首页> 外文OA文献 >A Trust-based Routing Framework for the Internet of Things
【2h】

A Trust-based Routing Framework for the Internet of Things

机译:一种基于信任的物联网路由框架

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The intelligent connectivity of smart sensor devices commonly referred to as the Internet of Things (IoT) — is swiftly progressing productivity and communication levels and providing many functionalities throughout many organizations globally. The benefits heralded by the IoT’s revolution is threatened, however, by the general lack of understanding of IoT’s specific security demands thus, limiting its swift adoption and potential growth.Two distinguishing features of IoT that makes it unique are the interconnection of billions of smart devices, and the resource-constrained nature of smart “things”. However, most IoT devices and applications operate with either no security; limited or insufficient security to protect the data they transmit during operation due to their limiting properties like CPU, memory capacity, battery life and mobility. This issue is further compounded for IoT system designers, as a global security framework has not been well defined, and most IoT system designers lack the knowledge or expertise to design or define secure IoT systems since this is a new and emerging technology. The routing of data in the IoT network is a specific security area of concern. With the massive scale of data exchange between these devices, and no adequate security to protect the communication of data, compromising data routes becomes easy for attackers. This thesis therefore, proposes a secure routing communication framework called SecTrust, which scales on IoT size and provides acceptable network performances while not depleting the resource availability of these smart “things”. The proposed SecTrust is a secure Trust-based framework for IoT that provides a platform for trust computation, trust evaluation and trust formation among nodes. This framework provides a secure communication among the connected nodes. The framework further provides a system for the identification and isolation of malicious nodes operating within the network. In this system, every node computes the trustworthiness of its direct neighbours based on the computed direct trust value and the recommended trust value. While neighbours with high trust values are chosen for secure routing, nodes with lower trust values are categorised either as malicious, compromised, or perhaps selfish nodes that seek to preserve their resources like battery power. SecTrust consists of five main processes: trust calculation process, trust monitoring process, detection and isolation of malicious nodes, trust rating process and trust backup/recuperation process.The development of this system provides insight into the use of modelling and analytical tools in building effective designs for P2P networks, through the design and development of trust computation, trust creation and trust propagation mechanisms, which are embedded, tested and validated using an IoT platform. The utility of SecTrust as a promising framework for IoT systems is demonstrated via its practical applications comprising: detection and isolation of malicious actors, management and sustenance of trust and recommendation systems in IoT networks and secure routing in IoT using a trust-based mechanism. Through the framework proposed, this thesis demonstrates that the SecTrust system showed promising performance results over other trust-based systems while simulations and testbed experiments offer proof-of-concept of the practicality of the proposed framework solution regardless of the operations of unreliable nodes, malicious nodes, selfish nodes, and even trust related attacks in the network.Furthermore, this study is supported by proposing, implementing, and evaluating the trust-based system for large-scale IoT networks, and it constitutes three main parts. In the first part, the design and evaluation of SecTrust is reported. The effectiveness and transaction validity metrics are measured under purely naïve (attacking nodes working independently) and purely collective (attacking nodes colluding together) scenarios while scaling the network size from small size to a large-sized network. The second part covered the actualization of the SecTrust framework into an IoT routing protocol (SecTrust-RPL). The SecTrust framework was embedded into the RPL routing protocol and simulated using an IoT platform. The simulation was conducted to demonstrate the performance of the trust framework in mitigating known IoT attacks while providing acceptable levels of network performance. The performance of SecTrust-RPL protocol was compared with the RPL routing protocol.The third part was a testbed experiment, which served as a proof-of-concept to validate the simulation results presented and to show the practicality and efficacy of the SecTrust framework in mitigating IoT attacks in a real-world environment with minimal impact on network performance.
机译:通常称为物联网(IoT)的智能传感器设备的智能连接正在迅速提高生产率和通信水平,并在全球许多组织中提供许多功能。物联网革命所带来的好处受到威胁,但是由于人们普遍缺乏对物联网特定安全需求的了解,从而限制了物联网的迅速采用和潜在增长。物联网的两个与众不同的特征是数十亿智能设备的互连性,以及智能“事物”的资源受限性质。但是,大多数物联网设备和应用程序要么没有安全性,要么没有安全性。由于CPU,内存容量,电池寿命和移动性等限制属性,其安全性受到限制或不足以保护它们在操作期间传输的数据。由于尚未对全球安全框架进行很好的定义,因此对于物联网系统设计人员来说,这个问题更加复杂,而且大多数物联网系统设计人员缺乏设计或定义安全物联网系统的知识或专业知识,因为这是一项新兴技术。 IoT网络中的数据路由是一个特定的安全领域。这些设备之间的数据交换规模巨大,并且没有足够的安全性来保护数据通信,因此攻击者容易破坏数据路由。因此,本文提出了一种称为SecTrust的安全路由通信框架,该框架可扩展IoT规模并提供可接受的网络性能,同时又不会耗尽这些智能“物”的资源可用性。提出的SecTrust是一个用于物联网的基于信任的安全框架,它为节点之间的信任计算,信任评估和信任形成提供了一个平台。该框架提供了所连接节点之间的安全通信。该框架还提供了一种用于识别和隔离网络内运行的恶意节点的系统。在该系统中,每个节点都基于计算的直接信任值和建议的信任值来计算其直接邻居的信任度。当选择具有高信任值的邻居进行安全路由时,将具有较低信任值的节点分类为试图保留其资源(如电池电量)的恶意,受到威胁或自私的节点。 SecTrust包含五个主要过程:信任计算过程,信任监视过程,恶意节点的检测和隔离,信任评级过程和信任备份/恢复过程。此系统的开发提供了对使用建模和分析工具来构建有效模型的见解。通过设计和开发信任计算,信任创建和信任传播机制来设计P2P网络,并使用IoT平台对其进行嵌入式,测试和验证。 SecTrust作为物联网系统的有前途的框架的实用性通过其实际应用得到了证明,包括:检测和隔离恶意行为者,物联网网络中信任和推荐系统的管理和维护以及使用基于信任机制的物联网中的安全路由。通过提出的框架,本文证明了SecTrust系统比其他基于信任的系统表现出了可观的性能结果,而仿真和测试平台实验则为所提出的框架解决方案的实用性提供了概念验证,无论不可靠的节点,恶意的操作如何节点,自私节点甚至是网络中与信任相关的攻击。此外,这项研究得到了大规模物联网网络基于信任的系统的提出,实施和评估的支持,它包括三个主要部分。在第一部分中,报告了SecTrust的设计和评估。有效性和事务有效性度量标准是在纯粹的天真(攻击节点独立工作)和纯粹的集体(攻击节点共同协作)场景下进行测量的,同时将网络规模从小型网络扩展到大型网络。第二部分介绍了将SecTrust框架实现为IoT路由协议(SecTrust-RPL)。 SecTrust框架已嵌入RPL路由协议中,并使用IoT平台进行了仿真。进行仿真是为了演示信任框架在缓解已知的IoT攻击的同时提供可接受级别的网络性能的性能。将SecTrust-RPL协议的性能与RPL路由协议进行了比较。第三部分是测试实验,作为概念验证,验证了所给出的仿真结果,并证明了SecTrust框架在网络环境中的实用性和有效性。在实际环境中缓解IoT攻击,对网络性能的影响最小。

著录项

  • 作者

    Airehrour David;

  • 作者单位
  • 年度 2017
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号