A Lightweight Trust Mechanism with Attack Detection for IoT
<p>BTM’s architecture with two optional trust evaluation styles: purely distributed style and core style, illustrated from the view of evaluator <span class="html-italic">i</span>.</p> "> Figure 2
<p>Trust of the victim per round in different feedback integration modes when consecutive criticisms are met.</p> "> Figure 3
<p>Average trusts of normal devices per 0.5 s, <math display="inline"><semantics><mrow><msub><mi>n</mi><mn>0</mn></msub><mo>=</mo><mn>50</mn></mrow></semantics></math>; all attackers are foxes.</p> "> Figure 4
<p>Average trusts of normal devices per 0.5 s, <math display="inline"><semantics><mrow><msub><mi>n</mi><mn>0</mn></msub><mo>=</mo><mn>50</mn></mrow></semantics></math>; all attackers are misers.</p> "> Figure 5
<p>Average trusts of normal devices per 0.5 s, <math display="inline"><semantics><mrow><msub><mi>n</mi><mn>0</mn></msub><mo>=</mo><mn>50</mn></mrow></semantics></math>; all attackers are hybrids.</p> "> Figure 6
<p>Average global trust estimations of devices 1 and 2 in RTCM, TBSM, and BTM, in the view of device 0, recorded per 10 milliseconds. The forgetting factor is 0.5, and the parameter of indirect trust is 0.5 in RTCM. They are 0.3 and 0.1 in TBSM. <math display="inline"><semantics><mrow><mi>ϕ</mi><mo>=</mo><mn>5</mn></mrow></semantics></math> and <math display="inline"><semantics><mrow><mi>ζ</mi><mo>=</mo><mn>0</mn></mrow></semantics></math> in BTM.</p> "> Figure 7
<p>Average global trust estimation of colluding foxes 3 and 4, in the view of device 0, recorded per 10 milliseconds. The parameter setting is identical to <a href="#entropy-25-01198-f006" class="html-fig">Figure 6</a>.</p> "> Figure 8
<p>Average global trust estimations of devices 1 and 2, in the view of device 0, recorded per 10 milliseconds. The parameter setting is identical to <a href="#entropy-25-01198-f006" class="html-fig">Figure 6</a>.</p> "> Figure 9
<p>Average global trust estimation of misers 3 and 4, in the view of device 0, recorded per 10 milliseconds. The parameter setting is identical to <a href="#entropy-25-01198-f006" class="html-fig">Figure 6</a>.</p> ">
Abstract
:1. Introduction
- Popular IoT paradigms are heterogeneous, where devices have varying capabilities and communicate with various protocols. As a result, it is challenging to create a trust mechanism that can apply to different applications via easy adaptation.
- IoT devices usually possess limited computing power and memory. A practical trust mechanism must balance the accuracy of trust estimations and algorithm complexity.
- IoT devices are numerous and ubiquitous. A trust mechanism should be scalable to remain efficient when the number of devices grows in a network.
- Mobile IoT devices such as smartphones and intelligent vehicles are dynamic, frequently joining and leaving networks. It complicates maintaining their profiles of trustworthiness for trust mechanisms.
- This paper proposes a new trust estimation approach by adapting data structures and algorithms used in the beta reputation system (BRS). For e-commerce trust issues, BRS’s feedback integration feature combines Bayesian statistics and Jøsang’s belief model derived from Dempster–Shafer theory to let data fusion fully utilize feedback from different sources [34]. It enables the BRS to produce more accurate trust estimations defined from a probabilistic perspective to quantify an IoT device’s trustworthiness. In contrast to previous research utilizing the two techniques, the data fusion of BTM enables the following novel and practical features: trust estimations that are universal, accurate, and resilient to trust attacks; efficient detection against various trust attacks; an option to combine fog computing as an optimization technique to address the challenges of scalability and dynamic; and a probability theory-explicable parameter setting.
- Based on the above trust evaluation, this paper proposes an automatic forgetting algorithm that gives more weight to newer interaction results and feedback in the computing process of trust estimations. It ensures that an IoT device’s trust estimation reflects the device’s current status in time, retards OOAs, and expedites the elimination of adverse influences from trust attacks. In contrast to conventional forgetting algorithms, this algorithm can automatically adjust this weight to achieve good performance. These two contributions form the trust evaluation module of BTM, which is less restricted by the heterogeneity of IoT and balances the accuracy of trust estimations and algorithm complexity.
