Research article Special Issues

Research on multi decision making security performance of IoT identity resolution server based on AHP

  • Received: 06 March 2021 Accepted: 28 April 2021 Published: 07 May 2021
  • The application scenarios of IoT (Internet of Things) are complex and diverse. Failure of security defense in any part of IoT can lead to huge information leakage and incalculable losses. IoT security issues are affecting and limiting its application prospects, and have become one of the hotspots in the field of IoT. Identity resolution security of IoT has become a core issue in solving the security problem of IoT. The aim of this paper is to apply AHP, a well-known decision making method, to IoT identity resolution security. Selecting 6 indicators, several pairwise comparison matrices are constructed based on scores from experts and lab researchers. The AHP method is used to calculate malicious resolution value as a quantitative basis for judging the security performance of each resolution server. An experimental case is used to verify the validity and correctness of the AHP-based IoT identity resolution security evaluation model.

    Citation: Huqing Wang, Zhixin Sun. Research on multi decision making security performance of IoT identity resolution server based on AHP[J]. Mathematical Biosciences and Engineering, 2021, 18(4): 3977-3992. doi: 10.3934/mbe.2021199

    Related Papers:

  • The application scenarios of IoT (Internet of Things) are complex and diverse. Failure of security defense in any part of IoT can lead to huge information leakage and incalculable losses. IoT security issues are affecting and limiting its application prospects, and have become one of the hotspots in the field of IoT. Identity resolution security of IoT has become a core issue in solving the security problem of IoT. The aim of this paper is to apply AHP, a well-known decision making method, to IoT identity resolution security. Selecting 6 indicators, several pairwise comparison matrices are constructed based on scores from experts and lab researchers. The AHP method is used to calculate malicious resolution value as a quantitative basis for judging the security performance of each resolution server. An experimental case is used to verify the validity and correctness of the AHP-based IoT identity resolution security evaluation model.



    加载中


    [1] P. Q. Wang, H. Luo, Y. Sun, Mapping model of multi-identifiers oriented to Internet of Things, Sci. China Inform. Sci., 43 (2013), 1244-1264.
    [2] Y. J. Xia, W. Z. Chen, X. J. Liu, L. M. Zhang, X. L. Li, Y. Xiang, Adaptive multimedia data forwarding for privacy preservation in vehicular ad-hoc networks, IEEE Trans. Intell. Transp. Syst., 99 (2017), 1-13.
    [3] China Academy of Information and Communications Technology, White Paper on Internet of Things, 2018.
    [4] Y. Z. Ren, R. C. Xie, S. Q. Zeng, H. R. Zhao, J. Y. Yu, R. Huo, et al., Survey of identity resolution system in industrial Internet of things, J. Commun., 40 (2019), 138-155.
    [5] EPCglobal, The EPCglobal architecture framework, The EPCglobal Standards Development Process, 2007.
    [6] ISO/IEC, Information technology-open systems interconnection-part1: Object identifier resolution system, ISO/IEC29168-1, 2011.
    [7] ISO/IEC, Information technology-open systems interconnection-part2: Object identifier resolution system, ISO/IEC29168-2, 2011.
    [8] National Standardization Administration of China, Identification system for Internet of things-Ecode resolution specification, GB/T 36605-2018, 2018.
    [9] Mark Allman, Comments on DNS robustness, ACM, Proceedings of the Internet Measurement Conference 2018, (IMC 2018), 84-90.
    [10] K. Chetioui, G. Orhanou, S. Hajji, New protocol E-DNSSEC to enhance DNSSEC security, Int. J. Net. Secur., 20 (2018), 19-24.
    [11] S. Sun, S. Reilly, L. Lannom, Handle system namespace and service definition, RFC 3651, IETF, 2003.
    [12] UID Center, Ubiquitous code, ucode, 2009.
    [13] C. Grothoff, M. Wachs, M. Ermert, J. Appelbaum, Toward secure name resolution on the internet, Comput. Secur., 77 (2018), 694-708. doi: 10.1016/j.cose.2018.01.018
    [14] G. B. He, W. Su, S. Gao, J. R. Yue, TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchain, Future Gener. Comput. Syst., 102 (2020), 912-924. doi: 10.1016/j.future.2019.09.003
    [15] T. Takayanag, Y. Kurose, T. Harada, Hierarchical task planning from object goal state for human-assist robot, 2019 IEEE 15th International Conference on Automation Service and Engineering, (2019), 1359-1366.
    [16] A. S. Konoplev, A. G. Busygin, D. P. Zegahda, A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 52 (2018), 1017-1021. doi: 10.3103/S0146411618080175
    [17] A. Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder, Bitcoin and cryptocurrency technologies: A comprehensive introduction, Princeton University Press, 2016.
    [18] X. Q. Li, P. Jiang, T. Chen, X. P. Luo, Q. Y. Wen, A survey on the security of blockchain systems, Future Gener. Comput. Syst., 107 (2020), 841-853. doi: 10.1016/j.future.2017.08.020
    [19] Handshake project[EB/OL], https://www.handshake.org, Access time: 2020-02-14.
    [20] E. Karaarslan, E. Adiguzel, Blockchain based DNS and PKI solutions, IEEE Commun. Standards Mag., 2 (2018), 52-57. doi: 10.1109/MCOMSTD.2018.1800023
    [21] A. Sheikh, V. Kamuni, A. Urooj, S. Wagh, N. Singh, D. Patel, Secured energy trading using Byzantine-based blockchain consensus, IEEE Access, 8 (2020), 8554-8571. doi: 10.1109/ACCESS.2019.2963325
    [22] C. Patsakis, F. Casino, Hydras and IPFS: a decentralized playground for malware, Int. J. Inform. Secur., 18 (2019), 787-799. doi: 10.1007/s10207-019-00443-0
    [23] W. Pedrycz, M. Song, Analytic hierarchy process (AHP) in group decision making and its optimization with an allocation of information granularity, IEEE Trans. Fuzzy Syst., 19 (2011), 527-539. doi: 10.1109/TFUZZ.2011.2116029
    [24] U. Dayanaddan, V. Kalimuthu, Software architectural quality assessment model for security analysis using fuzzy analytical hierarchy process (FAHP) method, 3D Res., 9 (2018), 1-10. doi: 10.1007/s13319-017-0152-9
    [25] L. Fang, P. Witold, X. W. Liu, Flexibility degree of fuzzy numbers and its implication to a group-decision-making model, IEEE Trans. Cybern., 49 (2019), 4054-4065. doi: 10.1109/TCYB.2018.2853722
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2431) PDF downloads(86) Cited by(4)

Article outline

Figures and Tables

Figures(6)  /  Tables(3)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog