发表状态 | 已发表Published |
题名 | An active and verifiable trust evaluation approach for edge computing |
作者 | |
发表日期 | 2020-12-01 |
发表期刊 | Journal of Cloud Computing
![]() |
卷号 | 9期号:1 |
摘要 | Billions of Internet of Thing (IoT) devices are deployed in edge network. They are used to monitor specific event, process and to collect huge data to control center with smart decision based on the collected data. However, some malicious IoT devices may interrupt and interfere with normal nodes in data collection, causing damage to edge network. Due to the open character of the edge network, how to identify the credibility of these nodes, thereby identifying malicious IoT devices, and ensure reliable data collection in the edge network is a great challenge. In this paper, an Active and Verifiable Trust Evaluation (AVTE) approach is proposed to identify the credibility of IoT devices, so to ensure reliable data collection for Edge Computing with low cost. The main innovations of the AVTE approach compared with the existing work are as follows: (1) In AVTE approach, the trust of the device is obtained by an actively initiated trusted detection routing method. It is fast, accurate and targeted. (2) The acquisition of trust in the AVTE approach is based on a verifiable method and it ensures that the trust degree has higher reliability. (3) The trust acquisition method proposed in this paper is low-cost. An encoding returned verification method is applied to obtain verification messages at a very low cost. This paper proposes an encoding returned verification method, which can obtain verification messages at a very low cost. In addition, the strategy of this paper adopts initiation and verification of adaptive active trust detection according to the different energy consumption of IoT devices, so as to reliably obtain the trust of device under the premise of ensuring network lifetime. Theoretical analysis shows that AVTE approach can improve the data collection rate by 0.5 ~ 23.16% while ensuring long network lifetime compared with the existing scheme. |
关键词 | Active trust Data collection Edge computing Trust evolution Verifiable trust |
DOI | 10.1186/s13677-020-00202-w |
URL | 查看来源 |
收录类别 | SCIE |
语种 | 英语English |
WOS研究方向 | Computer Science |
WOS类目 | Computer Science, Information Systems |
WOS记录号 | WOS:000571899000001 |
Scopus入藏号 | 2-s2.0-85091557383 |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | https://repository.uic.edu.cn/handle/39GCC9TT/7106 |
专题 | 个人在本单位外知识产出 |
通讯作者 | Zhang, Jinhuan |
作者单位 | 1.School of Computer Science and Engineering, Central South University, Changsha, 410083, China 2.College of Computer Science and Technology, Huaqiao University, Xiamen, 361021, China 3.School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201, China |
推荐引用方式 GB/T 7714 | Mo, Wen,Wang, Tian,Zhang, Shaoboet al. An active and verifiable trust evaluation approach for edge computing[J]. Journal of Cloud Computing, 2020, 9(1). |
APA | Mo, Wen, Wang, Tian, Zhang, Shaobo, & Zhang, Jinhuan. (2020). An active and verifiable trust evaluation approach for edge computing. Journal of Cloud Computing, 9(1). |
MLA | Mo, Wen,et al."An active and verifiable trust evaluation approach for edge computing". Journal of Cloud Computing 9.1(2020). |
条目包含的文件 | 条目无相关文件。 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论