Securing Internet-of-Things Systems Through Implicit and Explicit Reputation Models

被引:14
作者
Bordel, Bona [1 ]
Alcarria, Ramon [2 ]
Martin De Andres, Diego [1 ]
You, Ilsun [3 ]
机构
[1] Univ Politecn Madrid, Dept Telemat Syst Engn, E-28040 Madrid, Spain
[2] Univ Politecn Madrid, Dept Surveying & Cartog Engn, E-28040 Madrid, Spain
[3] Soonchunhyang Univ, Dept Informat Secur Engn, Seoul 31538, South Korea
关键词
Information systems; Internet-of-Things; security; reputation; uncertainty; pervasive sensing; knowledge discovery; TRUST MANAGEMENT; IOT;
D O I
10.1109/ACCESS.2018.2866185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet-of-Things (IoT) systems are usually composed of thousands of different components among hardware devices and different software modules. In order to address the design of these complex systems, different abstraction layers are usually defined. However, as these layers are isolated, highlevel components always have uncertainty about the nature of the low-level components they relate with. In particular, as low-level component identities are not known by user applications, and current IoT systems are vulnerable to the injection of new components and to the modification of the behavior of existing ones (adequate security solutions at the network level for these problems have not been found yet), the reliability of the received data is generally compromised. In this context, new mechanisms are required to avoid the interactions or directly remove the malicious components relying on high-level information. This paper describes a statistical framework to discover IoT components with malicious behaviors, using a hybrid reputation model. On the one hand, an implicit reputation definition is employed, based on the observations made by a certain IoT component and other modules it relies on. On the other hand, an explicit reputation model considers a scheme of recommendations and negative grades. The proposed solution is evaluated in a simulation scenario by using the NS3 simulator, in order to perform an experimental validation.
引用
收藏
页码:47472 / 47488
页数:17
相关论文
共 39 条
[1]  
Aggarwal C.C., 2013, MANAGING MINING SENS, P383, DOI DOI 10.1007/978-1-4614-6309-2_12
[2]   Resolving coordination challenges in distributed mobile service executions [J].
Alcarria, Ramon ;
Robles, Tomas ;
Morales, Augusto ;
Cedeno, Edwin .
INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2014, 10 (2-3) :168-191
[3]   Flexible Service Composition Based on Bundle Communication in OSGi [J].
Alcarria, Ramon ;
Robles, Tomas ;
Morales, Augusto ;
Gonzalez-Miranda, Sergio .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01) :116-130
[4]  
[Anonymous], 2013, Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, MCC '13, DOI [10.1145/2491266.2491270, DOI 10.1145/2491266.2491270]
[5]  
[Anonymous], 2016, PROC INNOVATIONS CLO
[6]  
[Anonymous], FOCUS J INT BUS
[7]  
Bao F, 2012, IEEE WOWMOM, P1, DOI DOI 10.1145/2378023.2378025
[8]  
Bolte M, 2010, DES AUT TEST EUROPE, P574
[9]   Detecting Malicious Components in Large-Scale Internet-of-Things Systems and Architectures [J].
Bordel, Borja ;
Alcarria, Ramon ;
Sanchez-de-Rivera, Diego .
RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2017, 569 :155-165
[10]   Cyber-physical systems: Extending pervasive sensing from control theory to the Internet of Things [J].
Bordel, Borja ;
Alcarria, Ramon ;
Robles, Tomas ;
Martin, Diego .
PERVASIVE AND MOBILE COMPUTING, 2017, 40 :156-184