Research Article
SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things
Table 2
Context source behavior rules’ table.
| Index | Failed connection ratio | Failed authentication ratio | Abnormal message ratio | Device behavior |
| 1 | Low | Low | Low | Good | 2 | Low | High | Low | Malicious | 3 | Low | Low | High | Doubtful | 4 | Low | High | High | Malicious | 5 | High | Low | Low | Doubtful | 6 | High | High | Low | Malicious | 7 | High | Low | High | Malicious | 8 | High | High | High | Malicious |
|
|