A Participatory Verification Security Scheme for the Internet of Things

被引:0
|
作者
Chifor, Bogdan-Cosmin [1 ]
Bica, Ion [1 ]
Patriciu, Victor-Valeriu [1 ]
机构
[1] Mil Tech Acad, Dept Comp Sci, 81-83 George Cosbuc Blvd, Bucharest, Romania
来源
2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM 2016) | 2016年
关键词
Internet of Things; security; smart city; social network; reputation; trust; REPUTATION; TRUST;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things is becoming a critical subject nowadays and along with an increasing adoption of ubiquitous computing devices security becomes an issue which must be approached in different application contexts. One notion that gains traction along with the IoT (Internet of Things) paradigm is the social context of embedded devices. This paper proposes a participatory verification security solution where citizens use an Android application to verify the position of an IoT device when uploading a sensing report. The reputation of an IoT device is built using the verification feedback and the information delivered by the most trusted device in a certain category is published on a social network.
引用
收藏
页码:267 / 270
页数:4
相关论文
共 50 条
  • [1] Lightweight Security Scheme for Internet of Things
    Ahmed Aziz
    Karan Singh
    Wireless Personal Communications, 2019, 104 : 577 - 593
  • [2] Lightweight Security Scheme for Internet of Things
    Aziz, Ahmed
    Singh, Karan
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 104 (02) : 577 - 593
  • [3] A Privacy Preservation Based Scheme for Task Assignment in Internet of Things
    Dai, Minghui
    Li, Jiliang
    Su, Zhou
    Chen, Weiwei
    Xu, Qichao
    Fu, Shu
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (04): : 2323 - 2335
  • [4] THE APPLICATION OF CLOUD DATA INTEGRITY VERIFICATION SCHEME IN INTERNET OF THINGS SECURITY
    Sai, Wei
    Zhang, Xinpeng
    Xie, Chengyang
    Li, Hong
    Zhang, Hui
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 268 - 273
  • [5] A survey study on trust-based security in Internet of Things: Challenges and issues
    Shirvani, Mirsaeid Hosseini
    Masdari, Mohammad
    INTERNET OF THINGS, 2023, 21
  • [6] A roadmap for security challenges in the Internet of Things
    Sfar, Arbia Riahi
    Natalizio, Enrico
    Challal, Yacine
    Chtourou, Zied
    DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (02) : 118 - 137
  • [7] A survey on privacy and security of Internet of Things
    Ogonji, Mark Mbock
    Okeyo, George
    Wafula, Joseph Muliaro
    COMPUTER SCIENCE REVIEW, 2020, 38
  • [8] Hybrid Internet of Things (IoT) data transmission security corresponding to device verification
    Jian, Ming-Shen
    Wu, Jimmy Ming-Tai
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [9] Security standard compliance and continuous verification for Industrial Internet of Things
    Bicaku, Ani
    Tauber, Markus
    Delsing, Jerker
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (06)
  • [10] Survey: Security and Trust Management in Internet of Things
    Thirukkumaran, R.
    Kannan, Muthu P.
    2018 2ND IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN - 2018), VOL II, 2018, : 131 - 134