Trust management system design for the Internet of Things A…

上传人:e****s 文档编号:252590149 上传时间:2024-11-18 格式:PPT 页数:34 大小:2.52MB
返回 下载 相关 举报
Trust management system design for the Internet of Things A…_第1页
第1页 / 共34页
Trust management system design for the Internet of Things A…_第2页
第2页 / 共34页
Trust management system design for the Internet of Things A…_第3页
第3页 / 共34页
点击查看更多>>
资源描述
,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,TRUST MANAGEMENT SYSTEM DESIGN FOR THE INTERNET OF THINGS:A CONTEXT-AWARE AND MULTI-SERVICE APPROACH,Yosra Ben Saied,Alexis Olivereau,Djamal,Zeghlache,Maryline,Laurent,Presented by Ali Asgar Sohanghpurwala,Machine to Machine(M2M)and Internet of Things(IoT)architectures becoming,prevalent,Wireless Sensor Networks(WSNs)introduced,unattended,wireless topologies with resource constrained nodes,IoT expands on WSN requirements,Wider architectures,More heterogeneous,Inconstant resource capabilities,Increased autonomy,INTRODUCTION,Nodes expected to securely communicate with external Internet nodes,but likely dont have resources to do it alone,Constraints such as computing power,battery life,limited bandwidth,Need to collaborate to meet this goal,Cooperative techniques for routing and security have been proposed in literature,Collaboration needs to be controlled,to protect against attacks,Cryptographic methods dont account for insider attacks,Cryptographically trusted nodes can lie,alter data,or selfishly refuse to collaborate,Existing WSN and MANET insufficient for IoT,WHY DOES IOT NEED A TMS?,IoT nodes providing different services assessed by same TMS,Non-malicious nodes may temporarily have low capabilities,IoT nodes are highly heterogeneous,Node owned by multiple self-interest communities,Complex malicious patterns arise with coexistence of heterogeneous and self-concerned nodes,HOW IS TMS DIFFERENT FOR IOT?,ASSESSMENT OF PRIOR TMS WRT IOT,Use past behavior to determine task-specific trust levels for each node,Eventually only the best partners for a specific service are proposed to,requesting,node,Fine-tune trust levels,even in presence of malicious and erroneous,nodes,Geographically,centralized TM servers,Multi-phase approach,OVERVIEW,Initially all nodes are assumed trustworthy,Bootstrapping period is required to gather information before results are trustworthy,Trust manager speeds up process by targeting nodes and inducing artificial interactions,Requesting node classifies behavior of assisting node as positive or negative,Evaluations are stored in trust manager,Context under which evaluations are received is important,Aging,resource capacity,etc.of evaluated node,Execution time,INITIALIZATION AND INFORMATION GATHERING,Each report R,ij,refers to jth report regarding QoS for assisting node P,i,Each report contains the following information:,REPORT INFORMATION,When a node asks for assistance,the trust manager returns a list of trustworthy assisting nodes,Five steps:,Restrict set of proxies p,i,Restrict the set of reports R,ij,for each proxy P,i,Compute weights(w,Rij,)for each report R,ij,Compute trust value T,i,for each proxy p,i,Provide requestor with list of best suited proxies,ENTITY SELECTION,Select candidates based on service requirements,Examples:,Lightweight communication may require nodes in same multi-cast group,Signature delegation schemes may require nodes dispersed in specific locations,May require neighbors in radio range,ENTITY 1:RESTRICT SET OF PROXIES P,I,Find most meaningful reports for prospective nodes,Ideal reports:,Assisting node provided the same service,Assisting node status was the same as it is now,It is likely that there wont be enough ideal reports to judge the node p,i,in specific context,We can calculate context similarity by quantifying node capabilities and service similarity,ENTITY 2:RESTRICT SET OF REPORTS,Quantifying node capability is easy:,Percentage of Battery,CPU power,Memory available,Service similarity isnt as straightforward,Estimate service similarity based on resource requirements,Of measurable resources,energy consumption is recommended by authors,ENTITY 2:QUANTIFY PARAMETERS,Report R,ij,sent by all nodes j,regarding interactions with node P,i,contains:,S,j,service provided by,C,j,capability,N,j,Note,Try to match with target values:,S,target,Current service in request,C,target,Current P,i,capability,ENTITY 2:CONTEXT SIMILARIT
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 商业管理 > 商业计划


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!