Abstract
In the power grid environment, equipment certification is the key practice of zero trust security. Through the trust evaluation of equipment, the power grid environment can be effectively protected. This paper introduces identity authentication and behavior authentication to evaluate the security of devices from many aspects, and proposes a trust evaluation scheme based on code confusion for terminal devices. Through the identification and password technology and digital signature mechanism, the identity of terminal equipment is verified to prevent incomplete files caused by virus infection, Trojan horse/back door/man-made tampering, transmission failure and other reasons, and complete identity authentication. Through the improved trust evaluation model based on supervised learning to evaluate the effectiveness of code confusion, we can determine the ability of the code to resist malicious attacks, analyze whether the device will bring threatening behavior, indirectly verify the device behavior trust, and then prove the security of the terminal or software to complete behavior authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Thakur, K., Qiu, M., Gai, K., Ali, M.: An investigation on cyber security threats and security models. In: IEEE CSCloud (2015)
Gai, K., Qiu, M., Sun, X., Zhao, H.: Security and privacy issues: a survey on FinTech. In: Qiu, M. (ed.) SmartCom 2016. LNCS, vol. 10135, pp. 236–247. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-52015-5_24
Zhang, Z., Wu, J., et al.: Jamming ACK attack to wireless networks and a mitigation approach. In: IEEE GLOBECOM Conference, pp. 1–5 (2008)
Qiu, H., Qiu, M., Memmi, G., Ming, Z., Liu, M.: A dynamic scalable blockchain based communication architecture for IoT. In: Qiu, M. (ed.) SmartBlock 2018. LNCS, vol. 11373, pp. 159–166. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05764-0_17
Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigDataSecurity (2016)
Qiu, H., Qiu, M., Lu, Z.: Selective encryption on ECG data in body sensor network based on supervised machine learning. Inf. Fusion 55, 59–67 (2020)
Qiu, M., Liu, J., et al.: A novel energy-aware fault tolerance mechanism for wireless sensor networks. In: IEEE/ACM Conference on Green Computing and Communications (2011)
Qiu, L., Gai, K., Qiu, M.: Optimal big data sharing approach for tele-health in cloud computing. In: IEEE SmartCloud, pp. 184–189 (2016)
Martinelli, F., Mercaldo, F., Nardone, V., et al.: Evaluating model checking for cyber threats code obfuscation identification. J. Parallel Dist. Comput. 119, 203–218 (2018)
Cho, T., Kim, H., Yi, J.H.: Security assessment of code obfuscation based on dynamic monitoring in android things. IEEE Access 5, 6361–6371 (2017)
Zhao, B., Xiao, C., Zhang, Y., et al.: Assessment of recommendation trust for access control in open networks. Clust. Comput. 22(1), 565–571 (2019)
Chrysikos, A., McGuire, S.: A predictive model for risk and trust assessment in cloud computing: taxonomy and analysis for attack pattern detection. In: Parkinson, S., Crampton, A., Hill, R. (eds.) Guide to Vulnerability Analysis for Computer Networks and Systems. Computer Communications and Networks, pp. 81–99. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-92624-7_4
Rose, S.W., Borchert, O., Mitchell, S., Connelly, S.: Zero trust architecture (2020)
Samaniego, M., Deters, R.: Zero-trust hierarchical management in IoT. In: 2018 IEEE International Congress on Internet of Things (ICIOT), pp. 88–95. IEEE (2018)
Tan, F.: Research on continuous identity authentication based on user behavior. Chongqing University of Posts and Telecommunications(2019)
Zhao, Y., Tang, Z., Wang, N., Fang, D.Y., Yuan-Xiang, G.U.: Evaluation of code obfuscating transformation. J. Softw. 23(3), 700–711 (2012)
Qing, S., Lin, Z., Lin, Z., Huang, J.: Code obfuscation effectiveness assessment model based on nonlinear fuzzy matrices. Comput. Sci. 46(4), 197–202 (2019)
Chen, Z., Tian, L., Lin, C.: Trust evaluation model of cloud user based on behavior data. Int. J. Distrib. Sens. Netw. 14(5), 1550147718776924 (2018)
Liu, Y., Gong, X., Feng, Y.: Trust system based on node behavior detection in internet of things. J. Commun. 35(05), 8–15 (2014)
Jiang, W., Wang, Y., Jiang, Y., et al.: Research on mobile Internet mobile agent system dynamic trust model for cloud computing. China Commun. 16(7), 174–194 (2019)
Shi, L., Chen, N., Zhang, J.: Research on access trust technology of big data platform based on dynamic and continuous authentication of identity. Cyberspace Security 10(7), 12 (2020)
Wang, T., et al.: Mobile edge-enabled trust evaluation for the internet of things. Inf. Fusion 75, 90–100 (2021)
Aagaard, M., AlTawy, R., Gong, G.: ACE: An authenticated encryption and hash algorithm. Submission to NIST-LWC, p. 8 (2019)
Chen, T., He, T., Benesty, M.: Xgboost: extreme gradient boosting. R Package Version 0.4-2 1(4), 1–4 (2015)
Wang, J., Wang, H., Zhang H.: Trust and attribute-based dynamic access control model for internet of things, pp. 342–345. IEEE (2017)
Misra, I., Maaten, L.: Self-supervised learning of pretext-invariant representations. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 6707–6717 (2020)
Acknowledgment
This work is supported by the science and technology project of State Grid Corporation of China Funding Item: “Research on Dynamic Access Authentication and Trust Evaluation Technology of Power Mobile Internet Services Based on Zero Trust” (Grand No. 5700-202158183A-0-0-00) .
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Chen, L., Dai, Z., Li, N., Li, Y. (2022). Trust Evaluation Method Based on the Degree of Code Obfuscation. In: Qiu, M., Gai, K., Qiu, H. (eds) Smart Computing and Communication. SmartCom 2021. Lecture Notes in Computer Science, vol 13202. Springer, Cham. https://doi.org/10.1007/978-3-030-97774-0_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-97774-0_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-97773-3
Online ISBN: 978-3-030-97774-0
eBook Packages: Computer ScienceComputer Science (R0)