• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

金融物联网中基于信任的协作智能设备选择与资源分配方法

A Method for Trust-Based Collaborative Smart Device Selection and Resource Allocation in the Financial Internet of Things.

作者信息

Wang Bo, Wang Jiesheng, Li Mingchu

机构信息

School of Applied Technology, University of Science and Technology Liaoning, Anshan 114051, China.

Julong Co., Ltd., Anshan 114051, China.

出版信息

Sensors (Basel). 2025 Jun 30;25(13):4082. doi: 10.3390/s25134082.

DOI:10.3390/s25134082
PMID:40648336
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12252449/
Abstract

With the rapid development of the Financial Internet of Things (FIoT), many intelligent devices have been deployed in various business scenarios. Due to the unique characteristics of these devices, they are highly vulnerable to malicious attacks, posing significant threats to the system's stability and security. Moreover, the limited resources available in the FIoT, combined with the extensive deployment of AI algorithms, can significantly reduce overall system availability. To address the challenge of resisting malicious behaviors and attacks in the FIoT, this paper proposes a trust-based collaborative smart device selection algorithm that integrates both subjective and objective trust mechanisms with dynamic blacklists and whitelists, leveraging domain knowledge and game theory. It is essential to evaluate real-time dynamic trust levels during system execution to accurately assess device trustworthiness. A dynamic blacklist and whitelist transformation mechanism is also proposed to capture the evolving behavior of collaborative service devices and update the lists accordingly. The proposed algorithm enhances the anti-attack capabilities of smart devices in the FIoT by combining adaptive trust evaluation with blacklist and whitelist strategies. It maintains a high task success rate in both single and complex attack scenarios. Furthermore, to address the challenge of resource allocation for trusted smart devices under constrained edge resources, a coalition game-based algorithm is proposed that considers both device activity and trust levels. Experimental results demonstrate that the proposed method significantly improves task success rates and resource allocation performance compared to existing approaches.

摘要

随着金融物联网(FIoT)的快速发展,许多智能设备已部署在各种业务场景中。由于这些设备的独特特性,它们极易受到恶意攻击,对系统的稳定性和安全性构成重大威胁。此外,FIoT中可用资源有限,再加上人工智能算法的广泛部署,会显著降低系统的整体可用性。为应对FIoT中抵御恶意行为和攻击的挑战,本文提出一种基于信任的协作智能设备选择算法,该算法将主观和客观信任机制与动态黑名单和白名单相结合,利用领域知识和博弈论。在系统执行过程中评估实时动态信任级别对于准确评估设备的可信度至关重要。还提出了一种动态黑名单和白名单转换机制,以捕捉协作服务设备不断变化的行为并相应地更新列表。所提出的算法通过将自适应信任评估与黑名单和白名单策略相结合,增强了FIoT中智能设备的抗攻击能力。在单攻击和复杂攻击场景下都保持了较高的任务成功率。此外,为应对边缘资源受限情况下可信智能设备的资源分配挑战,提出了一种基于联盟博弈的算法,该算法同时考虑了设备活动和信任级别。实验结果表明,与现有方法相比,所提出的方法显著提高了任务成功率和资源分配性能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/18bbd622694f/sensors-25-04082-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/1bd822ef02d8/sensors-25-04082-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/93c910ba197a/sensors-25-04082-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/0aed889adff0/sensors-25-04082-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/583ce65de5b9/sensors-25-04082-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/cde0a6e0dc9d/sensors-25-04082-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/5c12cc9ff474/sensors-25-04082-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/d48d2060f296/sensors-25-04082-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/e3abb4c8e78f/sensors-25-04082-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/fac863b2a115/sensors-25-04082-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/676c709d73df/sensors-25-04082-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/0c68871aa2ff/sensors-25-04082-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/ab23a663bd79/sensors-25-04082-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/8bd4f6b9d050/sensors-25-04082-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/fade8bb641d3/sensors-25-04082-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/c3e38ee22eda/sensors-25-04082-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/18bbd622694f/sensors-25-04082-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/1bd822ef02d8/sensors-25-04082-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/93c910ba197a/sensors-25-04082-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/0aed889adff0/sensors-25-04082-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/583ce65de5b9/sensors-25-04082-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/cde0a6e0dc9d/sensors-25-04082-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/5c12cc9ff474/sensors-25-04082-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/d48d2060f296/sensors-25-04082-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/e3abb4c8e78f/sensors-25-04082-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/fac863b2a115/sensors-25-04082-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/676c709d73df/sensors-25-04082-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/0c68871aa2ff/sensors-25-04082-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/ab23a663bd79/sensors-25-04082-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/8bd4f6b9d050/sensors-25-04082-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/fade8bb641d3/sensors-25-04082-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/c3e38ee22eda/sensors-25-04082-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a161/12252449/18bbd622694f/sensors-25-04082-g016.jpg

