TAS-IoT: Trust-based Adaptive Security in the IoT

被引:23
作者
Hellaoui, Hamed [1 ]
Bouabdallah, Abdelmadjid [2 ]
Koudil, Mouloud [1 ]
机构
[1] Ecole Natl Super Informat ESI, LMCS Lab, Algiers 16309, Algeria
[2] Univ Technol Compiegne, Sorbonne Univ, CNRS, Heudiasyc UMR 7253, CS 60319, F-60203 Compiegne, France
来源
2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN) | 2016年
关键词
Internet of Things (IoT); Adaptive security; Trust management; MANAGEMENT;
D O I
10.1109/LCN.2016.101
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Providing efficient security services in dynamic low-power environments as the Internet of Things (IoT) is a challenging task. The deployment of static security services will consume the energy even if it is not required in some situations, so this induces a waste of resources. In this paper, we introduce an efficient model for adaptive security in the IoT based on trust management. Most of existing adaptive security approaches lack of practical means to evaluate threats. On the other hand, trust management systems are designed to deal with selfish behaviors or internal attacks and not to assist cryptographic measures. Our solution evaluates the trust level related to the presence of security threats among nodes, and adapt consequently cryptographic measures. The obtained simulation results show that our solution reduces considerably energy consumption and remains yet secure.
引用
收藏
页码:599 / 602
页数:4
相关论文
共 10 条
  • [1] [Anonymous], 2010, P INT C SEC CRYPT SE
  • [2] Bergmann O., 2015, TINYDTLS LIB DATAGRA
  • [3] Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks
    Di Mauro, Alessio
    Fafoutis, Xenofon
    Dragoni, Nicola
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [4] Hamdi M, 2014, IEEE ICC, P920, DOI 10.1109/ICC.2014.6883437
  • [5] Österlind F, 2006, C LOCAL COMPUT NETW, P641
  • [6] MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things
    Wang, Eric Ke
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Ye, Yuming
    Zhang, Zhujin
    Zou, Futai
    [J]. GENETIC AND EVOLUTIONARY COMPUTING, 2015, 329 : 389 - 397
  • [7] A survey on trust management for Internet of Things
    Yan, Zheng
    Zhang, Peng
    Vasilakos, Athanasios V.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 42 : 120 - 134
  • [8] Adaptive Security Provision for Increased Energy Efficiency in Wireless Sensor Networks
    Younis, Mohamed
    Krajewski, Nick
    Farrag, Osama
    [J]. 2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 999 - +
  • [9] A Survey of Trust and Reputation Management Systems in Wireless Communications
    Yu, Han
    Shen, Zhiqi
    Miao, Chunyan
    Leung, Cyril
    Niyato, Dusit
    [J]. PROCEEDINGS OF THE IEEE, 2010, 98 (10) : 1755 - 1772
  • [10] A Systematic Survey of Self-Protecting Software Systems
    Yuan, Eric
    Esfahani, Naeem
    Malek, Sam
    [J]. ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2014, 8 (04)