A smart middleware to detect on-off trust attacks in the Internet of Things
Title | A smart middleware to detect on-off trust attacks in the Internet of Things |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Caminha, J., Perkusich, A., Perkusich, M. |
Conference Name | 2018 IEEE International Conference on Consumer Electronics (ICCE) |
ISBN Number | 978-1-5386-3025-9 |
Keywords | complex environment, composability, Data models, heterogeneous environment, Human Behavior, Internet, Internet of Things, Internet of Things designs, IoT resources trust, IoT Security 2018, low trust node, malicious device, Metrics, middleware, middleware security, node behavior, On-Off Attacks, on-off trust attacks, performance evaluation, Pervasive Computing Security, policy-based governance, pubcrawl, Real-time Systems, Resiliency, security, security of data, Sensors, service providers, service requesters, smart middleware, sophisticated trust threat, Trust, Trusted Computing |
Abstract | Security is a key concern in Internet of Things (IoT) designs. In a heterogeneous and complex environment, service providers and service requesters must trust each other. On-off attack is a sophisticated trust threat in which a malicious device can perform good and bad services randomly to avoid being rated as a low trust node. Some countermeasures demands prior level of trust knowing and time to classify a node behavior. In this paper, we introduce a Smart Middleware that automatically assesses the IoT resources trust, evaluating service providers attributes to protect against On-off attacks. |
URL | https://ieeexplore.ieee.org/document/8326290 |
DOI | 10.1109/ICCE.2018.8326290 |
Citation Key | caminha_smart_2018 |
- security of data
- on-off trust attacks
- performance evaluation
- Pervasive Computing Security
- policy-based governance
- pubcrawl
- real-time systems
- Resiliency
- security
- On-Off Attacks
- sensors
- service providers
- service requesters
- smart middleware
- sophisticated trust threat
- trust
- Trusted Computing
- complex environment
- node behavior
- middleware security
- middleware
- Metrics
- malicious device
- low trust node
- IoT Security 2018
- IoT resources trust
- Internet of Things designs
- Internet of Things
- internet
- Human behavior
- heterogeneous environment
- Data models
- composability