A Participatory Verification Security Scheme for the Internet of Things

被引:0
|
作者
Chifor, Bogdan-Cosmin [1 ]
Bica, Ion [1 ]
Patriciu, Victor-Valeriu [1 ]
机构
[1] Mil Tech Acad, Dept Comp Sci, 81-83 George Cosbuc Blvd, Bucharest, Romania
来源
2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM 2016) | 2016年
关键词
Internet of Things; security; smart city; social network; reputation; trust; REPUTATION; TRUST;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things is becoming a critical subject nowadays and along with an increasing adoption of ubiquitous computing devices security becomes an issue which must be approached in different application contexts. One notion that gains traction along with the IoT (Internet of Things) paradigm is the social context of embedded devices. This paper proposes a participatory verification security solution where citizens use an Android application to verify the position of an IoT device when uploading a sensing report. The reputation of an IoT device is built using the verification feedback and the information delivered by the most trusted device in a certain category is published on a social network.
引用
收藏
页码:267 / 270
页数:4
相关论文
共 50 条
  • [21] Security for the Internet of Things with Intelligent Automata
    Hashemi, Seyed Mahmood
    He, Jingsha
    Basabi, Alireza Ebrahimi
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1047 - 1051
  • [22] An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices
    Wu, Xin-Wen
    Farag, Waleed
    Ali, Sanwar
    Kulkarni, Siddhivinayak
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 679 - 685
  • [23] AN IBE-BASED SECURITY SCHEME ON INTERNET OF THINGS
    Chen, Wang
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1046 - 1049
  • [24] Fog-Based Internet of Things: A Security Scheme
    Alhazmi, Omar H.
    Aloufi, Khalid S.
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [25] Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)
    Babar, Sachin
    Mahalle, Parikshit
    Stango, Antonietta
    Prasad, Neeli
    Prasad, Ramjee
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 420 - 429
  • [26] Machine learning and the Internet of Things security: Solutions and open challenges
    Farooq, Umer
    Tariq, Noshina
    Asim, Muhammad
    Baker, Thar
    Al-Shamma'a, Ahmed
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 162 : 89 - 104
  • [27] End-to-End Trust and Security for Internet of Things Applications
    Bhattarai, Sulabh
    Wang, Yong
    COMPUTER, 2018, 51 (04) : 20 - 27
  • [28] A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things
    Hintaw, Ahmed J.
    Manickam, Selvakumar
    Karuppayah, Shankar
    Aladaileh, Mohammad Adnan
    Aboalmaaly, Mohammed Faiz
    Laghari, Shams Ul Arfeen
    IEEE ACCESS, 2023, 11 : 43019 - 43040
  • [29] Cyberentity Security in the Internet of Things
    Ning, Huansheng
    Liu, Hong
    Yang, Laurence T.
    COMPUTER, 2013, 46 (04) : 46 - 53
  • [30] An Overview of Security in Internet of Things
    Jose, Deepa V.
    Vijyalakshmi, A.
    8TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2018), 2018, 143 : 744 - 748