Internet of things security evaluation mechanism based on meta attribute fluctuation

In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an indep...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:PloS one 2023-07, Vol.18 (7), p.e0282630-e0282630
Hauptverfasser: Liu, Zhe, Yuan, Yinghao, Zhao, Bo, Wang, Yixuan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page e0282630
container_issue 7
container_start_page e0282630
container_title PloS one
container_volume 18
creator Liu, Zhe
Yuan, Yinghao
Zhao, Bo
Wang, Yixuan
description In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an independent subset of the security research in the IoT field. However, it should also be noted that the security attributes of IoT terminals can include many aspects, so judging the security of IoT terminals based on the overall security form is not enough for the security of terminal entities. This paper introduces the concept of volatility from the overall situation assessment to the meta attributes that constitute the overall security situation, and preliminarily realizes the construction of a concise model based on historical data to judge the meta attributes that may affect the overall security in the future. At the same time, a concise verification system is built based on the application scenario of the power IoT terminals currently under research to preliminarily realize trend prediction, further expand the trust evaluation of IoT terminals, and clarify the direction of further research.
doi_str_mv 10.1371/journal.pone.0282630
format Article
fullrecord <record><control><sourceid>gale_plos_</sourceid><recordid>TN_cdi_plos_journals_2837325938</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A757145347</galeid><doaj_id>oai_doaj_org_article_7b5aa1d457284507927db64de45cc9d4</doaj_id><sourcerecordid>A757145347</sourcerecordid><originalsourceid>FETCH-LOGICAL-c642t-43c91da403476ddc757537f3ca9a43cf1d7b5d02cb6ba3fd76de5256f7b4339f3</originalsourceid><addsrcrecordid>eNqNkl1r1EAUhoMotlb_gWhAEL3YNZmPTHIlpfixUCho9XY4mY_dWZKZ7cyk2H_vZDctG-mF5CLhzHPeM-fNm2Wvy2JZYlZ-2rrBW-iWO2fVskA1qnDxJDstG4wWFSrw06Pvk-xFCNuioLiuqufZCWaEFrTAp9n1ykblrYq503ncGLsOeVBi8Cbe5eoWugGicTbvldiANaHPWwhK5vtShBxi9KYdosp1N4h4oF9mzzR0Qb2a3mfZr69fri--Ly6vvq0uzi8XoiIoLggWTSmBFJiwSkrBKKOYaSyggXSmS8laKgsk2qoFrGWCFEW00qwlGDcan2VvD7q7zgU-GRI4qjHDiDa4TsTqQEgHW77zpgd_xx0Yvi84v-bgoxGd4mkWQCkJZahO7rAGMdlWRCpChWgkSVqfp2lD2ysplI0eupno_MSaDV-7W16mBWtKUVL4MCl4dzOoEHlvglBdB1a5YX_xGqUN2Tjs3T_o4-tN1BrSBsZqlwaLUZSfJzdLQpO1iVo-QqVHqt6IFB9tUn3W8HHWkJio_sQ1DCHw1c8f_89e_Z6z74_YjYIuboLrhjEzYQ6SAyi8C8Er_eByWfAx_fdu8DH9fEp_antz_Icemu7jjv8Cvr7_wQ</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2837325938</pqid></control><display><type>article</type><title>Internet of things security evaluation mechanism based on meta attribute fluctuation</title><source>MEDLINE</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Public Library of Science (PLoS) Journals Open Access</source><source>PubMed Central</source><source>Free Full-Text Journals in Chemistry</source><creator>Liu, Zhe ; Yuan, Yinghao ; Zhao, Bo ; Wang, Yixuan</creator><contributor>Gupta, Brij Bhooshan</contributor><creatorcontrib>Liu, Zhe ; Yuan, Yinghao ; Zhao, Bo ; Wang, Yixuan ; Gupta, Brij Bhooshan</creatorcontrib><description>In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an independent subset of the security research in the IoT field. However, it should also be noted that the security attributes of IoT terminals can include many aspects, so judging the security of IoT terminals based on the overall security form is not enough for the security of terminal entities. This paper introduces the concept of volatility from the overall situation assessment to the meta attributes that constitute the overall security situation, and preliminarily realizes the construction of a concise model based on historical data to judge the meta attributes that may affect the overall security in the future. At the same time, a concise verification system is built based on the application scenario of the power IoT terminals currently under research to preliminarily realize trend prediction, further expand the trust evaluation of IoT terminals, and clarify the direction of further research.</description><identifier>ISSN: 1932-6203</identifier><identifier>EISSN: 1932-6203</identifier><identifier>DOI: 10.1371/journal.pone.0282630</identifier><identifier>PMID: 37450503</identifier><language>eng</language><publisher>United States: Public Library of Science</publisher><subject>Access control ; Collaboration ; Computer and Information Sciences ; Computer Security ; Customer feedback ; Cybersecurity ; Data transmission ; Electricity distribution ; Engineering and Technology ; Internet ; Internet of Things ; Methods ; Physical Sciences ; Research and Analysis Methods ; Safety and security measures ; Terminals ; Trust ; Wireless access points</subject><ispartof>PloS one, 2023-07, Vol.18 (7), p.e0282630-e0282630</ispartof><rights>Copyright: © 2023 Liu et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</rights><rights>COPYRIGHT 2023 Public Library of Science</rights><rights>2023 Liu et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2023 Liu et al 2023 Liu et al</rights><rights>2023 Liu et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c642t-43c91da403476ddc757537f3ca9a43cf1d7b5d02cb6ba3fd76de5256f7b4339f3</cites><orcidid>0000-0001-9104-6722</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC10348552/pdf/$$EPDF$$P50$$Gpubmedcentral$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC10348552/$$EHTML$$P50$$Gpubmedcentral$$Hfree_for_read</linktohtml><link.rule.ids>230,314,727,780,784,864,885,2102,2928,23866,27924,27925,53791,53793</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/37450503$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><contributor>Gupta, Brij Bhooshan</contributor><creatorcontrib>Liu, Zhe</creatorcontrib><creatorcontrib>Yuan, Yinghao</creatorcontrib><creatorcontrib>Zhao, Bo</creatorcontrib><creatorcontrib>Wang, Yixuan</creatorcontrib><title>Internet of things security evaluation mechanism based on meta attribute fluctuation</title><title>PloS one</title><addtitle>PLoS One</addtitle><description>In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an independent subset of the security research in the IoT field. However, it should also be noted that the security attributes of IoT terminals can include many aspects, so judging the security of IoT terminals based on the overall security form is not enough for the security of terminal entities. This paper introduces the concept of volatility from the overall situation assessment to the meta attributes that constitute the overall security situation, and preliminarily realizes the construction of a concise model based on historical data to judge the meta attributes that may affect the overall security in the future. At the same time, a concise verification system is built based on the application scenario of the power IoT terminals currently under research to preliminarily realize trend prediction, further expand the trust evaluation of IoT terminals, and clarify the direction of further research.</description><subject>Access control</subject><subject>Collaboration</subject><subject>Computer and Information Sciences</subject><subject>Computer Security</subject><subject>Customer feedback</subject><subject>Cybersecurity</subject><subject>Data transmission</subject><subject>Electricity distribution</subject><subject>Engineering and Technology</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Methods</subject><subject>Physical Sciences</subject><subject>Research and Analysis Methods</subject><subject>Safety and security measures</subject><subject>Terminals</subject><subject>Trust</subject><subject>Wireless access points</subject><issn>1932-6203</issn><issn>1932-6203</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>EIF</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>DOA</sourceid><recordid>eNqNkl1r1EAUhoMotlb_gWhAEL3YNZmPTHIlpfixUCho9XY4mY_dWZKZ7cyk2H_vZDctG-mF5CLhzHPeM-fNm2Wvy2JZYlZ-2rrBW-iWO2fVskA1qnDxJDstG4wWFSrw06Pvk-xFCNuioLiuqufZCWaEFrTAp9n1ykblrYq503ncGLsOeVBi8Cbe5eoWugGicTbvldiANaHPWwhK5vtShBxi9KYdosp1N4h4oF9mzzR0Qb2a3mfZr69fri--Ly6vvq0uzi8XoiIoLggWTSmBFJiwSkrBKKOYaSyggXSmS8laKgsk2qoFrGWCFEW00qwlGDcan2VvD7q7zgU-GRI4qjHDiDa4TsTqQEgHW77zpgd_xx0Yvi84v-bgoxGd4mkWQCkJZahO7rAGMdlWRCpChWgkSVqfp2lD2ysplI0eupno_MSaDV-7W16mBWtKUVL4MCl4dzOoEHlvglBdB1a5YX_xGqUN2Tjs3T_o4-tN1BrSBsZqlwaLUZSfJzdLQpO1iVo-QqVHqt6IFB9tUn3W8HHWkJio_sQ1DCHw1c8f_89e_Z6z74_YjYIuboLrhjEzYQ6SAyi8C8Er_eByWfAx_fdu8DH9fEp_antz_Icemu7jjv8Cvr7_wQ</recordid><startdate>20230714</startdate><enddate>20230714</enddate><creator>Liu, Zhe</creator><creator>Yuan, Yinghao</creator><creator>Zhao, Bo</creator><creator>Wang, Yixuan</creator><general>Public Library of Science</general><general>Public Library of Science (PLoS)</general><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>IOV</scope><scope>ISR</scope><scope>3V.</scope><scope>7QG</scope><scope>7QL</scope><scope>7QO</scope><scope>7RV</scope><scope>7SN</scope><scope>7SS</scope><scope>7T5</scope><scope>7TG</scope><scope>7TM</scope><scope>7U9</scope><scope>7X2</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8AO</scope><scope>8C1</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>C1K</scope><scope>CCPQU</scope><scope>D1I</scope><scope>DWQXO</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H94</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>KB.</scope><scope>KB0</scope><scope>KL.</scope><scope>L6V</scope><scope>LK8</scope><scope>M0K</scope><scope>M0S</scope><scope>M1P</scope><scope>M7N</scope><scope>M7P</scope><scope>M7S</scope><scope>NAPCQ</scope><scope>P5Z</scope><scope>P62</scope><scope>P64</scope><scope>PATMY</scope><scope>PDBOC</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>PYCSY</scope><scope>RC3</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-9104-6722</orcidid></search><sort><creationdate>20230714</creationdate><title>Internet of things security evaluation mechanism based on meta attribute fluctuation</title><author>Liu, Zhe ; Yuan, Yinghao ; Zhao, Bo ; Wang, Yixuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c642t-43c91da403476ddc757537f3ca9a43cf1d7b5d02cb6ba3fd76de5256f7b4339f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Access control</topic><topic>Collaboration</topic><topic>Computer and Information Sciences</topic><topic>Computer Security</topic><topic>Customer feedback</topic><topic>Cybersecurity</topic><topic>Data transmission</topic><topic>Electricity distribution</topic><topic>Engineering and Technology</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Methods</topic><topic>Physical Sciences</topic><topic>Research and Analysis Methods</topic><topic>Safety and security measures</topic><topic>Terminals</topic><topic>Trust</topic><topic>Wireless access points</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Liu, Zhe</creatorcontrib><creatorcontrib>Yuan, Yinghao</creatorcontrib><creatorcontrib>Zhao, Bo</creatorcontrib><creatorcontrib>Wang, Yixuan</creatorcontrib><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Gale In Context: Opposing Viewpoints</collection><collection>Gale In Context: Science</collection><collection>ProQuest Central (Corporate)</collection><collection>Animal Behavior Abstracts</collection><collection>Bacteriology Abstracts (Microbiology B)</collection><collection>Biotechnology Research Abstracts</collection><collection>Nursing &amp; Allied Health Database</collection><collection>Ecology Abstracts</collection><collection>Entomology Abstracts (Full archive)</collection><collection>Immunology Abstracts</collection><collection>Meteorological &amp; Geoastrophysical Abstracts</collection><collection>Nucleic Acids Abstracts</collection><collection>Virology and AIDS Abstracts</collection><collection>Agricultural Science Collection</collection><collection>Health &amp; Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Public Health Database</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>Agricultural &amp; Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ProQuest One Community College</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>AIDS and Cancer Research Abstracts</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>Materials Science Database</collection><collection>Nursing &amp; Allied Health Database (Alumni