scholarly journals TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)

2019 ◽  
Vol 01 (01) ◽  
pp. 42-61
Author(s):  
Jennifer S. Raj ◽  
Alphina Stephy S

The development in the area of networking is Internet of Things (IoT). This will interrelated the object and things together. The realization of IoT subsystems will be subjected to numerous constraints that include cost, power, energy, and lifetime. However, most challenging requirement will be trust. It is widely recognized that the attacks from malicious parties can activate from Internet to the physical word. Hence, trust of IoT is of essential importance. Therefore, trust management is considered as a efficient solution to IoT related issues. Trust management has useful technology for providing security service and it has been used in many applications such as P2P, Grid, adhoc network and so on. Thus the trust based routing algorithm in Internet of Things is proposed for providing a potential security system. With this, the major focus on the problem of trust on the malicious nodes in any environment.

2021 ◽  
Vol 21 (4) ◽  
pp. 15-27
Author(s):  
Ananda Kumar Subramanian ◽  
Aritra Samanta ◽  
Sasmithaa Manickam ◽  
Abhinav Kumar ◽  
Stavros Shiaeles ◽  
...  

Abstract This paper aims at creating a new Trust Management System (TMS) for a system of nodes. Various systems already exist which only use a simple function to calculate the trust value of a node. In the age of artificial intelligence the need for learning ability in an Internet of Things (IoT) system arises. Malicious nodes are a recurring issue and there still has not been a fully effective way to detect them beforehand. In IoT systems, a malicious node is detected after a transaction has occurred with the node. To this end, this paper explores how Artificial Intelligence (AI), and specifically Linear Regression (LR), could be utilised to predict a malicious node in order to minimise the damage in the IoT ecosystem. Moreover, the paper compares Linear regression over other AI-based TMS, showing the efficiency and efficacy of the method to predict and identify a malicious node.


2021 ◽  
Vol 11 (5) ◽  
pp. 1998
Author(s):  
Sandeep Kumar Arora ◽  
Gulshan Kumar ◽  
Tai-hoon Kim

Blockchain is the consensus-based technology used to resolve conflicts in Byzantine environments. Vehicles validate the messages received from neighboring vehicles using the gradient boosting technique (GBT). Based on the validation results, the message source vehicle generates the ratings that are to be uploaded to roadside units (RSUs), and through that, the trust offset value can be calculated. All RSUs maintain the trust blockchain, and each RSU tries to add their blocks to the trust blockchain. We proposed a blockchain-based trust management model for the vehicular adhoc network (VANET) based on Tendermint. It eliminates the problem of malicious nodes entering the network, and will also overcome the problem of power consumption. Simulation results also show that the proposed system is 7.8% and 15.6% effective and efficient in terms of packet delivery ratio (PDR) and end-to-end delay (EED), respectively, to collect the trusted data between the vehicles.


Author(s):  
Nabil Djedjig ◽  
Djamel Tandjaoui ◽  
Imed Romdhani ◽  
Faiza Medjek

The internet of things (IoT) is a new paradigm where users, objects, and any things are interconnected using wired and wireless technology such as RFID, ZigBee, WSN, NFC, Bluetooth, GPRS, and LTE. In this last decade, the IoT concept has attracted significant attention from both industrial and research communities. Many application domains may have significant benefits with IoT systems. These domains range from home automation, environmental monitoring, healthcare, to logistic and smart grid. Nevertheless, the IoT is facing many security issues such as authentication, key management, identification, availability, privacy, and trust management. Indeed, establishing trust relationships between nodes in IoT represents a primary security milestone to have reliable systems that exclude malicious nodes. However, trust management in an IoT constrained and ubiquitous environment represents a real challenge. This chapter presents an overview of trust management in IoT. This overview explains and demonstrates the usefulness of trust management and how it should be exploited in IoT.


2017 ◽  
Vol 33 (4) ◽  
pp. 39-46
Author(s):  
T. D. Malyutina

The article substantiates the importance of the company's economic security service in the modern conditions of business operations. The level of security of the enterprise is ensured by high economic potential, financial independence, sustainable development, personnel responsibility. The loss of at least one of the listed elements of a universal system of economic security is characterized by unforeseen consequences for the enterprise. The untimely modernization of the economic security system, its obsolete form, will not ensure the proper level of the company's confident working.


Author(s):  
Wazir Zada Khan ◽  
Qurat-ul-Ain Arshad ◽  
Saqib Hakak ◽  
Muhammad Khurram Khan ◽  
Saeed-Ur-Rehman

Author(s):  
Dr. Wang Haoxiang

The Internet of things is the basic paradigm with the cluster of techniques that ensure innovations in the service rendered in various applications. It aims to develop a seamless connection between the tangible objects around and the information network in turn to provide a well-structured servicing to its users. Though the IOT service seems to be promising, the risks still prevail in the form of privacy and the security in user acceptance in utilizing the internet of things services, and its application. This makes the trust management very important for the internet of things. So the paper puts forth the distributed block chain involved trust system to manage the conveyance infrastructures of the internet of things paradigm. The evaluation of the proposed model evinces the enhanced security provided for the nodes of the IOT as well as its information exchange.


Author(s):  
Bobomurod Juraevich Abdullaev ◽  

This article provides insights into the existing and politically important security system in the Central Asian khanates. The khanates of Bukhara, Khiva and Kokand had their own military power and were divided into different parts. The security departments of the khanates also played an important role in the development of the state and the security of the people. During the years of independence, as in any other field, significant changes have taken place in the field of security services. In particular, the President of the Republic of Uzbekistan Shavkat Mirziyoyev has improved the security service in the National Guard.


Sign in / Sign up

Export Citation Format

Share Document