A Proactive Trust Evaluation System for Secure Data Collection Based on Sequence Extraction

被引:1
|
作者
Huang, Mingfeng [1 ,2 ]
Li, Zhetao [3 ]
Liu, Anfeng [1 ]
Zhang, Xinglin [4 ]
Yang, Zhemin [5 ]
Yang, Min
机构
[1] Cent South Univ, Sch Elect Informat, Changsha 410017, Peoples R China
[2] Changsha Univ Sci & Technol, Sch Comp & Commun Engn, Changsha 410000, Peoples R China
[3] Jinan Univ, Coll Informat Sci & Technol, Natl & Local Joint Engn Res Ctr Network Secur Dete, Guangdong ProvincialKey Lab Data Secur & Privacy P, Guangzhou 510632, Peoples R China
[4] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Peoples R China
[5] Fudan Univ, Sch Comp Sci, Shanghai 201203, Peoples R China
基金
中国国家自然科学基金;
关键词
Data models; Computational modeling; Accuracy; Predictive models; Cloud computing; Bayes methods; Analytical models; Internet of Things; trust mechanism; data security; sequence extraction; evaluation accuracy; PRIVACY;
D O I
10.1109/TDSC.2024.3424448
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a collaborative and open network, billions of devices can be free to join the IoT-based data collection network for data perception and transmission. Along with this trend, more and more malicious attackers enter the network, they steal or tamper with data, and hinder data exchange and communication. To address these issues, we propose a Proactive Trust Evaluation System (PTES) for secure data collection by evaluating the trust of mobile data collectors. Specifically, PTES guarantees evaluation accuracy from trust evidence acquisition, trust evidence storage, and trust value calculation. First, PTES obtains trust evidence based on active detection of drones, feedbacks from interacted objects, and recommendations from trusted third parties. Then, these trust evidences are stored according to interaction time by adopting a sliding window mechanism. After that, credible, untrustworthy, and uncertain evidence sequences are extracted from the storage space, and assigned with positive, negative, and tendentious trust values, respectively. Consequently, the final normalized trust is obtained by combining the three trust values. Finally, extensive experiments conducted on a real-world dataset demonstrate PTES is superior to benchmark methods in terms of detection accuracy and profit.
引用
收藏
页码:997 / 1010
页数:14
相关论文
共 50 条
  • [1] Achieving secure big data collection based on trust evaluation and true data discovery
    Lv, Denglong
    Zhu, Shibing
    COMPUTERS & SECURITY, 2020, 96
  • [2] A Trust-Based Security System for Data Collection in Smart City
    Fang, Weidong
    Cui, Ningning
    Chen, Wei
    Zhang, Wuxiong
    Chen, Yunliang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (06) : 4131 - 4140
  • [3] A Secure System for Data Collection in GSM Networks
    Koutny, Martin
    Misurec, Jiri
    Mlynek, Petr
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (11): : 24 - 28
  • [4] A Secure Personal-Data Trading System Based on Blockchain, Trust, and Reputation
    Camilo, Gustavo F.
    Rebello, Gabriel Antonio F.
    de Souza, Lucas Airam C.
    Duarte, Otto Carlos M. B.
    2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020), 2020, : 379 - 384
  • [5] CITE: A content based trust evaluation scheme for data collection with Internet of Everything
    Zheng, Yuntian
    Li, Zeyuan
    Zeng, Zhiwen
    Zhang, Shaobo
    Xiong, Neal N.
    Liu, Anfeng
    INFORMATION SCIENCES, 2023, 647
  • [6] Hierarchical game-based secure data collection with trust and reputation management in the cognitive radio network
    Bennaceur, Jihen
    Idoudi, Hanen
    Saidane, Leila Azouz
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 96 (96)
  • [7] Secure Remote Data Collection System Using Data Encryption
    Rodrigues, Bruno
    Cardoso, Alberto
    Bernardino, Jorge
    Simoes, Nuno
    Marques, Jose
    IFAC PAPERSONLINE, 2019, 52 (27): : 400 - 405
  • [8] A Secure Data Aggregation Algorithm Based on a Trust Mechanism
    Liu, Changtao
    Ye, Jun
    SENSORS, 2024, 24 (13)
  • [9] A trust-based Probing to secure data routing
    Bouabana-Tebibel, Thouraya
    Tebibel, Nidal
    Zemmouri, Selma
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1592 - 1597
  • [10] A Bespoked secure framework for an ontology-based data-extraction system
    Indumathi J.
    Uma G.V.
    Journal of Software Engineering, 2010, 4 (02): : 156 - 168