2018
DOI: 10.1155/2018/6063456
|View full text |Cite
|
Sign up to set email alerts
|

A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things

Abstract: Internet of Things (IoT) resources cooperate with themselves for requesting and providing services. In heterogeneous and complex environments, those resources must trust each other. On-Off attacks threaten the IoT trust security through nodes performing good and bad behaviors randomly, to avoid being rated as a menace. Some countermeasures demand prior levels of trust knowledge and time to classify a node behavior. In some cases, a malfunctioning node can be mismatched as an attacker. In this paper, we introdu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
33
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 46 publications
(33 citation statements)
references
References 14 publications
0
33
0
Order By: Relevance
“…The centralized trust models suffer from their reliance on higher level entity, which may be not available temporarily or permanently everywhere. To overcome this issue, other trust models perform both trust evaluation and provider selection in a distributed manner . In T‐D2D, all functions are executed distributively inside each IoT node, while recommendations are exchanged between different IoT nodes.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…The centralized trust models suffer from their reliance on higher level entity, which may be not available temporarily or permanently everywhere. To overcome this issue, other trust models perform both trust evaluation and provider selection in a distributed manner . In T‐D2D, all functions are executed distributively inside each IoT node, while recommendations are exchanged between different IoT nodes.…”
Section: Discussionmentioning
confidence: 99%
“…Some trust models are based on beta distribution or a variant of this technique to calculate the direct trust over the whole time, making them capable to only detect very intense on‐off attacks to some extent . Some other works use the same technique but over an interval of time, allowing them to improve their detection of very intense on‐off attacks . Some works consider twice punishment for malicious behavior, allowing them to detect intense on‐off attacks to some extent (ie, with at least half bad to good behavior ratio).…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations