The Study of Genetic Type Steganographic Models to Increase Noise Immunity of IoT Systems

Author(s):  
Dmitry S. Zaichenko ◽  
Irina S. Sineva

Research and development in the field of the Internet of Things, or more generally M2M systems security, is the subject of daily discussion in the ICT market. With the rapid development of intelligent devices, the necessity of valuable information protection has generated many new methods and technologies. Stegoimages, along with genetic algorithms (GA), are a relatively new object in the field of information hiding. The assumption that their application can significantly improve the noise-resistant properties of stegofiles is justified by the properties of the GA, but it is a subject for detailed study, since in such an application the GA has not yet been considered. The proposed method is based on genetic coding that hides messages between Internet of Things devices and is capable of detecting both internal and external attacks in the intellectual infrastructure. A sufficiently high efficiency of preliminary GA coding is shown for objects such as hiding graphic information in a graphic stegocontainer.

Author(s):  
Dmitry S. Zaichenko ◽  
Irina S. Sineva

Research and development in the field of the Internet of Things, or more generally M2M systems security, is the subject of daily discussion in the ICT market. With the rapid development of intelligent devices, the necessity of valuable information protection has generated many new methods and technologies. Stegoimages, along with genetic algorithms (GA), are a relatively new object in the field of information hiding. The assumption that their application can significantly improve the noise-resistant properties of stegofiles is justified by the properties of the GA, but it is a subject for detailed study, since in such an application the GA has not yet been considered. The proposed method is based on genetic coding that hides messages between Internet of Things devices and is capable of detecting both internal and external attacks in the intellectual infrastructure. A sufficiently high efficiency of preliminary GA coding is shown for objects such as hiding graphic information in a graphic stegocontainer.


Biotechnology ◽  
2019 ◽  
pp. 1967-1984
Author(s):  
Dharmendra Trikamlal Patel

Voluminous data are being generated by various means. The Internet of Things (IoT) has emerged recently to group all manmade artificial things around us. Due to intelligent devices, the annual growth of data generation has increased rapidly, and it is expected that by 2020, it will reach more than 40 trillion GB. Data generated through devices are in unstructured form. Traditional techniques of descriptive and predictive analysis are not enough for that. Big Data Analytics have emerged to perform descriptive and predictive analysis on such voluminous data. This chapter first deals with the introduction to Big Data Analytics. Big Data Analytics is very essential in Bioinformatics field as the size of human genome sometimes reaches 200 GB. The chapter next deals with different types of big data in Bioinformatics. The chapter describes several problems and challenges based on big data in Bioinformatics. Finally, the chapter deals with techniques of Big Data Analytics in the Bioinformatics field.


2012 ◽  
Vol 452-453 ◽  
pp. 932-936
Author(s):  
Xiang Dong Hu ◽  
Peng Qin Yu

With the rapid development of ubiquitous network and its applications, the key technologies of the Internet of things are actively researched all over the world. The Internet of things has tremendous attraction for adversaries, and it is easily attacked due to poor resource and non-perfect distribution of sensor nodes, then false data maybe be injected into network. Security is one of the most important demands for applications in the Internet of things, an algorithm of malicious nodes detection is proposed to protect the network from destruction based on weighted confidence filter, namely, the cluster heads take charge of collecting messages from nodes and computing their average of confidence in cluster-based network, then they aggregate data from nodes with higher confidence than average and ignore the others, they update confidence of each node by comparing the aggregation value and the received data, and regard it as the weight of exactness of message from node. A sensor node is judged to be a malicious one if its weight is lower than the set threshold. The simulation results show that the algorithm can detect malicious nodes with high detection ratio, low false alarm ratio and outstanding scalability.


