The application scenarios of IoT (Internet of Things) are complex and diverse. Failure of security defense in any part of IoT can lead to huge information leakage and incalculable losses. IoT security issues are affecting and limiting its application prospects, and have become one of the hotspots in the field of IoT. Identity resolution security of IoT has become a core issue in solving the security problem of IoT. The aim of this paper is to apply AHP, a well-known decision making method, to IoT identity resolution security. Selecting 6 indicators, several pairwise comparison matrices are constructed based on scores from experts and lab researchers. The AHP method is used to calculate malicious resolution value as a quantitative basis for judging the security performance of each resolution server. An experimental case is used to verify the validity and correctness of the AHP-based IoT identity resolution security evaluation model.
Citation: Huqing Wang, Zhixin Sun. Research on multi decision making security performance of IoT identity resolution server based on AHP[J]. Mathematical Biosciences and Engineering, 2021, 18(4): 3977-3992. doi: 10.3934/mbe.2021199
The application scenarios of IoT (Internet of Things) are complex and diverse. Failure of security defense in any part of IoT can lead to huge information leakage and incalculable losses. IoT security issues are affecting and limiting its application prospects, and have become one of the hotspots in the field of IoT. Identity resolution security of IoT has become a core issue in solving the security problem of IoT. The aim of this paper is to apply AHP, a well-known decision making method, to IoT identity resolution security. Selecting 6 indicators, several pairwise comparison matrices are constructed based on scores from experts and lab researchers. The AHP method is used to calculate malicious resolution value as a quantitative basis for judging the security performance of each resolution server. An experimental case is used to verify the validity and correctness of the AHP-based IoT identity resolution security evaluation model.
[1] | P. Q. Wang, H. Luo, Y. Sun, Mapping model of multi-identifiers oriented to Internet of Things, Sci. China Inform. Sci., 43 (2013), 1244-1264. |
[2] | Y. J. Xia, W. Z. Chen, X. J. Liu, L. M. Zhang, X. L. Li, Y. Xiang, Adaptive multimedia data forwarding for privacy preservation in vehicular ad-hoc networks, IEEE Trans. Intell. Transp. Syst., 99 (2017), 1-13. |
[3] | China Academy of Information and Communications Technology, White Paper on Internet of Things, 2018. |
[4] | Y. Z. Ren, R. C. Xie, S. Q. Zeng, H. R. Zhao, J. Y. Yu, R. Huo, et al., Survey of identity resolution system in industrial Internet of things, J. Commun., 40 (2019), 138-155. |
[5] | EPCglobal, The EPCglobal architecture framework, The EPCglobal Standards Development Process, 2007. |
[6] | ISO/IEC, Information technology-open systems interconnection-part1: Object identifier resolution system, ISO/IEC29168-1, 2011. |
[7] | ISO/IEC, Information technology-open systems interconnection-part2: Object identifier resolution system, ISO/IEC29168-2, 2011. |
[8] | National Standardization Administration of China, Identification system for Internet of things-Ecode resolution specification, GB/T 36605-2018, 2018. |
[9] | Mark Allman, Comments on DNS robustness, ACM, Proceedings of the Internet Measurement Conference 2018, (IMC 2018), 84-90. |
[10] | K. Chetioui, G. Orhanou, S. Hajji, New protocol E-DNSSEC to enhance DNSSEC security, Int. J. Net. Secur., 20 (2018), 19-24. |
[11] | S. Sun, S. Reilly, L. Lannom, Handle system namespace and service definition, RFC 3651, IETF, 2003. |
[12] | UID Center, Ubiquitous code, ucode, 2009. |
[13] | C. Grothoff, M. Wachs, M. Ermert, J. Appelbaum, Toward secure name resolution on the internet, Comput. Secur., 77 (2018), 694-708. doi: 10.1016/j.cose.2018.01.018 |
[14] | G. B. He, W. Su, S. Gao, J. R. Yue, TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchain, Future Gener. Comput. Syst., 102 (2020), 912-924. doi: 10.1016/j.future.2019.09.003 |
[15] | T. Takayanag, Y. Kurose, T. Harada, Hierarchical task planning from object goal state for human-assist robot, 2019 IEEE 15th International Conference on Automation Service and Engineering, (2019), 1359-1366. |
[16] | A. S. Konoplev, A. G. Busygin, D. P. Zegahda, A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 52 (2018), 1017-1021. doi: 10.3103/S0146411618080175 |
[17] | A. Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder, Bitcoin and cryptocurrency technologies: A comprehensive introduction, Princeton University Press, 2016. |
[18] | X. Q. Li, P. Jiang, T. Chen, X. P. Luo, Q. Y. Wen, A survey on the security of blockchain systems, Future Gener. Comput. Syst., 107 (2020), 841-853. doi: 10.1016/j.future.2017.08.020 |
[19] | Handshake project[EB/OL], https://www.handshake.org, Access time: 2020-02-14. |
[20] | E. Karaarslan, E. Adiguzel, Blockchain based DNS and PKI solutions, IEEE Commun. Standards Mag., 2 (2018), 52-57. doi: 10.1109/MCOMSTD.2018.1800023 |
[21] | A. Sheikh, V. Kamuni, A. Urooj, S. Wagh, N. Singh, D. Patel, Secured energy trading using Byzantine-based blockchain consensus, IEEE Access, 8 (2020), 8554-8571. doi: 10.1109/ACCESS.2019.2963325 |
[22] | C. Patsakis, F. Casino, Hydras and IPFS: a decentralized playground for malware, Int. J. Inform. Secur., 18 (2019), 787-799. doi: 10.1007/s10207-019-00443-0 |
[23] | W. Pedrycz, M. Song, Analytic hierarchy process (AHP) in group decision making and its optimization with an allocation of information granularity, IEEE Trans. Fuzzy Syst., 19 (2011), 527-539. doi: 10.1109/TFUZZ.2011.2116029 |
[24] | U. Dayanaddan, V. Kalimuthu, Software architectural quality assessment model for security analysis using fuzzy analytical hierarchy process (FAHP) method, 3D Res., 9 (2018), 1-10. doi: 10.1007/s13319-017-0152-9 |
[25] | L. Fang, P. Witold, X. W. Liu, Flexibility degree of fuzzy numbers and its implication to a group-decision-making model, IEEE Trans. Cybern., 49 (2019), 4054-4065. doi: 10.1109/TCYB.2018.2853722 |