- This paper proposes a tango algorithm capable of curbing BMAs by improving the processing of feedback in BTM as a precaution. Based on the trust evaluation module and hypothesis testing, this paper designs a trust attack detection mechanism that can identify BMAs, BSAs, DAs, and VIE to deal with high-intensity trust attacks. These two form the trust attack handling module of BTM.
- This paper conducts a simulation to corroborate the performance of BTM, where it is simultaneously challenged by inherent uncertainty and considerable colluding attackers with composite attack capabilities composed of BMAs, BSAs, and DAs. The presented results indicate that BTM can ensure that evaluators generate relatively accurate trust estimations, gradually eliminate these attackers, and quickly restore the trust estimations of normal IoT devices. This performance is better than existing trust mechanisms.
2. Materials and Methods
2.1. System Model
- OOAs, attackers periodically suspend attacks to avoid being noticed;
- BMAs, attackers always send negative evaluations after interactions;
- BSAs, attackers always send positive evaluations after interactions;
- DAs, attackers treat other devices with a discriminatory attitude, providing victims with nothing or terrible service;
- VIE, attackers always send evaluations contrary to reality after interactions.
2.2. Trust Evaluation Based on Direct Observation
2.3. Feedback Integration
2.3.1. Derivation of Feedback Integration
Algorithm 1: Feedback integration. |
Input: , ,
|
2.3.2. Incremental Feedback Integration
Algorithm 2: Incremental feedback integration. |
2.4. Forgetting Algorithm
Algorithm 3: Forgetting algorithm. |
2.5. Module against Trust Attacks
2.5.1. Influences of Trust Attacks and Tango Algorithm
Algorithm 4: Tango algorithm. |
2.5.2. Trust Attack Detection
Algorithm 5: Detection against BMAs, BSAs, and VIE. |
Algorithm 6: Detection against DAs. |
3. Results
3.1. Design, Trust Attack Tactics, and Metrics
3.2. Presentation
3.3. Comparison with Existing Research
4. Discussion
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Conflicts of Interest
References
- Balaji, S.; Nathani, K.; Santhakumar, R. IoT technology, applications and challenges: A contemporary survey. Wirel. Pers. Commun. 2019, 108, 363–388. [Google Scholar] [CrossRef]
- Gu, L.; Wang, J.; Sun, B. Trust management mechanism for Internet of Things. China Commun. 2014, 11, 148–156. [Google Scholar] [CrossRef]
- Gambetta, D. Can we trust trust. Trust: Making and Breaking Cooperative Relations; Department of Sociology, University of Oxford: Oxford, UK, 2000; Volume 13, pp. 213–237. [Google Scholar]
- Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]
- Altaf, A.; Abbas, H.; Iqbal, F.; Derhab, A. Trust models of Internet of Smart Things: A survey, open issues, and future directions. J. Netw. Comput. Appl. 2019, 137, 93–111. [Google Scholar] [CrossRef]
- Atzori, L.; Iera, A.; Morabito, G.; Nitti, M. The social Internet of Things (SIoT)—When social networks meet the Internet of Things: Concept, architecture and network characterization. Comput. Netw. 2012, 56, 3594–3608. [Google Scholar] [CrossRef]
- Shafer, G. A Mathematical Theory of Evidence; Princeton University Press: Princeton, NJ, USA, 1976; Volume 42. [Google Scholar]
