浏览全部资源
扫码关注微信
1. 南京邮电大学计算机学院,江苏 南京 210003
2. 江苏省无线传感网高技术研究重点实验室,江苏 南京 210003
[ "张琳(1980-),女,江苏丰县人,博士,南京邮电大学副教授、硕士生导师,主要研究方向为网络安全、可信计算、隐私保护等" ]
[ "魏新艳(1993-),女,江苏宿迁人,南京邮电大学硕士生,主要研究方向为网络安全、可信计算等" ]
[ "刘茜萍(1981-),女,四川攀枝花人,博士,南京邮电大学副教授、硕士生导师,主要研究方向为分布式计算、服务计算等" ]
[ "黄海平(1981-),女,福建三明人,博士,南京邮电大学教授、博士生导师,主要研究方向为物联网、网络安全、隐私保护等" ]
[ "王汝传(1943-),男,安徽合肥人,南京邮电大学教授、博士生导师,主要研究方向为计算机软件、计算机网络和网格、信息安全、无线传感器网络等" ]
网络出版日期:2022-02,
纸质出版日期:2022-02-25
移动端阅览
张琳, 魏新艳, 刘茜萍, 等. 基于协作信誉和设备反馈的物联网边缘服务器信任评估算法[J]. 通信学报, 2022,43(2):118-130.
Lin ZHANG, Xinyan WEI, Xiping LIU, et al. Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback[J]. Journal on communications, 2022, 43(2): 118-130.
张琳, 魏新艳, 刘茜萍, 等. 基于协作信誉和设备反馈的物联网边缘服务器信任评估算法[J]. 通信学报, 2022,43(2):118-130. DOI: 10.11959/j.issn.1000-436x.2022024.
Lin ZHANG, Xinyan WEI, Xiping LIU, et al. Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback[J]. Journal on communications, 2022, 43(2): 118-130. DOI: 10.11959/j.issn.1000-436x.2022024.
针对边缘服务器的安全问题,提出了一种集成了服务器协作信誉以及设备用户反馈的信任评估算法来提高边缘计算上下文的安全性。交互过程中,使用了一种基于客观信息熵理论的融合算法来聚合服务器间的协作信誉,同时采用了部分同态加密算法来防止交互过程中用户数据的泄露。交互结束后,选择高可信的设备节点计算反馈信任,克服了传统机制的恶意反馈。在计算全局信任时,考虑了服务器的期望评分和自适应的权重计算算法,克服了传统信任方案的局限性。实验结果表明,所提信任度计算方案具有较低的时间复杂度和空间复杂度,并且可以有效抵抗恶意节点的攻击行为。
Aiming at the security problem of edge server
a trust evaluation algorithm was proposed
which integrated server cooperation reputation and device user feedback to improve the security of edge computing context.In the process of interaction
a fusion algorithm based on objective information entropy theory was used to aggregate the cooperation reputation between servers
and a partial homomorphic encryption algorithm was used to prevent the leakage of user data in the process of interaction.After the interaction
the highly trusted device node was selected to calculate the feedback trust
which overcame the malicious feedback of the traditional mechanism.When calculating the global trust
the expected score of the server and the adaptive weight calculation method were considered
which overcame the limitations of the traditional trust scheme.The experimental results show that the proposed trust calculation scheme has low time complexity and spatial complexity
and can effectively resist the attack of malicious nodes.
SUN X , ANSARI N . EdgeIoT:mobile edge computing for the Internet of things [J ] . IEEE Communications Magazine , 2016 , 54 ( 12 ): 22 - 29 .
SKALA K , DAVIDOVIĆ D , AFGAN E , et al . Scalable distributed computing hierarchy:cloud,fog and dew computing [J ] . Open Journal of Cloud Computing , 2015 , 2 ( 1 ): 16 - 24 .
SONEKAR S V , KSHIRSAGAR M M , MALIK L . Cluster head selection and malicious node detection in wireless ad hoc networks [C ] // Next-Generation Networks . Berlin:Springer , 2018 : 547 - 554 .
YIM H J , SON Y H , LEE K C . A data distribution service quality of services policy configuration for data/events/services in the Internet of things [J ] . Advanced Science Letters , 2016 , 22 ( 11 ): 3612 - 3617 .
乐光学 , 戴亚盛 , 杨晓慧 , 等 . 边缘计算可信协同服务策略建模 [J ] . 计算机研究与发展 , 2020 , 57 ( 5 ): 1080 - 1102 .
YUE G X , DAI Y S , YANG X H , et al . Model of trusted cooperative service for edge computing [J ] . Journal of Computer Research and Development , 2020 , 57 ( 5 ): 1080 - 1102 .
HASHEM E M , NI Q , SHI Q . Secure and privacy-aware cloud-assisted video reporting service in 5G-enabled vehicular networks [J ] . IEEE Transactions on Vehicular Technology , 2016 , 65 ( 10 ): 7868 - 7881 .
CONOSCENTI M , VETRÒ A , DE MARTIN J C . Peer to peer for privacy and decentralization in the Internet of things [C ] // Proceedings of 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C) . Piscataway:IEEE Press , 2017 : 288 - 290 .
JIN B , JIANG D S , XIONG J B , et al . D2D data privacy protection mechanism based on reliability and homomorphic encryption [J ] . IEEE Access , 2018 , 6 : 51140 - 51150 .
SCIANCALEPORE S , PIRO G , CALDAROLA D , et al . OAuth-IoT:an access control framework for the Internet of things based on open standards [C ] // Proceedings of 2017 IEEE Symposium on Computers and Communications . Piscataway:IEEE Press , 2017 : 676 - 681 .
