Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources
Table 1
Three attack modes.
No.
Types of attacks
Attacks
Defense mechanism
1
Additional attacks
The attacker generates blocks by creating false information
By verifying the output, false blocks are detected due to asymmetric encryption key management mechanism, which makes it difficult for the interference device nodes to use the unique private key and partial blind name identification algorithm
2
Distributed denial of service attacks
The attacker exploits multiple nodes
3
Links to attack
An attacker links multiple pieces of data together using the same 1D