are vulnerable to possible attacks aiming at discrediting honest nodes (by lowering their trust degree) and/or redeem malicious nodes (by increasing their trust degree). The widely-accepted protection consists of securing the communications by using SSL/TLS, and restricting the nodes allowed to update the trust degree. However, they are known to be ineffective against compromised nodes that, despite holding legitimate security claims and cryptographic material, they deviate from the correct behavior by sending false and mendacious scores. This work proposes to exploit on game theory to realize robust decentralized trust management able to tolerate malicious nodes sending mendacious scores. Explicitly, a signaling node has been formalized to model the interactions between the IoT and the edge nodes by refusing potentially untrue scores. Moreover, the evolutionary Dempster-Shafer theory is used to combine the collected scores to update nodes' trust degrees, by excluding diverging scores far from the majority. Such solutions have been implemented within the context of a blockchain-supported trust management solution for IoT, and an empirical assessment is provided to show the quality of the proposed approach.
机译:由于典型的部署规模和移动对象的参与,参与节点可以制定数据交换连接,跨越多个组织和安全域。这种机会主义行为导致不可能将有效的安全策略定义为规则节点授权,以及基于角色或属性的传统静态访问控制模型的无效性。信任管理是一个有希望的解决方案,通过实现更具动态的安全方法和基于受监控行为来调节连接请求验收或拒绝来补充这些传统规则和模型。由于无法在多租户和大规模基础设施内建立集中权威,最近被块链接技术支持的分散方法,并应用于有用的事物互联网实现的情况。但是,它们易于攻击旨在诋毁诚实节点的攻击(通过降低他们的信任程度)和/或通过增加他们的信任程度)。广泛接受的保护包括使用SSL / TLS来保护通信,并限制允许更新信任度的节点。然而,众所周知,他们无法对受损的节点无效,尽管持有合法的安全要求和加密材料,但它们通过发送虚假和义务分数来偏离正确的行为。这项工作建议利用博弈论实现强大的分散信任管理,能够容忍发送德内德分数的恶意节点。明确地,通过拒绝可能不真实的分数,正式地正式地正式化以模拟IOT和边缘节点之间的交互。此外,进化的Dempster-Shafer理论用于将收集的分数结合到更新节点的信任程度,除了远离大多数的分歧。此类解决方案已在IOT的区块链支持的信任管理解决方案的背景下实施,并提供了实证评估以显示所提出的方法的质量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号