검색 상세

IoT 네트워크를 위한 에너지 효율적인 하이브리드 신뢰 평가 기법

An Energy Efficient Hybrid Trust Evaluation Scheme of IoT Networks

초록/요약

In tactical IoT networks, tactical IoT sensors are increasingly expected to be exploited for information collection in battlefields or dangerous areas on behalf of soldiers. The main function of these networks is to use sensors to measure radiation, nuclear, and biochemical values for the safety of allies and also to monitor and reconnaissance enemies. These tactical IoT sensors require a network traffic flow that sends various types of measured information to the gateway, which needs high reliability. To ensure reliability, it must be able to detect malicious nodes that perform packet-dropping attacks to disrupt the network traffic flow, and energy-constrained tactical IoT sensors require energy-efficient methods to detect them. Therefore, in this paper, we propose an energy efficient hybrid trust evaluation scheme for locating malicious nodes that perform packet-dropping attacks in a tree-based IoT network. Tactical IoT sensors send a query to the gateway by observing the traffic patterns of their child nodes. Moreover, depending on the situation, the gateway detects malicious nodes by choosing between gateway-assisted trust evaluation and gateway-independent trust evaluation. We implemented and evaluated the proposed scheme with the OPNET simulator, and the result showed that a higher packet delivery ratio can be achieved with significantly lower energy consumption.

more

목차

1. Introduction 1
2. Related Work 5
2.1 Gateway-Assisted Trust Evaluation . . . . . . . . . . . . . . . . . . . . . 5
2.2 Gateway-Independent Trust Evaluation . . . . . . . . . . . . . . . . . . . 6
3. Proposed Scheme II 9
3.1 An Energy Ecient Hybrid Trust Evaluation System . . . . . . . . . . . 9
3.2 Observation Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.2.1 Local Observation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.2.2 Collaborative Observation . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.3 Trust Evaluation Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.3.1 Gateway-Independent Trust Evaluation . . . . . . . . . . . . . . . . . . . 17
3.3.2 Gateway-Assisted Trust Evaluation . . . . . . . . . . . . . . . . . . . . . 19
3.4 Inspection Result Sharing Phase . . . . . . . . . . . . . . . . . . . . . . . 22
4. Performance Evaluation 24
4.1 Simulation Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.2 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
5. Conclusion 32
References 33
요약문 36

more