Journal of Computer Applications ›› 2018, Vol. 38 ›› Issue (3): 682-687.DOI: 10.11772/j.issn.1001-9081.2017092214

Previous Articles     Next Articles

Adaptive security mechanism for defending On-off attack based on trust in Internet of things

ZHANG Guanghua1,2, YANG Yaohong2, PANG Shaobo2, CHEN Zhenguo3   

  1. 1. State Key Laboratory of Integrated Services Networks(Xidian University), Xi'an Shaanxi 710071, China;
    2. College of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang Hebei 050000, China;
    3. Hebei Engineering Technology Research Center for IoT Data Acquisition and Processing, North China Institute of Science and Technology, Sanhe Hebei 065201, China
  • Received:2017-09-13 Revised:2017-10-07 Online:2018-03-10 Published:2018-03-07
  • Supported by:
    The work is partially supported by the National Natural Science Foundation of China (61572255), the China Postdoctoral Science Foundation (2015M582622), the Open Fund of Hebei Engineering Technology Research Center for IoT Data Acquisition and Processing in 2016 (2016KF05).


张光华1,2, 杨耀红2, 庞少博2, 陈振国3   

  1. 1. 综合业务网理论及关键技术国家重点实验室(西安电子科技大学), 西安 710071;
    2. 河北科技大学 信息科学与工程学院, 石家庄 050000;
    3. 华北科技学院 河北省物联网数据采集与处理工程技术研究中心, 河北 三河 065201
  • 通讯作者: 杨耀红
  • 作者简介:张光华(1979-),男,河北石家庄人,副教授,博士,CCF会员,主要研究方向:信任管理、网络安全;杨耀红(1992-),女,河北邢台人,硕士研究生,主要研究方向:网络安全;庞少博(1992-),男,河北承德人,硕士研究生,主要研究方向:网络安全;陈振国(1976-),男,山东冠县人,副教授,博士,主要研究方向:物联网安全。
  • 基金资助:

Abstract: To reduce the unnecessary overhead of data source authentication in static security mechanism and defend the On-off attack in trust threshold mechanism, an adaptive security mechanism based on trust was proposed in the Internet of Things (IoT). Firstly, the trust evaluation model was built according to node behavior in information interaction, further the measure method for total trust value of nodes was given. Then, for the nodes whose total trust values were higher than the trust threshold, the trust-based adaptive detection algorithm was used to detect the changes of the total trust values of these nodes in real time. Finally, the relay nodes determined whether to authenticate the received message according to the returned result of adaptive detection algorithm. The simulation results and analysis show that the proposed mechanism reduces the energy overhead of relay nodes, and plays a better role in defense against On-off attacks in IoT.

Key words: Internet of Things (IoT), On-off attack, trust evaluation, adaptive security, energy consumption

摘要: 为了降低静态安全机制中不必要的数据源认证开销和防御信任阈值机制中存在的On-off攻击,在物联网(IoT)环境下提出了一种基于信任的自适应安全机制。首先,根据节点在信息交互中的行为表现建立节点间的信任评估模型,进而给出节点总体信任值的度量方法;然后,对于总体信任值高于信任阈值的节点,采用基于信任的自适应检测算法实时地检测这些节点总体信任值的变化情况;最终,中继节点根据自适应检测的结果决定是否验证接收到的消息。仿真实验结果和分析表明,该机制降低了中继节点的能量开销,同时对物联网中的On-off攻击起到较好的防御作用。

关键词: 物联网, On-off攻击, 信任评估, 自适应安全, 能耗

CLC Number: