A multi-domain trust management model for supporting RFID applications of IoT.

作者: Xu Wu , Feng Li

DOI: 10.1371/JOURNAL.PONE.0181124

关键词: Trust management (information system)Internet of ThingsRisk analysis (engineering)Multi domainEnvironmental resource managementDiversity (business)Computational trustComputer science

摘要: The use of RFID technology in complex and distributed environments often leads to a multi-domain system, which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is challenge. current management mechanisms the literature do not meet specific requirements systems. Therefore, this paper analyzes special challenges on systems, identifies implications solutions A model proposed, provides hierarchical framework include diversity evaluation approaches. simulation results analysis show that proposed method has excellent ability deal with relationships, better security, higher accuracy rate.

参考文章(22)
Shaoying Cai, Yingjiu Li, Yunlei Zhao, Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains information security conference. ,vol. 376, pp. 501- 512 ,(2012) , 10.1007/978-3-642-30436-1_41
Jia Guo, Ing-Ray Chen, A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems 2015 IEEE International Conference on Services Computing. pp. 324- 331 ,(2015) , 10.1109/SCC.2015.52
Mustafa M. Hosni, Hesham A. El Zouka, Efficient and Timely Mutual Authentication Scheme for RFID Systems World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering. ,vol. 9, pp. 1152- 1157 ,(2015)
Michael Braun, Ulrike Meyer, Susanne Wetzel, Efficient mutual authentication for multi-domain RFID systems using distributed signatures workshop in information security theory and practice. pp. 122- 137 ,(2010) , 10.1007/978-3-642-12368-9_9
Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent, Trust management system design for the Internet of Things: A context-aware and multi-service approach Computers & Security. ,vol. 39, pp. 351- 365 ,(2013) , 10.1016/J.COSE.2013.09.001
Biplob R. Ray, Jemal Abawajy, Morshed Chowdhury, Scalable RFID security framework and protocol supporting Internet of Things Computer Networks. ,vol. 67, pp. 89- 103 ,(2014) , 10.1016/J.COMNET.2014.03.023
Saiyu Qi, Yuanqing Zheng, Mo Li, Yunhao Liu, Jinli Qiu, Scalable Data Access Control in RFID-Enabled Supply Chain international conference on network protocols. pp. 71- 82 ,(2014) , 10.1109/ICNP.2014.28
Manmeet Mahinderjit-Singh, Xue Li, Computational model for trust management in RFID supply chains mobile adhoc and sensor systems. pp. 734- 740 ,(2009) , 10.1109/MOBHOC.2009.5336926
Xiang Qiu, Li Zhang, Shouxin Wang, Guanqun Qian, A Trust Transitivity Model Based-on Dempster-Shafer Theory Journal of Networks. ,vol. 5, pp. 1025- 1032 ,(2010) , 10.4304/JNW.5.9.1025-1032
Adarsh Kumar, Krishna Gopal, Alok Aggarwal, Novel Trusted Hierarchy Construction for RFID Sensor–Based MANETs Using ECCs Etri Journal. ,vol. 37, pp. 186- 196 ,(2015) , 10.4218/ETRIJ.15.0114.0177