Chinese Journal on Internet of Things ›› 2022, Vol. 6 ›› Issue (4): 149-157.doi: 10.11959/j.issn.2096-3750.2022.00292

• Theory and Technology • Previous Articles     Next Articles

Research on trust measurement method for initial access of industrial internet edge terminals

Ya YU1,2, Yusun FU2,3,4   

  1. 1 Ningbo Artificial Intelligence Institute of Shanghai Jiao Tong University, Ningbo 315000, China
    2 School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
    3 Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai 200240, China
    4 Shanghai Engineering Research Center of Intelligent Control and Management, Shanghai 200240, China
  • Revised:2022-08-04 Online:2022-12-30 Published:2022-12-01
  • Supported by:
    The National Key Research and Development Program of China(2019YFB1705703);The Major Scientific and Technological Research Program of Ningbo(2021Z022)

Abstract:

The development of the discrete manufacturing shows a trend of intelligence, openness and collaboration.As a result, many heterogeneous devices are connected to the industrial internet, which brings serious challenges to the security.Therefore, it is particularly important to introduce trust management and trusted access to devices for trusted measurement.In order to more timely and accurately evaluate the trustworthiness of the edge terminal initially accessing the system, a trustworthiness measurement method based on the device vulnerability database was innovatively proposed.This method adopted the architecture of cloud-edge collaboration, established a device information database and a vulnerability database in the central cloud, and then calculated the terminal risk factor at the edge.Finally, the trust initialization of the access terminal was completed.The simulation results show that the method can well balance the efficiency and security of the system.

Key words: industrial internet, device access, security, trust management, trust measurement, vulnerability assessment

CLC Number: 

No Suggested Reading articles found!