Trust Management Approach for Detection of Malicious Devices in SIoT

نویسندگان

چکیده

Internet of Things (IoT) is an innovative era interrelated devices to provide services other or users. In Social Thing (SIoT), social networking aspect used for building relationships between devices. For providing utilizing services, need trust each in complex and heterogeneous environments. Separating benign malicious SIoT a prime security objective. literature, several works proposed computation models based on features. But these fail identify This paper focuses detection this paper, basic fundamentals, properties, attacks are discussed. Up-to-date research distributions management reviewed idea Trust Management using Machine Learning Algorithm (TM-MLA) identification

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

study of cohesive devices in the textbook of english for the students of apsychology by rastegarpour

this study investigates the cohesive devices used in the textbook of english for the students of psychology. the research questions and hypotheses in the present study are based on what frequency and distribution of grammatical and lexical cohesive devices are. then, to answer the questions all grammatical and lexical cohesive devices in reading comprehension passages from 6 units of 21units th...

Malicious Hardware Detection and Design for Trust: an Analysis

Hardware security is an emerging topic in integrated-circuit (IC) industries. Research in the domain of the hardware security is at a full swing and many schemes to enhance the security are being explored. The hardware Trojan (HT) design and its various detection techniques to ensure the trust in design are the most sought for schemes. The analysis of the reported techniques explores the major ...

متن کامل

A Novel Trust Management Model in the Social Internet of Things

The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...

متن کامل

Cost-Sensitive Detection of Malicious Applications in Mobile Devices

Mobile phones have become a primary communication device nowadays. In order to maintain proper functionality, various existing security solutions are being integrated into mobile devices. Some of the more sophisticated solutions, such as host-based intrusion detection systems (HIDS) are based on continuously monitoring many parameters in the device such as CPU and memory consumption. Since the ...

متن کامل

A Game Theory Approach for Malicious Node Detection in MANETs

One of the main features of nodes in mobile ad hoc networks (MANETs) is their cooperation with neighbors to propagate data. Misusing this feature, malicious nodes cooperate with normal nodes to disrupt network operation and reduce its efficiency. These nodes attack other network nodes and prevent being detected by other nodes through using the mobility characteristic of nodes in MANETs. One of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Tehni?ki glasnik

سال: 2021

ISSN: ['1846-6168', '1848-5588']

DOI: https://doi.org/10.31803/tg-20210204180217