云信任驱动的物联网信息共享安全机制仿真  被引量:1

Simulation of Cloud-Driven IoT Information Sharing Security Mechanism

在线阅读下载全文

作  者:史西兵 SHI Xi-bing(School of Information,Xi'an University of Finance and Economics,Xi'an Shanxi 710100,China)

机构地区:[1]西安财经大学信息学院,陕西西安710100

出  处:《计算机仿真》2020年第9期140-144,共5页Computer Simulation

基  金:中国(西安)丝绸之路研究院科学研究项目(2016SDZ07);西安财经大学科学研究计划项目(14XCK06)。

摘  要:对于传统的物联网信息共享中存在数据易被篡改、信任驱动机制与物联网底层系统分离的问题,导致信息共享时间较短。据此提出了云信任驱动的物联网信息共享安全机制仿真。在物联网架构下共享结构,通过设置阈值和迭代调整参数,构建互补判断矩阵,获取最小非负偏差量和最优权重向量,依据该值对物联网信息安全共享模式进行排序,获取最适共享模式。为避免人为篡改,设计信息资源采集流程,保证源数据的可靠性。使用RFID设备对物联网中海量异构数据进行预处理,充分考虑资源受限的异构网络,在物联网环境下,采用基于信任的自适应检测算法,确定信任阈值。在开放云环境支持下,进行系统资源搜索、通信与评价,通过RFID设备和Savant中间件,设计共享安全机制。采用Contiki操作系统,在网络拓扑结构下,设置三种攻击种类,由仿真结果可知,上述机制共享时间最长可达到172s,可应对现实物联网中大部分场景。In traditional IoT information sharing,the information sharing time is short.Therefore,a cloud trustdriven simulation for IoT information sharing security mechanism of was put forward.The structure was shared based on the IoT architecture.By setting thresholds and iteratively adjusting parameters,we built a complementary judgment matrix and obtain the minimum non-negative deviation and the optimal weight vector.According to the value,we sor⁃ted the IoT information security sharing modes and thus to find the optimal sharing mode.In order to avoid the data being tampered artificially,we designed the information resource collection process to ensure the reliability of source data.The RFID device was used to pre-process massive heterogeneous data in the Internet of Things.After fully con⁃sidering the resource-constrained heterogeneous network,we used the adaptive detection algorithm based on trust to determine the trust threshold.With the support of open cloud environment,we conducted the system resource search,communication and evaluation,and then designed the information sharing security mechanisms through RFID devices and Savant middleware.Finally,we used Contiki operating system to design three types of attacks under the network topology.From the result of simulation results,we can see that the sharing time of this mechanism can reach as long as 172s,and this mechanism can deal with most scenarios in real IoT.

关 键 词:云信任驱动 物联网 信息共享 安全机制 

分 类 号:TP311[自动化与计算机技术—计算机软件与理论]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象