مشخصات مقاله | |
ترجمه عنوان مقاله | فناوری تأیید امنیت بر اساس شبکه بیزی دینامیکی در اینترنت اشیا |
عنوان انگلیسی مقاله | Security authentication technology based on dynamic Bayesian network in Internet of Things |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 8 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
منتشر شده در | نشریه اسپرینگر |
نوع نگارش مقاله | مقاله پژوهشی (Research article) |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
رشته های مرتبط | مهندسی کامپیوتر، فناوری اطلاعات |
گرایش های مرتبط | هوش مصنوعی، شبکه های کامپیوتری، اینترنت و شبکه های گسترده |
مجله | مجله هوش مصنوعی و محاسبات انسانی – Journal of Ambient Intelligence and Humanized Computing |
دانشگاه | Hunan University – Changsha – Hunan – China |
کلمات کلیدی | اینترنت اشیا، شبکه بیزی دینامیکی، تأیید امنیت، انتقال اعتمادی، کلید عمومی ترکیبی، تبادل اطلاعات امنیتی |
کلمات کلیدی انگلیسی | Internet of Things, Dynamic Bayesian network, Security authentication, Trusted transmission, Combined public key, Security information exchange |
شناسه دیجیتال – doi |
https://doi.org/10.1007/s12652-018-0949-2 |
کد محصول | E8927 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
1 Introduction
With the rapid development of the Internet of Things (IoT) technology in the information society, network security has become the focus of attention in the field of communication networks (Wang et al. 2016). On the one hand, attacks against network nodes are endless and destructive in recent years. Network nodes are exposed to risks such as being attacked and deceived. On the other hand, most researches on information transmission services in the past were based on the ideal conditions of safe and reliable network environment (Xiao and Liu 2017). It is difficult to meet the urgent requirements of current users for trusted transmission services. Therefore, secure routing protocols have become one of the research hot-spots in the field of the IoT industry (Sun et al. 2017). The IoT is a novel paradigm that aims to bridge the gap between the physical world and its representation in the digital world (Ndibanje et al. 2014). IoT is expected to become an integrated part of the Internet in the future. IoT is defined as a dynamic global network infrastructure with self-configuring capabilities based on standard and interoperable communication protocols. Bandwidth and storage are no longer considered restricting factors in IoT applications because of the rapid development of novel information and communication technologies (Kothmayr et al. 2013). The main issue is how to achieve the trusted transmission services for IoT applications. Research on secure routing protocols includes two aspects: node security and information interaction security between nodes. The main solutions for current node security include identity authentication and trusted metrics technology based on trusted roots (Park and Kang 2015). The former uses the Trusted Platform Module (TPM) (Gang et al. 2011; Zhao 2013) as a built-in trusted root, and it is used as a starting point, combined with security start-up, data storage protection, integrity metrics, and trusted transitive, which performs step-by-step metrics, verification, and delivery to complete the node’s trusted assessment. The disadvantages are: the granularity is relatively coarse and it is difficult to effectively deal with internal attacks. For example, the Basic Input Output System (BIOS) is easily tampered, resulting in the credibility of the trusted root can not be guaranteed; On the basis of social relations, the latter makes a trusted measurement of the identity and interactive behavior of the node by evidence theory, probability theory etc, but it still needs to be optimized in the aspects of computational complexity, precision and dynamic adaptability. |