- Ganeriwal, S.; Balzano, L.K.; Srivastava, M.B. Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. 2008, 4, 1–37. [Google Scholar] [CrossRef]
- Raya, M.; Papadimitratos, P.; Gligor, V.D.; Hubaux, J.P. On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the IEEE INFOCOM 2008-the 27th Conference on Computer Communications, Phoenix, Arizona, 13–18 April 2008; IEEE: Piscataway Township, NJ, USA, 2008; pp. 1238–1246. [Google Scholar]
- Wei, Z.; Tang, H.; Yu, F.R.; Wang, M.; Mason, P. Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 2014, 63, 4647–4658. [Google Scholar] [CrossRef]
- Li, W.; Song, H. ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 2015, 17, 960–969. [Google Scholar] [CrossRef]
- Meng, W.; Choo, K.K.R.; Furnell, S.; Vasilakos, A.V.; Probst, C.W. Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Trans. Netw. Serv. Manag. 2018, 15, 761–773. [Google Scholar] [CrossRef] [Green Version]
- Anwar, R.W.; Zainal, A.; Outay, F.; Yasar, A.; Iqbal, S. BTEM: Belief based trust evaluation mechanism for wireless sensor networks. Future Gener. Comput. Syst. 2019, 96, 605–616. [Google Scholar] [CrossRef]
- Soleymani, S.A.; Abdullah, A.H.; Zareei, M.; Anisi, M.H.; Vargas-Rosales, C.; Khan, M.K.; Goudarzi, S. A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access 2017, 5, 15619–15629. [Google Scholar] [CrossRef]
- Jiang, J.; Han, G.; Zhu, C.; Chan, S.; Rodrigues, J.J. A trust cloud model for underwater wireless sensor networks. IEEE Commun. Mag. 2017, 55, 110–116. [Google Scholar] [CrossRef]
- Chen, R.; Bao, F.; Guo, J. Trust-based service management for social Internet of Things systems. IEEE Trans. Dependable Secur. Comput. 2015, 13, 684–696. [Google Scholar] [CrossRef] [Green Version]
- Awan, K.A.; Din, I.U.; Almogren, A.; Guizani, M.; Khan, S. StabTrust: A stable and centralized trust-based clustering mechanism for IoT enabled vehicular ad-hoc networks. IEEE Access 2020, 8, 21159–21177. [Google Scholar] [CrossRef]
- Dedeoglu, V.; Jurdak, R.; Putra, G.D.; Dorri, A.; Kanhere, S.S. A trust architecture for blockchain in IoT. In Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Houston, TX, USA, 12–14 November 2019; pp. 190–199. [Google Scholar]
- Shala, B.; Trick, U.; Lehmann, A.; Ghita, B.; Shiaeles, S. Blockchain and trust for secure, end-user-based and decentralized IoT service provision. IEEE Access 2020, 8, 119961–119979. [Google Scholar] [CrossRef]
- Malik, S.; Dedeoglu, V.; Kanhere, S.S.; Jurdak, R. Trustchain: Trust management in blockchain and IoT supported supply chains. In Proceedings of the 2019 IEEE International Conference on Blockchain, Atlanta, GA, USA, 14–17 July 2019; IEEE: Piscataway Township, NJ, USA, 2019; pp. 184–193. [Google Scholar]
- Ullah, F.; Pun, C.M.; Kaiwartya, O.; Sadiq, A.S.; Lloret, J.; Ali, M. HIDE-Healthcare IoT data trust managEment: Attribute centric intelligent privacy approach. Future Gener. Comput. Syst. 2023, 148, 326–341. [Google Scholar] [CrossRef]
- Haseeb, K.; Rehman, A.; Saba, T.; Bahaj, S.A.; Wang, H.; Song, H. Efficient and trusted autonomous vehicle routing protocol for 6G networks with computational intelligence. ISA Trans. 2023, 132, 61–68. [Google Scholar] [CrossRef] [PubMed]
- Ogundoyin, S.O.; Kamil, I.A. A trust management system for fog computing services. Internet Things 2021, 14, 100382. [Google Scholar] [CrossRef]