2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Sun-Young Ihm ◽  
Aziz Nasridinov ◽  
Young-Ho Park

A rapid development in wireless communication and radio frequency technology has enabled the Internet of Things (IoT) to enter every aspect of our life. However, as more and more sensors get connected to the Internet, they generate huge amounts of data. Thus, widespread deployment of IoT requires development of solutions for analyzing the potentially huge amounts of data they generate. A top-kquery processing can be applied to facilitate this task. The top-kqueries retrievektuples with the lowest or the highest scores among all of the tuples in the database. There are many methods to answer top-kqueries, where skyline methods are efficient when considering all attribute values of tuples. The representative skyline methods are soft-filter-skyline (SFS) algorithm, angle-based space partitioning (ABSP), and plane-project-parallel-skyline (PPPS). Among them, PPPS improves ABSP by partitioning data space into a number of spaces using hyperplane projection. However, PPPS has a high index building time in high-dimensional databases. In this paper, we propose a new skyline method (called Grid-PPPS) for efficiently handling top-kqueries in IoT applications. The proposed method first performs grid-based partitioning on data space and then partitions it once again using hyperplane projection. Experimental results show that our method improves the index building time compared to the existing state-of-the-art methods.


2013 ◽  
Vol 718-720 ◽  
pp. 2390-2400
Author(s):  
Li Jun Zhao ◽  
Fei Zhou Zhang ◽  
Han Xian He

With the rapid development of science and technology, the concept of smart grid is proposed and continuously developed. Its inevitable to apply the current technology of Internet of Things (IOT) to Smart Grid, to make peoples access to power resources more intelligent, convenient. Considering on the actual situation, this paper starts from the smart grid concept, then makes an illustration on the relationship between the Internet of Things and Smart Grid, and detailed application analysis on seven actual cases about Things Networkings using on the Smart Grid, at last the elaboration of the development prospects and the importance of the combination of IOT and Smart Grid.


2012 ◽  
Vol 263-266 ◽  
pp. 3125-3129
Author(s):  
Li Ping Du ◽  
Ying Li ◽  
Guan Ning Xu ◽  
Fei Duan

The rapid development of internet of things puts forward urgent needs for security. The security system must be studied to adapt to the characteristics of the internet of things. The micro- certificate based security system for internet of things takes full account of the security characteristics of things, and uses the symmetric cryptographic algorithms and security chip technology. This security system can meet the security requirements for large-scale sensor’s authentication, signification and encryption/decryption in internet of things, and improve the security performance of internet of things greatly.


2021 ◽  
Vol 12 (36) ◽  
pp. 11936-11954
Author(s):  
Kai-Li Wang ◽  
Yu-Hang Zhou ◽  
Yan-Hui Lou ◽  
Zhao-Kui Wang

With the rapid development of the Internet of Things (IoTs), photovoltaics (PVs) has a vast market supply gap of billion dollars.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Jie Du

As the economy grows rapidly and IoT technology advances rapidly, the logistics industry as a service industry is growing rapidly around the world. The logistics industry, meanwhile, is the one that can best play the role of IoT. The rapid development of the logistics industry has brought great competition challenges to the logistics industry. To solve the competitive problems of the logistics industry cluster, this article introduces the research on the upgrade path and strategy of the logistics industry cluster based on the Internet of Things and uses the analytic hierarchy process, investigation method, and expert evaluation method to build the IoT technology information model and logistics cost. According to the established optimization model, the following are proposed: analyzing the problems existing in the logistics industry cluster, giving an upgrade path from the four aspects of manufacturing, technology, structure, and service, and giving specific strategic suggestions from the aspects of talents and enterprises. The accuracy rate of current analysis is as high as 90%, and the implementation rate of upgrade paths and strategy recommendations is as high as 95%.


2021 ◽  
Vol 6 (3) ◽  
pp. 33-39
Author(s):  
Oleg O. Viushchenko ◽  
◽  
Maria A. Maslova ◽  

The rapid development of the Internet of Things (IoT) and its capabilities in terms of services have made it one of the fastest-growing technologies that have a huge impact on both social life and the business environment of a person. The widespread adoption of connected devices in the IoT has created a huge demand for reliable security in response to the growing demand of billions of connected devices and services around the world. But at the same time, the number of threats continues to grow every day, and attacks are increasing both in number and complexity. The number of attackers is also growing, and the tools they use are constantly being improved and becoming more effective. Therefore, it is necessary to constantly protect against threats and vulnerabilities for IoT. In this article, we will analyze the development of IoT, consider existing threats, attacks on IoT, as well as methods of protecting devices from threats and vulnerabilities for IoT.


Sign in / Sign up

Export Citation Format

Share Document