A Proactive Trust Evaluation System for Secure Data Collection Based on Sequence Extraction

被引:1
|
作者
Huang, Mingfeng [1 ,2 ]
Li, Zhetao [3 ]
Liu, Anfeng [1 ]
Zhang, Xinglin [4 ]
Yang, Zhemin [5 ]
Yang, Min
机构
[1] Cent South Univ, Sch Elect Informat, Changsha 410017, Peoples R China
[2] Changsha Univ Sci & Technol, Sch Comp & Commun Engn, Changsha 410000, Peoples R China
[3] Jinan Univ, Coll Informat Sci & Technol, Natl & Local Joint Engn Res Ctr Network Secur Dete, Guangdong ProvincialKey Lab Data Secur & Privacy P, Guangzhou 510632, Peoples R China
[4] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Peoples R China
[5] Fudan Univ, Sch Comp Sci, Shanghai 201203, Peoples R China
基金
中国国家自然科学基金;
关键词
Data models; Computational modeling; Accuracy; Predictive models; Cloud computing; Bayes methods; Analytical models; Internet of Things; trust mechanism; data security; sequence extraction; evaluation accuracy; PRIVACY;
D O I
10.1109/TDSC.2024.3424448
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a collaborative and open network, billions of devices can be free to join the IoT-based data collection network for data perception and transmission. Along with this trend, more and more malicious attackers enter the network, they steal or tamper with data, and hinder data exchange and communication. To address these issues, we propose a Proactive Trust Evaluation System (PTES) for secure data collection by evaluating the trust of mobile data collectors. Specifically, PTES guarantees evaluation accuracy from trust evidence acquisition, trust evidence storage, and trust value calculation. First, PTES obtains trust evidence based on active detection of drones, feedbacks from interacted objects, and recommendations from trusted third parties. Then, these trust evidences are stored according to interaction time by adopting a sliding window mechanism. After that, credible, untrustworthy, and uncertain evidence sequences are extracted from the storage space, and assigned with positive, negative, and tendentious trust values, respectively. Consequently, the final normalized trust is obtained by combining the three trust values. Finally, extensive experiments conducted on a real-world dataset demonstrate PTES is superior to benchmark methods in terms of detection accuracy and profit.
引用
收藏
页码:997 / 1010
页数:14
相关论文
共 50 条
  • [41] A Secure Data Fusion Algorithm Based on Behavior Trust in Wireless Sensor Networks
    Zhu Cheng
    Zhou Ming-Zheng
    Xu Jin-Sheng
    Ye Qing
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4623 - 4626
  • [42] A dynamic trust based clustering method for secure data gathering in Internet of Things
    Naghibi, Maryam
    Barati, Hamid
    Barati, Ali
    COMPUTING, 2025, 107 (04)
  • [43] A Secure Data Aggregation Algorithm Based on Behavior Trust in Wireless Sensor Networks
    Zhou, Ming-Zheng
    Xu, Jin-Sheng
    Zhu, Cheng
    SEC 2008: PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING, 2008, : 61 - 66
  • [44] An Algorithm of Trust-based Secure Data Aggregation for Wireless Sensor Networks
    Ye Z.-W.
    Wen T.
    Liu Z.-Y.
    Fu C.-G.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (06): : 789 - 794
  • [45] EVALUATION OF A PROTOTYPE OF A NATIONAL DATA-COLLECTION SYSTEM
    VELTRI, J
    ARMSTRONG, G
    BRADFORD, D
    VETERINARY AND HUMAN TOXICOLOGY, 1983, 25 (04) : 276 - 276
  • [46] Secure multi-path routing for Internet of Things based on trust evaluation
    Xiao J.
    Chang C.
    Ma Y.
    Yang C.
    Yuan L.
    Mathematical Biosciences and Engineering, 2024, 21 (02) : 3335 - 3363
  • [47] Secure routing protocol based on optimized trust evaluation in Ad Hoc network
    Chen S.
    Fan X.
    Zhuo Z.
    Huang J.
    Sun X.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2016, 42 (11): : 2524 - 2531
  • [48] A Log-structured Block Preservation and Restoration System for Proactive Forensic Data Collection in the Cloud
    Hirano, Manabu
    Ogawa, Hiromu
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 355 - 364
  • [49] BlockToll: A Hierarchical Blockchain Based Secure Toll Collection System for Intelligent Transportation System
    Chakraborty, Sukanta
    Majumder, Abhishek
    INTERNATIONAL JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS RESEARCH, 2024, 22 (03) : 503 - 517
  • [50] Data Dependency Based Trust Evaluation for BPEL Processes
    Liu, Cuicui
    Li, Bixin
    Qi, Shanshan
    Wu, Xiaona
    Song, Rui
    2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1, 2012, : 857 - 866