检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Xiangrong Li Yu Zhang Haotian Zhu Yubo Wang Junjia Huang
机构地区:[1]Faculty of Information Technology,Beijing University of Technology,Beijing 100124,China [2]School of Information Science and Technology,Zhengzhou Normal University,Henan 450044,China [3]Beijing Trust Yunke Technology Co.,Ltd.,Beijing 100022,China
出 处:《Digital Communications and Networks》2025年第1期225-233,共9页数字通信与网络(英文版)
基 金:supported by National Key R&D Program of China (2019YFB2102303);National Natural Science Foundation of China (NSFC61971014,NSFC11675199);Beijing Postdoctoral Research Foundation (2021-ZZ-079);Young Backbone Teacher Training Program of Henan Colleges and Universities (2021GGJS170);Henan Province Higher Education Key Research Project (23B520014)。
摘 要:The core missions of IoT are to sense data,transmit data and give feedback to the real world based on the calculation of the sensed data.The trust of sensing source data and transmission network is extremely important to IoT security.5G-IoT with its low latency,wide connectivity and high-speed transmission extends the business scenarios of IoT,yet it also brings new challenges to trust proof solutions of IoT.Currently,there is a lack of efficient and reliable trust proof solutions for massive dynamically connected nodes,while the existing solutions have high computational complexity and can't adapt to time-sensitive services in 5G-IoT scenarios.In order to solve the above problems,this paper proposes an adaptive multi-dimensional trust proof solution.Firstly,the static and dynamic attributes of sensing nodes are metricized,and the historical interaction as well as the recommendation information are combined with the comprehensive metric of sensing nodes,and a multi-dimensional fine-grained trusted metric model is established in this paper.Then,based on the comprehensive metrics,the sensing nodes are logically grouped and assigned with service levels to achieve the screening and isolation of malicious nodes.At the same time,the proposed solution reduces the energy consumption of the metric process and optimizes the impact of real-time metrics on the interaction latency.Simulation experiments show that the solution can accurately and efficiently identify malicious nodes and effectively guarantee the safe and trustworthy operation of 5G-IoT nodes,while having a small impact on the latency of the 5G network.
关 键 词:5G-IoT Trusted metrics Trust model
分 类 号:TN929.5[电子电信—通信与信息系统] TP393[电子电信—信息与通信工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.15