Research Article

Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources

Table 1

Three attack modes.

No.Types of attacksAttacksDefense mechanism

1Additional attacksThe attacker generates blocks by creating false informationBy verifying the output, false blocks are detected due to asymmetric encryption key management mechanism, which makes it difficult for the interference device nodes to use the unique private key and partial blind name identification algorithm
2Distributed denial of service attacksThe attacker exploits multiple nodes
3Links to attackAn attacker links multiple pieces of data together using the same 1D