IoT 네트워크를 위한 에너지 효율적인 하이브리드 신뢰 평가 기법
An Energy Efficient Hybrid Trust Evaluation Scheme of IoT Networks
- 주제(키워드) tactical IoT networks , trust management , IoT
- 발행기관 아주대학교
- 지도교수 고영배
- 발행년도 2020
- 학위수여년월 2020. 2
- 학위명 석사
- 학과 및 전공 일반대학원 컴퓨터공학과
- 실제URI http://www.dcollection.net/handler/ajou/000000029852
- 본문언어 영어
- 저작권 아주대학교 논문은 저작권에 의해 보호받습니다.
초록/요약
In tactical IoT networks, tactical IoT sensors are increasingly expected to be exploited for information collection in battlefields or dangerous areas on behalf of soldiers. The main function of these networks is to use sensors to measure radiation, nuclear, and biochemical values for the safety of allies and also to monitor and reconnaissance enemies. These tactical IoT sensors require a network traffic flow that sends various types of measured information to the gateway, which needs high reliability. To ensure reliability, it must be able to detect malicious nodes that perform packet-dropping attacks to disrupt the network traffic flow, and energy-constrained tactical IoT sensors require energy-efficient methods to detect them. Therefore, in this paper, we propose an energy efficient hybrid trust evaluation scheme for locating malicious nodes that perform packet-dropping attacks in a tree-based IoT network. Tactical IoT sensors send a query to the gateway by observing the traffic patterns of their child nodes. Moreover, depending on the situation, the gateway detects malicious nodes by choosing between gateway-assisted trust evaluation and gateway-independent trust evaluation. We implemented and evaluated the proposed scheme with the OPNET simulator, and the result showed that a higher packet delivery ratio can be achieved with significantly lower energy consumption.
more목차
1. Introduction 1
2. Related Work 5
2.1 Gateway-Assisted Trust Evaluation . . . . . . . . . . . . . . . . . . . . . 5
2.2 Gateway-Independent Trust Evaluation . . . . . . . . . . . . . . . . . . . 6
3. Proposed Scheme II 9
3.1 An Energy Ecient Hybrid Trust Evaluation System . . . . . . . . . . . 9
3.2 Observation Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.2.1 Local Observation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.2.2 Collaborative Observation . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.3 Trust Evaluation Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.3.1 Gateway-Independent Trust Evaluation . . . . . . . . . . . . . . . . . . . 17
3.3.2 Gateway-Assisted Trust Evaluation . . . . . . . . . . . . . . . . . . . . . 19
3.4 Inspection Result Sharing Phase . . . . . . . . . . . . . . . . . . . . . . . 22
4. Performance Evaluation 24
4.1 Simulation Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.2 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
5. Conclusion 32
References 33
요약문 36