Next Article in Journal
Exploiting Array Pattern Synthesis for Physical Layer Security in Millimeter Wave Channels
Previous Article in Journal
A Study on Machine Vision Techniques for the Inspection of Health Personnels’ Protective Suits for the Treatment of Patients in Extreme Isolation
Previous Article in Special Issue
A Compact Crossed Inverted-V Antenna with a Common Reflector for Polarization Diversity in the IoT
Article Menu

Export Article

Open AccessArticle

DDTMS: Dirichlet-Distribution-Based Trust Management Scheme in Internet of Things

1
Key Laboratory of Wireless Sensor Network & Communication, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai 201800, China
2
Shanghai Research Center for Wireless Communication, Shanghai 201210, China
3
College of Physics and Electronic Information Engineering, Qinghai University for Nationalities, Xining 810007, China
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(7), 744; https://doi.org/10.3390/electronics8070744
Received: 24 May 2019 / Revised: 20 June 2019 / Accepted: 27 June 2019 / Published: 1 July 2019
(This article belongs to the Special Issue IoT in 5G)
  |  
PDF [969 KB, uploaded 1 July 2019]
  |  

Abstract

Information security is important for the Internet of Things (IoT), the security of front-end information is especially critical. With this consideration, the integrity and authenticity of sensed information directly impacts the results of back-end big data and cloud computing. The front end of the IoT faces many security threats. In these security threats, internal attacks cannot be defended by traditional security schemes, such as encryption/decryption, authentication, and so on. Our contribution in this paper is that a DirichletDistribution-based Trust Management Scheme (DDTMS) in IoT is proposed to defend against the internal attacks. The novelty of our scheme can be summed up in two aspects. The first aspect considers the actual physical channel to extend the node behaviors from success and failure to success, failure, and uncertainty, meanwhile, the corresponding behaviors are weighted by using <ws, wf, wu>, in order to limit the measurement of each behavior by custom. In the second aspect, we introduce a third-party recommendation to calculate the trust value more acurrately. The simulated results demonstrate that DDTMS is better than the other two reputation models (Beta distribution and Gaussian distribution),and can more accurately describe the reputation changes to detect the malicious node quickly. View Full-Text
Keywords: internet of things; trust management scheme; dirichlet distribution; on-off attack internet of things; trust management scheme; dirichlet distribution; on-off attack
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Fang, W.; Zhang, W.; Shan, L.; Ji, X.; Jia, G. DDTMS: Dirichlet-Distribution-Based Trust Management Scheme in Internet of Things. Electronics 2019, 8, 744.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Electronics EISSN 2079-9292 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top