• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种基于社交相似性和机器学习的物联网混合信任计算方法。

A hybrid trust computing approach for IoT using social similarity and machine learning.

机构信息

Computer Engineering and Control Systems Department, Faculty of Engineering, Mansoura University, Mansoura, Egypt.

出版信息

PLoS One. 2022 Jul 28;17(7):e0265658. doi: 10.1371/journal.pone.0265658. eCollection 2022.

DOI:10.1371/journal.pone.0265658
PMID:35901084
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9333244/
Abstract

Every year, millions of new devices are added to the Internet of things, which has both great benefits and serious security risks for user data privacy. It is the device owners' responsibility to ensure that the ownership settings of Internet of things devices are maintained, allowing them to communicate with other user devices autonomously. The ultimate goal of the future Internet of Things is for it to be able to make decisions on its own, without the need for human intervention. Therefore, trust computing and prediction have become more vital in the processing and handling of data as well as in the delivery of services. In this paper, we compute trust in social IoT scenarios using a hybrid approach that combines a distributed computation technique and a global machine learning approach. The approach considers social similarity while assessing other users' ratings and utilize a cloud-based architecture. Further, we propose a dynamic way to aggregate the different computed trust values. According to the results of the experimental work, it is shown that the proposed approaches outperform related work. Besides, it is shown that the use of machine learning provides slightly better performance than the computing model. Both proposed approaches were found successful in degrading malicious ratings without the need for more complex algorithms.

摘要

每年,数以百万计的新设备被添加到物联网中,这既为用户数据隐私带来了巨大的好处,也带来了严重的安全风险。确保物联网设备的所有权设置得到维护,使它们能够自主与其他用户设备进行通信,是设备所有者的责任。未来物联网的最终目标是能够自行做出决策,而无需人类干预。因此,信任计算和预测在数据处理和服务交付方面变得更加重要。在本文中,我们使用一种混合方法在社交物联网场景中计算信任,该方法结合了分布式计算技术和全局机器学习方法。该方法在评估其他用户的评分时考虑了社会相似性,并利用了基于云的架构。此外,我们提出了一种动态的方法来聚合不同的计算信任值。根据实验工作的结果,表明所提出的方法优于相关工作。此外,还表明机器学习的使用比计算模型提供了略好的性能。这两种方法都成功地在不使用更复杂算法的情况下降低了恶意评分。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/cca03d423d52/pone.0265658.g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/c0cbe837faeb/pone.0265658.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/a334536bbddb/pone.0265658.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/839be4febf7b/pone.0265658.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/ef9f6052ba02/pone.0265658.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/717675c91893/pone.0265658.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/a1c43e45aec5/pone.0265658.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/0d9c8de82fcb/pone.0265658.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/f0f47dfe57a5/pone.0265658.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/17bf0cc19616/pone.0265658.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/78f8913b02de/pone.0265658.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/4aa2158edfdc/pone.0265658.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/d6d852f3c61c/pone.0265658.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/c39389bbd7a2/pone.0265658.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/32e113b3ca09/pone.0265658.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/815912f1a467/pone.0265658.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/cca03d423d52/pone.0265658.g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/c0cbe837faeb/pone.0265658.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/a334536bbddb/pone.0265658.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/839be4febf7b/pone.0265658.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/ef9f6052ba02/pone.0265658.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/717675c91893/pone.0265658.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/a1c43e45aec5/pone.0265658.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/0d9c8de82fcb/pone.0265658.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/f0f47dfe57a5/pone.0265658.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/17bf0cc19616/pone.0265658.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/78f8913b02de/pone.0265658.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/4aa2158edfdc/pone.0265658.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/d6d852f3c61c/pone.0265658.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/c39389bbd7a2/pone.0265658.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/32e113b3ca09/pone.0265658.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/815912f1a467/pone.0265658.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3317/9333244/cca03d423d52/pone.0265658.g016.jpg

相似文献

1
A hybrid trust computing approach for IoT using social similarity and machine learning.一种基于社交相似性和机器学习的物联网混合信任计算方法。
PLoS One. 2022 Jul 28;17(7):e0265658. doi: 10.1371/journal.pone.0265658. eCollection 2022.
2
Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system.支持物联网的智能家居系统动态卸载中的混合计算框架安全
PeerJ Comput Sci. 2024 Aug 23;10:e2211. doi: 10.7717/peerj-cs.2211. eCollection 2024.
3
Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques.利用机器学习技术检测云计算中的恶意带宽消耗。
Comput Intell Neurosci. 2022 Sep 5;2022:4003403. doi: 10.1155/2022/4003403. eCollection 2022.
4
Device-Based Security to Improve User Privacy in the Internet of Things .基于设备的安全性提高物联网中的用户隐私。
Sensors (Basel). 2018 Aug 14;18(8):2664. doi: 10.3390/s18082664.
5
The applications of machine learning techniques in medical data processing based on distributed computing and the Internet of Things.基于分布式计算和物联网的机器学习技术在医学数据处理中的应用。
Comput Methods Programs Biomed. 2023 Nov;241:107745. doi: 10.1016/j.cmpb.2023.107745. Epub 2023 Aug 9.
6
Design and Implementation of a Trust Information Management Platform for Social Internet of Things Environments.社会物联网环境中信任信息管理平台的设计与实现。
Sensors (Basel). 2019 Oct 29;19(21):4707. doi: 10.3390/s19214707.
7
Towards Secure Fitness Framework Based on IoT-Enabled Blockchain Network Integrated with Machine Learning Algorithms.基于物联网的区块链网络与机器学习算法集成的安全健身框架。
Sensors (Basel). 2021 Feb 26;21(5):1640. doi: 10.3390/s21051640.
8
PyFF: A Fog-Based Flexible Architecture for Enabling Privacy-by-Design IoT-Based Communal Smart Environments.PyFF:一种基于雾计算的灵活架构,用于实现基于物联网的公共智能环境的隐私设计。
Sensors (Basel). 2021 May 24;21(11):3640. doi: 10.3390/s21113640.
9
Multilevel Central Trust Management Approach for Task Scheduling on IoT-Based Mobile Cloud Computing.基于物联网的移动云计算中任务调度的多层次中央信任管理方法。
Sensors (Basel). 2021 Dec 24;22(1):108. doi: 10.3390/s22010108.
10
Security Risks and User Perception towards Adopting Wearable Internet of Medical Things.可穿戴医疗物联网的安全风险与用户接受度。
Int J Environ Res Public Health. 2023 Apr 14;20(8):5519. doi: 10.3390/ijerph20085519.