GUAN Z T , SI G L , WU J , et al . Utility-privacy tradeoff based on random data obfuscation in Internet of energy [J ] . IEEE Access , 2017 , 5 : 3250 - 3262 .
ZHENG W T , WANG Z Y , LV T T , et al . K-anonymity algorithm based on improved clustering [C ] // Algorithms and Architectures for Parallel Processing . Berlin:Springer , 2018 : 462 - 476 .
WANG Q , HUANG J , CHEN Y J , et al . PROST:privacy-preserving and truthful online double auction for spectrum allocation [J ] . IEEE Transactions on Information Forensics and Security , 2019 , 14 ( 2 ): 374 - 386 .
WANG X , LUO T , LI J F . An efficient fully homomorphic encryption scheme for private information retrieval in the cloud [J ] . International Journal of Pattern Recognition and Artificial Intelligence , 2020 , 34 ( 4 ): 2055008 .
张佳乐 , 赵彦超 , 陈兵 , 等 . 边缘计算数据安全与隐私保护研究综述 [J ] . 通信学报 , 2018 , 39 ( 3 ): 1 - 21 .
ZHANG J L , ZHAO Y C , CHEN B , et al . Survey on data security and privacy-preserving for the research of edge computing [J ] . Journal on Communications , 2018 , 39 ( 3 ): 1 - 21 .
HUANG X M , YU R , KANG J W , et al . Distributed reputation management for secure and efficient vehicular edge computing and networks [J ] . IEEE Access , 2017 , 5 : 25408 - 25420 .
邓宇乔 , 杨波 , 唐春明 , 等 . 基于密文策略的流程加密研究 [J ] . 计算机学报 , 2019 , 42 ( 5 ): 1063 - 1075 .
DENG Y Q , YANG B , TANG C M , et al . Research of ciphertext policy process-based encryption [J ] . Chinese Journal of Computers , 2019 , 42 ( 5 ): 1063 - 1075 .
霍星 , 张阳洋 , 景永俊 , 等 . MAS环境中一种基于反馈可信度的多维信誉计算算法 [J ] . 软件学报 , 2020 , 31 ( 2 ): 374 - 394 .
HUO X , ZHANG Y Y , JING Y J , et al . Multidimensional reputation calculation method based on feedback reliability in MAS environment [J ] . Journal of Software , 2020 , 31 ( 2 ): 374 - 394 .
王田 , 张广学 , 蔡绍滨 , 等 . 传感云中的信任评价机制研究进展 [J ] . 通信学报 , 2018 , 39 ( 6 ): 37 - 51 .
WANG T , ZHANG G X , CAI S B , et al . Survey on trust evaluation mechanism in sensor-cloud [J ] . Journal on Communications , 2018 , 39 ( 6 ): 37 - 51 .
NAGARAJAN R , THIRUNAVUKARASU R , SHANMUGAM S . A fuzzy-based intelligent cloud broker with MapReduce framework to evaluate the trust level of cloud services using customer feedback [J ] . International Journal of Fuzzy Systems , 2018 , 20 ( 1 ): 339 - 347 .
SIADAT S , RAHMANI A M , NAVID H . Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model [J ] . The Journal of Supercomputing , 2017 , 73 ( 6 ): 2682 - 2704 .
邱磊 , 蒋文贤 , 李玉泽 , 等 . 基于边缘计算与信任值的可信数据收集算法 [J ] . 软件学报 , 2019 , 30 ( S1 ): 71 - 81 .
QIU L , JIANG W X , LI Y Z , et al . Trustworthy data collection method based on edge computing and trust value [J ] . Journal of Software , 2019 , 30 ( S1 ): 71 - 81 .
LI X , LI J , YIU S , et al . Privacy-preserving edge-assisted image retrieval and classification in IoT [J ] . Frontiers of Computer Science , 2019 , 13 ( 5 ): 1136 - 1147 .
HAN G J , HE Y , JIANG J F , et al . A synergetic trust model based on SVM in underwater acoustic sensor networks [J ] . IEEE Transactions on Vehicular Technology , 2019 , 68 ( 11 ): 11239 - 11247 .
HUANG L T , DENG S G , LI Y , et al . A trust evaluation mechanism for collaboration of data-intensive services in cloud [J ] . Applied Mathematics & Information Sciences , 2013 , 7 ( 1L ): 121 - 129 .
WU Q T , ZHANG X L , ZHANG M C , et al . Reputation revision method for selecting cloud services based on prior knowledge and a market mechanism [J ] . The Scientific World Journal , 2014 , 2014 : 1 - 9 .
AZIZ B , FREMANTLE P , WEI R , et al . A utility-based reputation model for the Internet of things [C ] // ICT Systems Security and Privacy Protection . Berlin:Springer , 2016 : 261 - 275 .
REDDY V B , NEGI A , VENKATARAMAN S , et al . A similarity based trust model to mitigate badmouthing attacks in Internet of things (IoT) [C ] // Proceedings of 2019 IEEE 5th World Forum on Internet of Things . Piscataway:IEEE Press , 2019 : 278 - 282 .
YUAN J , LI X Y . A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion [J ] . IEEE Access , 2018 , 6 : 23626 - 23638 .
TRUONG N B , LEE G M , UM T W , et al . Trust evaluation mechanism for user recruitment in mobile crowd-sensing in the Internet of things [J ] . IEEE Transactions on Information Forensics and Security , 2019 , 14 ( 10 ): 2705 - 2719 .
0
浏览量
365
下载量
3
CSCD
关联资源
相关文章
相关作者
相关机构