Research Article
A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things
Table 2
Output decisions for two analyses in the same elastic slide window.
| Elastic slide window | Output | Read 1 | Read 2 | Thing | ESW size | Class | High | Low | Class | High | Low |
| x | x | | x | x | | Trusted | Decrease | x | x | | x | | x | Trusted | Increase | x | | x | x | x | | Trusted | Decrease | x | | x | x | | x | Trusted | Increase | x | x | | | x | | Attacker | Decrease | x | x | | | | x | Attacker | Increase | x | | x | | x | | Attacker | Decrease | x | | x | | | x | Attacker | Increase | | x | | x | x | | Attacker | Decrease | | x | | x | | x | Attacker | Increase | | | x | x | x | | Attacker | Decrease | | | x | x | | x | Attacker | Increase | | x | | | x | | Broken | Decrease | | x | | | | x | Broken | Increase | | | x | | x | | Broken | Decrease | | | x | | | x | Broken | Increase |
|
|