Security in IoT Mesh Networks Based on Trust Similarity

نویسندگان

چکیده

Internet of Things (IoT) Mesh networks are becoming very popular to enable IoT devices communicate without relying on dedicated PC services. implicitly uses mesh networks. connectivity cloud and edge computing is in vogue. A Wireless Network (WMN) a multi-hop distributed wireless network with routers clients. Data originating from clients forwarded destinations through routers. In networks, devices. The crucial security issue these the lack trusted third party for validation. However, trust between nodes required proper functioning network. WMNs particularly vulnerable as they rely upon cooperative forwarding. this research work, secure sustainable novel mechanism framework proposed. This identifies malicious improves nodes’ cooperation. proposed or model differentiates legitimate using direct indirect trust. Direct computed based packet-forwarding behavior node. have multi radios, so promiscuous mode may not work. new two-hop observe neighbors’ packet forwarding behavior. Indirect by aggregating recommendations weighted D-S theory, where weight similarity that correlates received different neighbors. Dynamic computation calculates overall several interactions. We present evaluations show effectiveness approach presence drop/modification attacks, bad-mouthing on-off collusion attacks ns-2 simulator.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Merging Similarity and Trust Based Social Networks to Enhance the Accuracy of Trust-Aware Recommender Systems

In recent years, collaborative filtering (CF) methods are important and widely accepted techniques are available for recommender systems. One of these techniques is user based that produces useful recommendations based on the similarity by the ratings of likeminded users. However, these systems suffer from several inherent shortcomings such as data sparsity and cold start problems. With the dev...

متن کامل

merging similarity and trust based social networks to enhance the accuracy of trust-aware recommender systems

in recent years, collaborative filtering (cf) methods are important and widely accepted techniques are available for recommender systems. one of these techniques is user based that produces useful recommendations based on the similarity by the ratings of likeminded users. however, these systems suffer from several inherent shortcomings such as data sparsity and cold start problems. with the dev...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

Security management based on trust determination in cognitive radio networks

Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechani...

متن کامل

Cost-aware Topology Customization of Mesh-based Networks-on-Chip

Nowadays, the growing demand for supporting multiple applications causes to use multiple IPs onto the chip. In fact, finding truly scalable communication architecture will be a critical concern. To this end, the Networks-on-Chip (NoC) paradigm has emerged as a promising solution to on-chip communication challenges within the silicon-based electronics. Many of today’s NoC architectures are based...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2022

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2022.3220678