- Junejo, A.K.; Komninos, N.; Sathiyanarayanan, M.; Chowdhry, B.S. Trustee: A trust management system for fog-enabled cyber physical systems. IEEE Trans. Emerg. Top. Comput. 2019, 9, 2030–2041. [Google Scholar] [CrossRef] [Green Version]
- Alemneh, E.; Senouci, S.M.; Brunet, P.; Tegegne, T. A two-way trust management system for fog computing. Future Gener. Comput. Syst. 2020, 106, 206–220. [Google Scholar] [CrossRef]
- Chiang, M.; Zhang, T. Fog and IoT: An overview of research opportunities. IEEE Internet Things J. 2016, 3, 854–864. [Google Scholar] [CrossRef]
- Wang, T.; Zhang, G.; Bhuiyan, M.Z.A.; Liu, A.; Jia, W.; Xie, M. A novel trust mechanism based on fog computing in sensor–cloud system. Future Gener. Comput. Syst. 2020, 109, 573–582. [Google Scholar] [CrossRef]
- Liang, J.; Zhang, M.; Leung, V.C. A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud. IEEE Internet Things J. 2020, 7, 5481–5490. [Google Scholar] [CrossRef]
- Zhang, G.; Wang, T.; Wang, G.; Liu, A.; Jia, W. Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Concurr. Comput. Pract. Exp. 2021, 33. [Google Scholar] [CrossRef]
- Hussain, Y.; Zhiqiu, H.; Akbar, M.A.; Alsanad, A.; Alsanad, A.A.A.; Nawaz, A.; Khan, I.A.; Khan, Z.U. Context-aware trust and reputation model for fog-based IoT. IEEE Access 2020, 8, 31622–31632. [Google Scholar] [CrossRef]
- Rathee, G.; Sandhu, R.; Saini, H.; Sivaram, M.; Dhasarathan, V. A trust computed framework for IoT devices and fog computing environment. Wirel. Netw. 2020, 26, 2339–2351. [Google Scholar] [CrossRef]
- Fang, W.; Zhang, W.; Chen, W.; Liu, Y.; Tang, C. TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wirel. Netw. 2020, 26, 3169–3182. [Google Scholar] [CrossRef]
- Yannuzzi, M.; Milito, R.; Serral-Gracià, R.; Montero, D.; Nemirovsky, M. Key ingredients in an IoT recipe: Fog computing, cloud computing, and more fog computing. In Proceedings of the 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, Athens, Greece, 1–3 December 2014; IEEE: Piscataway Township, NJ, USA, 2014; pp. 325–329. [Google Scholar]
- Josang, A.; Ismail, R. The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia, 17–19 June 2002; Volume 5, pp. 2502–2511. [Google Scholar]
- Wang, H.; Bah, M.J.; Hammad, M. Progress in outlier detection techniques: A survey. IEEE Access 2019, 7, 107964–108000. [Google Scholar] [CrossRef]
- Breunig, M.M.; Kriegel, H.P.; Ng, R.T.; Sander, J. LOF: Identifying density-based local outliers. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, USA, 16–18 May 2000; pp. 93–104. [Google Scholar]
Ref. | OOA | BMA | BSA | DA | SP | VIE | SA | NCA |
---|---|---|---|---|---|---|---|---|
[8] | ✓ | ✓ | ✓ | - | - | - | - | - |
[10] | ✓ | - | - | - | - | - | - | - |
[11] | ✓ | ✓ | - | - | - | - | - | - |
[13] | ✓ | ✓ | - | - | - | - | - | - |
[16] | ✓ | ✓ | ✓ | ✓ | ✓ | - | - | - |
[17] | - | - | - | - | - | - | ✓ | - |
[23] | ✓ | ✓ | ✓ | - | ✓ | - | - | - |
[24] | ✓ | ✓ | ✓ | - | ✓ | - | - | - |
[25] | ✓ | ✓ | ✓ | - | ✓ | - | - | - |
Notation | Explanation | Section |
---|---|---|
Device j’s trust value in evaluator i, derived from . | Section 2.2 | |
Device j’s reputation vector, saving data of Bayesian inference. . | ||
and | Two hyperparameters of a beta prior distribution. | |
and | Two parameters saving all evidence in Bayesian inference. | |
Evaluator i’s opinion about device j, defined by Jøsang’s belief model. . | Section 2.3 | |