Edition)</collection><collection>Meteorological &amp; Geoastrophysical Abstracts - Academic</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest Biological Science Collection</collection><collection>Agricultural Science Database</collection><collection>Health &amp; Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Algology Mycology and Protozoology Abstracts (Microbiology C)</collection><collection>Biological Science Database</collection><collection>Engineering Database</collection><collection>Nursing &amp; Allied Health Premium</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Environmental Science Database</collection><collection>Materials Science Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>Environmental Science Collection</collection><collection>Genetics Abstracts</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>PloS one</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Liu, Zhe</au><au>Yuan, Yinghao</au><au>Zhao, Bo</au><au>Wang, Yixuan</au><au>Gupta, Brij Bhooshan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Internet of things security evaluation mechanism based on meta attribute fluctuation</atitle><jtitle>PloS one</jtitle><addtitle>PLoS One</addtitle><date>2023-07-14</date><risdate>2023</risdate><volume>18</volume><issue>7</issue><spage>e0282630</spage><epage>e0282630</epage><pages>e0282630-e0282630</pages><issn>1932-6203</issn><eissn>1932-6203</eissn><abstract>In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an independent subset of the security research in the IoT field. However, it should also be noted that the security attributes of IoT terminals can include many aspects, so judging the security of IoT terminals based on the overall security form is not enough for the security of terminal entities. This paper introduces the concept of volatility from the overall situation assessment to the meta attributes that constitute the overall security situation, and preliminarily realizes the construction of a concise model based on historical data to judge the meta attributes that may affect the overall security in the future. At the same time, a concise verification system is built based on the application scenario of the power IoT terminals currently under research to preliminarily realize trend prediction, further expand the trust evaluation of IoT terminals, and clarify the direction of further research.</abstract><cop>United States</cop><pub>Public Library of Science</pub><pmid>37450503</pmid><doi>10.1371/journal.pone.0282630</doi><tpages>e0282630</tpages><orcidid>https://orcid.org/0000-0001-9104-6722</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1932-6203
ispartof PloS one, 2023-07, Vol.18 (7), p.e0282630-e0282630
issn 1932-6203
1932-6203
language eng
recordid cdi_plos_journals_2837325938
source MEDLINE; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Public Library of Science (PLoS) Journals Open Access; PubMed Central; Free Full-Text Journals in Chemistry
subjects Access control
Collaboration
Computer and Information Sciences
Computer Security
Customer feedback
Cybersecurity
Data transmission
Electricity distribution
Engineering and Technology
Internet
Internet of Things
Methods
Physical Sciences
Research and Analysis Methods
Safety and security measures
Terminals
Trust
Wireless access points
title Internet of things security evaluation mechanism based on meta attribute fluctuation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T07%3A34%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_plos_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Internet%20of%20things%20security%20evaluation%20mechanism%20based%20on%20meta%20attribute%20fluctuation&rft.jtitle=PloS%20one&rft.au=Liu,%20Zhe&rft.date=2023-07-14&rft.volume=18&rft.issue=7&rft.spage=e0282630&rft.epage=e0282630&rft.pages=e0282630-e0282630&rft.issn=1932-6203&rft.eissn=1932-6203&rft_id=info:doi/10.1371/journal.pone.0282630&rft_dat=%3Cgale_plos_%3EA757145347%3C/gale_plos_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2837325938&rft_id=info:pmid/37450503&rft_galeid=A757145347&rft_doaj_id=oai_doaj_org_article_7b5aa1d457284507927db64de45cc9d4&rfr_iscdi=true