Trust Management Approach for Detection of Malicious Devices in SIoT
نویسندگان
چکیده
Internet of Things (IoT) is an innovative era interrelated devices to provide services other or users. In Social Thing (SIoT), social networking aspect used for building relationships between devices. For providing utilizing services, need trust each in complex and heterogeneous environments. Separating benign malicious SIoT a prime security objective. literature, several works proposed computation models based on features. But these fail identify This paper focuses detection this paper, basic fundamentals, properties, attacks are discussed. Up-to-date research distributions management reviewed idea Trust Management using Machine Learning Algorithm (TM-MLA) identification
منابع مشابه
study of cohesive devices in the textbook of english for the students of apsychology by rastegarpour
this study investigates the cohesive devices used in the textbook of english for the students of psychology. the research questions and hypotheses in the present study are based on what frequency and distribution of grammatical and lexical cohesive devices are. then, to answer the questions all grammatical and lexical cohesive devices in reading comprehension passages from 6 units of 21units th...
Malicious Hardware Detection and Design for Trust: an Analysis
Hardware security is an emerging topic in integrated-circuit (IC) industries. Research in the domain of the hardware security is at a full swing and many schemes to enhance the security are being explored. The hardware Trojan (HT) design and its various detection techniques to ensure the trust in design are the most sought for schemes. The analysis of the reported techniques explores the major ...
متن کاملA Novel Trust Management Model in the Social Internet of Things
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...
متن کاملCost-Sensitive Detection of Malicious Applications in Mobile Devices
Mobile phones have become a primary communication device nowadays. In order to maintain proper functionality, various existing security solutions are being integrated into mobile devices. Some of the more sophisticated solutions, such as host-based intrusion detection systems (HIDS) are based on continuously monitoring many parameters in the device such as CPU and memory consumption. Since the ...
متن کاملA Game Theory Approach for Malicious Node Detection in MANETs
One of the main features of nodes in mobile ad hoc networks (MANETs) is their cooperation with neighbors to propagate data. Misusing this feature, malicious nodes cooperate with normal nodes to disrupt network operation and reduce its efficiency. These nodes attack other network nodes and prevent being detected by other nodes through using the mobility characteristic of nodes in MANETs. One of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Tehni?ki glasnik
سال: 2021
ISSN: ['1846-6168', '1848-5588']
DOI: https://doi.org/10.31803/tg-20210204180217