相似文献

1
A Method for Trust-Based Collaborative Smart Device Selection and Resource Allocation in the Financial Internet of Things.金融物联网中基于信任的协作智能设备选择与资源分配方法
Sensors (Basel). 2025 Jun 30;25(13):4082. doi: 10.3390/s25134082.
2
Blockchain-Based Trust Management Framework for Cloud Computing-Based Internet of Medical Things (IoMT): A Systematic Review.基于区块链的云计算物联网 (IoMT) 信任管理框架:系统评价。
Comput Intell Neurosci. 2022 May 19;2022:9766844. doi: 10.1155/2022/9766844. eCollection 2022.
3
A deep dive into artificial intelligence with enhanced optimization-based security breach detection in internet of health things enabled smart city environment.在支持智慧城市环境的健康物联网中,通过基于增强优化的安全漏洞检测深入探讨人工智能。
Sci Rep. 2025 Jul 2;15(1):22909. doi: 10.1038/s41598-025-05850-z.
4
Lightweight authentication for IoT devices (LAID) in sustainable smart cities.可持续智慧城市中物联网设备的轻量级认证(LAID)
Sci Rep. 2025 Jul 14;15(1):25410. doi: 10.1038/s41598-025-10181-0.
5
Sexual Harassment and Prevention Training性骚扰与预防培训
6
Hail Lifestyle Medicine consensus position statement as a medical specialty: Middle Eastern perspective.欢呼将生活方式医学作为一门医学专业的共识立场声明:中东视角。
Front Public Health. 2025 Jun 20;13:1455871. doi: 10.3389/fpubh.2025.1455871. eCollection 2025.
7
Management of urinary stones by experts in stone disease (ESD 2025).结石病专家对尿路结石的管理(2025年结石病专家共识)
Arch Ital Urol Androl. 2025 Jun 30;97(2):14085. doi: 10.4081/aiua.2025.14085.
8
Leveraging machine learning to uncover the hidden links between trusting behavior and biological markers.利用机器学习揭示信任行为与生物标志物之间的潜在联系。
Dialogues Clin Neurosci. 2025 Dec;27(1):201-215. doi: 10.1080/19585969.2025.2513697. Epub 2025 Jun 20.
9
Short-Term Memory Impairment短期记忆障碍
10
Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security.利用基于深度神经网络和区块链的网络安全增强物联网(IoT)中的异常检测与预防。
Sci Rep. 2025 Jul 1;15(1):22369. doi: 10.1038/s41598-025-04164-4.

本文引用的文献

1
Deep Reinforcement Learning Based Resource Allocation Strategy in Cloud-Edge Computing System.基于深度强化学习的云边缘计算系统资源分配策略
Front Bioeng Biotechnol. 2022 Aug 4;10:908056. doi: 10.3389/fbioe.2022.908056. eCollection 2022.
2
Different perceptions of social dilemmas: evolutionary multigames in structured populations.对社会困境的不同认知:结构化群体中的进化多博弈
Phys Rev E Stat Nonlin Soft Matter Phys. 2014 Sep;90(3):032813. doi: 10.1103/PhysRevE.90.032813. Epub 2014 Sep 23.