Back to Search
Start Over
DC-LTM: A Data Collection Strategy Based on Layered Trust Mechanism for IoT
- Source :
- Wireless Communications and Mobile Computing, Vol 2021 (2021)
- Publication Year :
- 2021
- Publisher :
- Hindawi Limited, 2021.
-
Abstract
- A large number of Internet of Things (IoT) devices such as sensor nodes are deployed in various urban infrastructures to monitor surrounding information. However, it is still a challenging issue to collect data in a low-cost, high-quality, and reliable manner through IoT technique. Although the recruitment of mobile vehicles (MVs) to collect urban data has proved to be an effective method, most existing data collection systems lack a trust detection mechanism for malicious terminal nodes and malicious vehicles, which should lead to security vulnerabilities in practice. This paper proposes a novel data collection strategy based on a layered trust mechanism (DC-LTM). The strategy recruits MVs as data collectors of the sensor nodes based on the data value in the city, evaluates the trustworthiness of the data reported by the nodes, and records the results to the cloud data center. Furthermore, in order to make the data collection system more efficient and trust mechanism more reliable, we introduce unmanned aerial vehicles (UAVs) dispatched by data centers to actively verify the core sensor node data and use the core sensor data as baseline data to evaluate the credibility of the vehicles and the trust value of the whole network sensor nodes. Different from the previous strategies, UAVs adopts the DC-LTM method to obtain the node data while actively obtaining the trust value of MVs and nodes, which effectively improves the quality of data acquisition. Simulation results show that the mechanism effectively distinguishes malicious vehicles that provide false data in exchange for payment and reduces the total cost of system recruitment payments. At the same time, the proposed incentive mechanism encourages vehicle to complete the evaluation task and improves the accuracy of node trust evaluation. The recognition rates of false data attacks and flooding attacks as well as the recognition error rate of normal nodes are 100%, 98.9%, and 3.9%, respectively, which improves the quality of system data collection as a whole.
- Subjects :
- Technology
Data collection
Article Subject
Computer Networks and Communications
business.industry
Computer science
Word error rate
Cloud computing
TK5101-6720
Flooding (computer networking)
Data acquisition
Sensor node
Node (computer science)
Telecommunication
Data center
Electrical and Electronic Engineering
business
Information Systems
Computer network
Subjects
Details
- ISSN :
- 15308677 and 15308669
- Volume :
- 2021
- Database :
- OpenAIRE
- Journal :
- Wireless Communications and Mobile Computing
- Accession number :
- edsair.doi.dedup.....2693a040db9e7788b4057910d30a01d4