, , and | Three parameters expressing the extent of belief, disbelief, and uncertainty about device j. | |
Evaluator i’s opinion about device k after it receives and discounts as feedback. | ||
The opinion set. | ||
⊗ | A binary operation of discounting opinions, defined upon . | |
A subset of the reputation vector set, where and are constants. | ||
⊕ | A binary operation of merging evidence, defined upon . | |
A mapping from to . | ||
The inverse mapping of g. | ||
An increment of , new evidence gathered from recent interactions with devices j. | ||
All external evidence of device k provided by device j, . | ||
The forgetting factor in the conventional form of forgetting algorithms in current research. | Section 2.4 | |
The evidence queue of device j. | ||
The capacity of . | ||
and | Evaluator i saves external evidence in these two matrices. . | |
A test statistic of hypothesis testing related to trust attack detection. | Section 2.5 | |
Evaluator i does not check whether device j is a trust attacker if . | ||
A significance level used to identify restricted BMAs, BSAs, or VIE, as well as DAs. | ||
A very tiny significance level used to identify reckless BMAs, BSAs, or VIE. | ||
Evaluator i judges device j as suspicious if happens more than in a check. |
Parameter | Value |
---|---|
interaction success rate | 0.8 |
, initial device number | 10, 20, and 50 |
device sleep after sending a request | 1 millisecond |
max request sending count for devices | 20 |
n, active device number | variable, from to 0 |
periodical fog node sleep | automatically adjusted variable |
request sending count as latency for foxes | variable for each fox, |
latency for misers and hybrids | |
5 | |
0.6 | |
0.03125 | |
variable, |
Device Number | Percentage | Precision | Recall | Specificity | Accuracy | F1 Score | Average Deviation | Average Attacker Trust | Check Count |
---|---|---|---|---|---|---|---|---|---|
10 | 0% | - | - | 0.99950 | 0.99950 | - | 0.05149 | - | 9.02900 |
20% | 0.98138 | 0.99225 | 0.99300 | 0.99285 | 0.98679 | 0.05665 | 0.54100 | 25.66100 | |
30% | 0.96588 | 0.99017 | 0.97893 | 0.98230 | 0.97787 | 0.06371 | 0.52258 | 42.11600 | |
40% | 0.91389 | 0.98387 | 0.91396 | 0.94192 | 0.94759 | 0.08621 | 0.50595 | 63.81491 | |
50% | 0.83569 | 0.96110 | 0.75430 | 0.85770 | 0.89402 | 0.13325 | 0.49487 | 85.20300 | |
20 | 0% | - | - | 1.00000 | 1.00000 | - | 0.05087 | - | 5.54900 |
20% | 0.99980 | 1.00000 | 0.99994 | 0.99995 | 0.99990 | 0.04886 | 0.56118 | 20.31600 | |
30% | 0.99936 | 1.00000 | 0.99968 | 0.99978 | 0.99968 | 0.05016 | 0.54927 | 31.37000 | |
40% | 0.99383 | 0.99994 | 0.99533 | 0.99718 | 0.99688 | 0.05444 | 0.53335 | 49.59000 | |
50% | 0.97545 | 0.99985 | 0.97195 | 0.98590 | 0.98750 | 0.06530 | 0.51789 | 76.28400 | |
50 | 0% | - | - | 1.00000 | 1.00000 | - | 0.05908 | - | 3.57000 |
20% | 1.00000 | 1.00000 | 1.00000 | 1.00000 | 1.00000 | 0.05697 | 0.55582 | 33.25700 | |
30% | 0.99991 | 1.00000 | 0.99996 | 0.99997 | 0.99995 | 0.05674 | 0.54782 | 48.17000 | |
40% | 0.99868 | 1.00000 | 0.99907 | 0.99944 | 0.99934 | 0.05037 | 0.53483 | 69.76400 | |
50% | 0.97508 | 1.00000 | 0.97180 | 0.98590 | 0.98738 | 0.05788 | 0.52091 | 109.97900 |
Device Number | Percentage | Precision | Recall | Specificity | Accuracy | F1 Score | Average Deviation | Average Attacker Trust | Check Count |
---|---|---|---|---|---|---|---|---|---|
10 | 0% | - | - | 0.99950 | 0.99950 | - | 0.05149 | - | 9.02900 |
20% | 0.98975 | 1.00000 | 0.99613 | 0.99690 | 0.99485 | 0.05452 | 0.44899 | 16.34600 | |
30% | 0.95886 | 1.00000 | 0.97479 | 0.98235 | 0.97900 | 0.06400 | 0.45518 | 27.00000 | |
40% | 0.76964 | 0.97150 | 0.74075 | 0.83305 | 0.85887 | 0.13228 | 0.47813 | 51.55800 | |
50% | 0.16931 | 0.24250 | 0.04710 | 0.14480 | 0.19940 | 0.31830 | 0.81486 | 48.39600 | |
20 | 0% | - | - | 1.00000 | 1.00000 | - | 0.05087 | - | 5.54900 |
20% | 0.99960 | 1.00000 | 0.99988 | 0.99990 | 0.99980 | 0.04852 | 0.46585 | 17.23200 | |
30% | 0.98064 | 1.00000 | 0.98993 | 0.99295 | 0.99023 | 0.05188 | 0.48106 | 35.51700 | |
40% | 0.71191 | 0.99969 | 0.68292 | 0.80963 | 0.83161 | 0.13518 | 0.48967 | 87.55778 | |
50% | 0.18022 | 0.25575 | 0.00060 | 0.12818 | 0.21144 | 0.31723 | 0.84635 | 70.64000 | |
50 | 0% | - | - | 1.00000 | 1.00000 | - | 0.05908 | - | 3.57000 |
20% | 0.99959 | 1.00000 | 0.99989 | 0.99991 | 0.99979 | 0.05508 | 0.47747 | 24.88400 | |
30% | 0.70225 | 1.00000 | 0.80037 | 0.86026 | 0.82508 | 0.08603 | 0.48928 | 114.31800 | |
40% | 0.40842 | 1.00000 | 0.03390 | 0.42034 | 0.57997 | 0.28827 | 0.48234 | 149.01100 | |
50% | 0.47261 | 0.90072 | 0.00000 | 0.45036 | 0.61994 | 0.32128 | 0.57290 | 141.57200 |
Device Number | Percentage | Precision | Recall | Specificity | Accuracy | F1 Score | Average Deviation | Average Attacker Trust | Check Count |
---|---|---|---|---|---|---|---|---|---|
10 | 0% | - | - | 1.00000 | 1.00000 | - | 0.03112 | - | 0.76900 |
20% | 1.00000 | 1.00000 | 1.00000 | 1.00000 | 1.00000 | 0.03509 | 0.46025 | 4.37300 | |
30% | 1.00000 | 1.00000 | 1.00000 | 1.00000 | 1.00000 | 0.03791 | 0.46532 | 7.63200 | |
40% | 0.97456 | 0.99500 | 0.97733 | 0.98440 | 0.98467 | 0.04884 | 0.48325 | 26.13600 | |
50% | 0.03004 | 0.03400 | 0.01630 | 0.02515 | 0.03190 | 0.31156 | 0.98334 | 29.45200 | |
20 | 0% | - | - | 1.00000 | 1.00000 | - | 0.03032 | - | 0.95800 |
20% | 1.00000 | 1.00000 | 1.00000 | 1.00000 | 1.00000 | 0.02860 | 0.48138 | 7.95900 | |
30% | 0.99979 | 1.00000 | 0.99989 | 0.99993 | 0.99989 | 0.02874 | 0.49852 | 15.35900 | |
40% | 0.88543 | 1.00000 | 0.89929 | 0.93958 | 0.93923 | 0.05402 | 0.50189 | 61.66700 | |
50% | 0.08593 | 0.10685 | 0.00050 | 0.05367 | 0.09525 | 0.30542 | 0.95278 | 48.56400 | |
50 | 0% | - | - | 1.00000 | 1.00000 | - | 0.04580 | - | 0.88800 |
20% | 1.00000 | 1.00000 | 1.00000 | 1.00000 | 1.00000 | 0.03991 | 0.48726 | 16.99500 | |
30% | 0.85949 | 1.00000 | 0.92164 | 0.94515 | 0.92444 | 0.05045 | 0.50205 | 68.19900 | |
40% | 0.44513 | 1.00000 | 0.16505 | 0.49903 | 0.61604 | 0.25174 | 0.48640 | 129.41300 | |
50% | 0.43451 | 0.77068 | 0.00000 | 0.38534 | 0.55571 | 0.31680 | 0.65250 | 118.11700 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhou, X.; Tang, J.; Dang, S.; Chen, G. A Lightweight Trust Mechanism with Attack Detection for IoT. Entropy 2023, 25, 1198. https://doi.org/10.3390/e25081198
Zhou X, Tang J, Dang S, Chen G. A Lightweight Trust Mechanism with Attack Detection for IoT. Entropy. 2023; 25(8):1198. https://doi.org/10.3390/e25081198
Chicago/Turabian StyleZhou, Xujie, Jinchuan Tang, Shuping Dang, and Gaojie Chen. 2023. "A Lightweight Trust Mechanism with Attack Detection for IoT" Entropy 25, no. 8: 1198. https://doi.org/10.3390/e25081198