Research Article

SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things

Table 2

Context source behavior rules’ table.

IndexFailed connection ratioFailed authentication ratioAbnormal message ratioDevice behavior

1LowLowLowGood
2LowHighLowMalicious
3LowLowHighDoubtful
4LowHighHighMalicious
5HighLowLowDoubtful
6HighHighLowMalicious
7HighLowHighMalicious
8HighHighHighMalicious