scholarly journals Security of the Internet of Things Based on Game Algorithm

2018 ◽  
Vol 14 (08) ◽  
pp. 80
Author(s):  
Yi Yue-e

To explore the security mechanism of the Internet of Things (IoT) perception environment, we perform a security research on the IoT on the basis of game algorithm. The dynamic game method of node cooperation is used in the experiments. Firstly, multiple report nodes are merged into a game party, and the dynamic game for two parties is established with the detection node. In the environment where the malicious nodes are dominant, the detection nodes collaborate, and the state of the unknown nodes is conjectured by the reputation value of the reporting nodes. The high trust reference report is used for the modification and reduction the weight of malicious nodes in the overall report, for node merging, and finally for bias equilibrium. The results show that cooperative game can significantly improve the success rate of incident monitoring and reduce the number of forged reports.

2012 ◽  
Vol 452-453 ◽  
pp. 932-936
Author(s):  
Xiang Dong Hu ◽  
Peng Qin Yu

With the rapid development of ubiquitous network and its applications, the key technologies of the Internet of things are actively researched all over the world. The Internet of things has tremendous attraction for adversaries, and it is easily attacked due to poor resource and non-perfect distribution of sensor nodes, then false data maybe be injected into network. Security is one of the most important demands for applications in the Internet of things, an algorithm of malicious nodes detection is proposed to protect the network from destruction based on weighted confidence filter, namely, the cluster heads take charge of collecting messages from nodes and computing their average of confidence in cluster-based network, then they aggregate data from nodes with higher confidence than average and ignore the others, they update confidence of each node by comparing the aggregation value and the received data, and regard it as the weight of exactness of message from node. A sensor node is judged to be a malicious one if its weight is lower than the set threshold. The simulation results show that the algorithm can detect malicious nodes with high detection ratio, low false alarm ratio and outstanding scalability.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1213 ◽  
Author(s):  
Qiao Tian ◽  
Yun Lin ◽  
Xinghao Guo ◽  
Jin Wang ◽  
Osama AlFarraj ◽  
...  

With the continuous development of science and engineering technology, our society has entered the era of the mobile Internet of Things (MIoT). MIoT refers to the combination of advanced manufacturing technologies with the Internet of Things (IoT) to create a flexible digital manufacturing ecosystem. The wireless communication technology in the Internet of Things is a bridge between mobile devices. Therefore, the introduction of machine learning (ML) algorithms into MIoT wireless communication has become a research direction of concern. However, the traditional key-based wireless communication method demonstrates security problems and cannot meet the security requirements of the MIoT. Based on the research on the communication of the physical layer and the support vector data description (SVDD) algorithm, this paper establishes a radio frequency fingerprint (RFF or RF fingerprint) authentication model for a communication device. The communication device in the MIoT is accurately and efficiently identified by extracting the radio frequency fingerprint of the communication signal. In the simulation experiment, this paper introduces the neighborhood component analysis (NCA) method and the SVDD method to establish a communication device authentication model. At a signal-to-noise ratio (SNR) of 15 dB, the authentic devices authentication success rate (ASR) and the rogue devices detection success rate (RSR) are both 90%.


Author(s):  
Nabil Djedjig ◽  
Djamel Tandjaoui ◽  
Imed Romdhani ◽  
Faiza Medjek

The internet of things (IoT) is a new paradigm where users, objects, and any things are interconnected using wired and wireless technology such as RFID, ZigBee, WSN, NFC, Bluetooth, GPRS, and LTE. In this last decade, the IoT concept has attracted significant attention from both industrial and research communities. Many application domains may have significant benefits with IoT systems. These domains range from home automation, environmental monitoring, healthcare, to logistic and smart grid. Nevertheless, the IoT is facing many security issues such as authentication, key management, identification, availability, privacy, and trust management. Indeed, establishing trust relationships between nodes in IoT represents a primary security milestone to have reliable systems that exclude malicious nodes. However, trust management in an IoT constrained and ubiquitous environment represents a real challenge. This chapter presents an overview of trust management in IoT. This overview explains and demonstrates the usefulness of trust management and how it should be exploited in IoT.


2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


2019 ◽  
pp. 4-44 ◽  
Author(s):  
Peter Thorns

This paper discusses the organisations involved in the development of application standards, European regulations and best practice guides, their scope of work and internal structures. It considers their respective visions for the requirements for future standardisation work and considers in more detail those areas where these overlap, namely human centric or integrative lighting, connectivity and the Internet of Things, inclusivity and sustainability.


2019 ◽  
Vol 14 (5) ◽  
pp. 375
Author(s):  
Vladimir P. Zhalnin ◽  
Anna S. Zakharova ◽  
Demid A. Uzenkov ◽  
Andrey I. Vlasov ◽  
Alexey I. Krivoshein ◽  
...  

2017 ◽  
Vol 10 ◽  
pp. 120-124
Author(s):  
R.S. Khisamov ◽  
◽  
R.A. Gabdrahmanov ◽  
A.P. Bespalov ◽  
V.V. Zubarev ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document