Internet of things security evaluation mechanism based on meta attribute fluctuation
In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an indep...
Gespeichert in:
Veröffentlicht in: | PloS one 2023-07, Vol.18 (7), p.e0282630-e0282630 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | e0282630 |
---|---|
container_issue | 7 |
container_start_page | e0282630 |
container_title | PloS one |
container_volume | 18 |
creator | Liu, Zhe Yuan, Yinghao Zhao, Bo Wang, Yixuan |
description | In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an independent subset of the security research in the IoT field. However, it should also be noted that the security attributes of IoT terminals can include many aspects, so judging the security of IoT terminals based on the overall security form is not enough for the security of terminal entities. This paper introduces the concept of volatility from the overall situation assessment to the meta attributes that constitute the overall security situation, and preliminarily realizes the construction of a concise model based on historical data to judge the meta attributes that may affect the overall security in the future. At the same time, a concise verification system is built based on the application scenario of the power IoT terminals currently under research to preliminarily realize trend prediction, further expand the trust evaluation of IoT terminals, and clarify the direction of further research. |
doi_str_mv | 10.1371/journal.pone.0282630 |
format | Article |
fullrecord | <record><control><sourceid>gale_plos_</sourceid><recordid>TN_cdi_plos_journals_2837325938</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A757145347</galeid><doaj_id>oai_doaj_org_article_7b5aa1d457284507927db64de45cc9d4</doaj_id><sourcerecordid>A757145347</sourcerecordid><originalsourceid>FETCH-LOGICAL-c642t-43c91da403476ddc757537f3ca9a43cf1d7b5d02cb6ba3fd76de5256f7b4339f3</originalsourceid><addsrcrecordid>eNqNkl1r1EAUhoMotlb_gWhAEL3YNZmPTHIlpfixUCho9XY4mY_dWZKZ7cyk2H_vZDctG-mF5CLhzHPeM-fNm2Wvy2JZYlZ-2rrBW-iWO2fVskA1qnDxJDstG4wWFSrw06Pvk-xFCNuioLiuqufZCWaEFrTAp9n1ykblrYq503ncGLsOeVBi8Cbe5eoWugGicTbvldiANaHPWwhK5vtShBxi9KYdosp1N4h4oF9mzzR0Qb2a3mfZr69fri--Ly6vvq0uzi8XoiIoLggWTSmBFJiwSkrBKKOYaSyggXSmS8laKgsk2qoFrGWCFEW00qwlGDcan2VvD7q7zgU-GRI4qjHDiDa4TsTqQEgHW77zpgd_xx0Yvi84v-bgoxGd4mkWQCkJZahO7rAGMdlWRCpChWgkSVqfp2lD2ysplI0eupno_MSaDV-7W16mBWtKUVL4MCl4dzOoEHlvglBdB1a5YX_xGqUN2Tjs3T_o4-tN1BrSBsZqlwaLUZSfJzdLQpO1iVo-QqVHqt6IFB9tUn3W8HHWkJio_sQ1DCHw1c8f_89e_Z6z74_YjYIuboLrhjEzYQ6SAyi8C8Er_eByWfAx_fdu8DH9fEp_antz_Icemu7jjv8Cvr7_wQ</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2837325938</pqid></control><display><type>article</type><title>Internet of things security evaluation mechanism based on meta attribute fluctuation</title><source>MEDLINE</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Public Library of Science (PLoS) Journals Open Access</source><source>PubMed Central</source><source>Free Full-Text Journals in Chemistry</source><creator>Liu, Zhe ; Yuan, Yinghao ; Zhao, Bo ; Wang, Yixuan</creator><contributor>Gupta, Brij Bhooshan</contributor><creatorcontrib>Liu, Zhe ; Yuan, Yinghao ; Zhao, Bo ; Wang, Yixuan ; Gupta, Brij Bhooshan</creatorcontrib><description>In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an independent subset of the security research in the IoT field. However, it should also be noted that the security attributes of IoT terminals can include many aspects, so judging the security of IoT terminals based on the overall security form is not enough for the security of terminal entities. This paper introduces the concept of volatility from the overall situation assessment to the meta attributes that constitute the overall security situation, and preliminarily realizes the construction of a concise model based on historical data to judge the meta attributes that may affect the overall security in the future. At the same time, a concise verification system is built based on the application scenario of the power IoT terminals currently under research to preliminarily realize trend prediction, further expand the trust evaluation of IoT terminals, and clarify the direction of further research.</description><identifier>ISSN: 1932-6203</identifier><identifier>EISSN: 1932-6203</identifier><identifier>DOI: 10.1371/journal.pone.0282630</identifier><identifier>PMID: 37450503</identifier><language>eng</language><publisher>United States: Public Library of Science</publisher><subject>Access control ; Collaboration ; Computer and Information Sciences ; Computer Security ; Customer feedback ; Cybersecurity ; Data transmission ; Electricity distribution ; Engineering and Technology ; Internet ; Internet of Things ; Methods ; Physical Sciences ; Research and Analysis Methods ; Safety and security measures ; Terminals ; Trust ; Wireless access points</subject><ispartof>PloS one, 2023-07, Vol.18 (7), p.e0282630-e0282630</ispartof><rights>Copyright: © 2023 Liu et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</rights><rights>COPYRIGHT 2023 Public Library of Science</rights><rights>2023 Liu et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2023 Liu et al 2023 Liu et al</rights><rights>2023 Liu et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c642t-43c91da403476ddc757537f3ca9a43cf1d7b5d02cb6ba3fd76de5256f7b4339f3</cites><orcidid>0000-0001-9104-6722</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC10348552/pdf/$$EPDF$$P50$$Gpubmedcentral$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC10348552/$$EHTML$$P50$$Gpubmedcentral$$Hfree_for_read</linktohtml><link.rule.ids>230,314,727,780,784,864,885,2102,2928,23866,27924,27925,53791,53793</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/37450503$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><contributor>Gupta, Brij Bhooshan</contributor><creatorcontrib>Liu, Zhe</creatorcontrib><creatorcontrib>Yuan, Yinghao</creatorcontrib><creatorcontrib>Zhao, Bo</creatorcontrib><creatorcontrib>Wang, Yixuan</creatorcontrib><title>Internet of things security evaluation mechanism based on meta attribute fluctuation</title><title>PloS one</title><addtitle>PLoS One</addtitle><description>In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an independent subset of the security research in the IoT field. However, it should also be noted that the security attributes of IoT terminals can include many aspects, so judging the security of IoT terminals based on the overall security form is not enough for the security of terminal entities. This paper introduces the concept of volatility from the overall situation assessment to the meta attributes that constitute the overall security situation, and preliminarily realizes the construction of a concise model based on historical data to judge the meta attributes that may affect the overall security in the future. At the same time, a concise verification system is built based on the application scenario of the power IoT terminals currently under research to preliminarily realize trend prediction, further expand the trust evaluation of IoT terminals, and clarify the direction of further research.</description><subject>Access control</subject><subject>Collaboration</subject><subject>Computer and Information Sciences</subject><subject>Computer Security</subject><subject>Customer feedback</subject><subject>Cybersecurity</subject><subject>Data transmission</subject><subject>Electricity distribution</subject><subject>Engineering and Technology</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Methods</subject><subject>Physical Sciences</subject><subject>Research and Analysis Methods</subject><subject>Safety and security measures</subject><subject>Terminals</subject><subject>Trust</subject><subject>Wireless access points</subject><issn>1932-6203</issn><issn>1932-6203</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>EIF</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>DOA</sourceid><recordid>eNqNkl1r1EAUhoMotlb_gWhAEL3YNZmPTHIlpfixUCho9XY4mY_dWZKZ7cyk2H_vZDctG-mF5CLhzHPeM-fNm2Wvy2JZYlZ-2rrBW-iWO2fVskA1qnDxJDstG4wWFSrw06Pvk-xFCNuioLiuqufZCWaEFrTAp9n1ykblrYq503ncGLsOeVBi8Cbe5eoWugGicTbvldiANaHPWwhK5vtShBxi9KYdosp1N4h4oF9mzzR0Qb2a3mfZr69fri--Ly6vvq0uzi8XoiIoLggWTSmBFJiwSkrBKKOYaSyggXSmS8laKgsk2qoFrGWCFEW00qwlGDcan2VvD7q7zgU-GRI4qjHDiDa4TsTqQEgHW77zpgd_xx0Yvi84v-bgoxGd4mkWQCkJZahO7rAGMdlWRCpChWgkSVqfp2lD2ysplI0eupno_MSaDV-7W16mBWtKUVL4MCl4dzOoEHlvglBdB1a5YX_xGqUN2Tjs3T_o4-tN1BrSBsZqlwaLUZSfJzdLQpO1iVo-QqVHqt6IFB9tUn3W8HHWkJio_sQ1DCHw1c8f_89e_Z6z74_YjYIuboLrhjEzYQ6SAyi8C8Er_eByWfAx_fdu8DH9fEp_antz_Icemu7jjv8Cvr7_wQ</recordid><startdate>20230714</startdate><enddate>20230714</enddate><creator>Liu, Zhe</creator><creator>Yuan, Yinghao</creator><creator>Zhao, Bo</creator><creator>Wang, Yixuan</creator><general>Public Library of Science</general><general>Public Library of Science (PLoS)</general><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>IOV</scope><scope>ISR</scope><scope>3V.</scope><scope>7QG</scope><scope>7QL</scope><scope>7QO</scope><scope>7RV</scope><scope>7SN</scope><scope>7SS</scope><scope>7T5</scope><scope>7TG</scope><scope>7TM</scope><scope>7U9</scope><scope>7X2</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8AO</scope><scope>8C1</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>C1K</scope><scope>CCPQU</scope><scope>D1I</scope><scope>DWQXO</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H94</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>KB.</scope><scope>KB0</scope><scope>KL.</scope><scope>L6V</scope><scope>LK8</scope><scope>M0K</scope><scope>M0S</scope><scope>M1P</scope><scope>M7N</scope><scope>M7P</scope><scope>M7S</scope><scope>NAPCQ</scope><scope>P5Z</scope><scope>P62</scope><scope>P64</scope><scope>PATMY</scope><scope>PDBOC</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>PYCSY</scope><scope>RC3</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-9104-6722</orcidid></search><sort><creationdate>20230714</creationdate><title>Internet of things security evaluation mechanism based on meta attribute fluctuation</title><author>Liu, Zhe ; Yuan, Yinghao ; Zhao, Bo ; Wang, Yixuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c642t-43c91da403476ddc757537f3ca9a43cf1d7b5d02cb6ba3fd76de5256f7b4339f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Access control</topic><topic>Collaboration</topic><topic>Computer and Information Sciences</topic><topic>Computer Security</topic><topic>Customer feedback</topic><topic>Cybersecurity</topic><topic>Data transmission</topic><topic>Electricity distribution</topic><topic>Engineering and Technology</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Methods</topic><topic>Physical Sciences</topic><topic>Research and Analysis Methods</topic><topic>Safety and security measures</topic><topic>Terminals</topic><topic>Trust</topic><topic>Wireless access points</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Liu, Zhe</creatorcontrib><creatorcontrib>Yuan, Yinghao</creatorcontrib><creatorcontrib>Zhao, Bo</creatorcontrib><creatorcontrib>Wang, Yixuan</creatorcontrib><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Gale In Context: Opposing Viewpoints</collection><collection>Gale In Context: Science</collection><collection>ProQuest Central (Corporate)</collection><collection>Animal Behavior Abstracts</collection><collection>Bacteriology Abstracts (Microbiology B)</collection><collection>Biotechnology Research Abstracts</collection><collection>Nursing & Allied Health Database</collection><collection>Ecology Abstracts</collection><collection>Entomology Abstracts (Full archive)</collection><collection>Immunology Abstracts</collection><collection>Meteorological & Geoastrophysical Abstracts</collection><collection>Nucleic Acids Abstracts</collection><collection>Virology and AIDS Abstracts</collection><collection>Agricultural Science Collection</collection><collection>Health & Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Public Health Database</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>Agricultural & Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ProQuest One Community College</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>AIDS and Cancer Research Abstracts</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>Materials Science Database</collection><collection>Nursing & Allied Health Database (Alumni Edition)</collection><collection>Meteorological & Geoastrophysical Abstracts - Academic</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest Biological Science Collection</collection><collection>Agricultural Science Database</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Algology Mycology and Protozoology Abstracts (Microbiology C)</collection><collection>Biological Science Database</collection><collection>Engineering Database</collection><collection>Nursing & Allied Health Premium</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Environmental Science Database</collection><collection>Materials Science Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>Environmental Science Collection</collection><collection>Genetics Abstracts</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>PloS one</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Liu, Zhe</au><au>Yuan, Yinghao</au><au>Zhao, Bo</au><au>Wang, Yixuan</au><au>Gupta, Brij Bhooshan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Internet of things security evaluation mechanism based on meta attribute fluctuation</atitle><jtitle>PloS one</jtitle><addtitle>PLoS One</addtitle><date>2023-07-14</date><risdate>2023</risdate><volume>18</volume><issue>7</issue><spage>e0282630</spage><epage>e0282630</epage><pages>e0282630-e0282630</pages><issn>1932-6203</issn><eissn>1932-6203</eissn><abstract>In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an independent subset of the security research in the IoT field. However, it should also be noted that the security attributes of IoT terminals can include many aspects, so judging the security of IoT terminals based on the overall security form is not enough for the security of terminal entities. This paper introduces the concept of volatility from the overall situation assessment to the meta attributes that constitute the overall security situation, and preliminarily realizes the construction of a concise model based on historical data to judge the meta attributes that may affect the overall security in the future. At the same time, a concise verification system is built based on the application scenario of the power IoT terminals currently under research to preliminarily realize trend prediction, further expand the trust evaluation of IoT terminals, and clarify the direction of further research.</abstract><cop>United States</cop><pub>Public Library of Science</pub><pmid>37450503</pmid><doi>10.1371/journal.pone.0282630</doi><tpages>e0282630</tpages><orcidid>https://orcid.org/0000-0001-9104-6722</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1932-6203 |
ispartof | PloS one, 2023-07, Vol.18 (7), p.e0282630-e0282630 |
issn | 1932-6203 1932-6203 |
language | eng |
recordid | cdi_plos_journals_2837325938 |
source | MEDLINE; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Public Library of Science (PLoS) Journals Open Access; PubMed Central; Free Full-Text Journals in Chemistry |
subjects | Access control Collaboration Computer and Information Sciences Computer Security Customer feedback Cybersecurity Data transmission Electricity distribution Engineering and Technology Internet Internet of Things Methods Physical Sciences Research and Analysis Methods Safety and security measures Terminals Trust Wireless access points |
title | Internet of things security evaluation mechanism based on meta attribute fluctuation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T07%3A34%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_plos_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Internet%20of%20things%20security%20evaluation%20mechanism%20based%20on%20meta%20attribute%20fluctuation&rft.jtitle=PloS%20one&rft.au=Liu,%20Zhe&rft.date=2023-07-14&rft.volume=18&rft.issue=7&rft.spage=e0282630&rft.epage=e0282630&rft.pages=e0282630-e0282630&rft.issn=1932-6203&rft.eissn=1932-6203&rft_id=info:doi/10.1371/journal.pone.0282630&rft_dat=%3Cgale_plos_%3EA757145347%3C/gale_plos_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2837325938&rft_id=info:pmid/37450503&rft_galeid=A757145347&rft_doaj_id=oai_doaj_org_article_7b5aa1d457284507927db64de45cc9d4&rfr_iscdi=true |