دانلود رایگان مقاله انگلیسی فناوری تأیید امنیت بر اساس شبکه بیزی دینامیکی در اینترنت اشیا - اشپرینگر 2018

عنوان فارسی
فناوری تأیید امنیت بر اساس شبکه بیزی دینامیکی در اینترنت اشیا
عنوان انگلیسی
Security authentication technology based on dynamic Bayesian network in Internet of Things
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
8
سال انتشار
2018
نشریه
اشپرینگر - Springer
فرمت مقاله انگلیسی
PDF
نوع مقاله
ISI
نوع نگارش
مقالات اصلی
رفرنس
دارد
پایگاه
اسکوپوس
کد محصول
E8927
رشته های مرتبط با این مقاله
مهندسی کامپیوتر، فناوری اطلاعات
گرایش های مرتبط با این مقاله
هوش مصنوعی، شبکه های کامپیوتری، اینترنت و شبکه های گسترده
مجله
مجله هوش مصنوعی و محاسبات انسانی - Journal of Ambient Intelligence and Humanized Computing
دانشگاه
Hunan University - Changsha - Hunan - China
کلمات کلیدی
اینترنت اشیا، شبکه بیزی دینامیکی، تأیید امنیت، انتقال اعتمادی، کلید عمومی ترکیبی، تبادل اطلاعات امنیتی
doi یا شناسه دیجیتال
https://doi.org/10.1007/s12652-018-0949-2
چکیده

Abstract


With the rapid development of the Internet of Things (IoT) technology in the information society, how to meet the urgent requirements of current users for trusted transmission services is a research hot-spots in the field of the IoT industry. In view of the research status on security authentication in IoT, a security authentication technology based on dynamic Bayesian network combined with trusted protocol is proposed in this paper. Through the introduction of the trusted measurement and the combined public key-based security authentication mechanism in the network, it enhances the security information exchange and considers the node credibility and the path reliability in the routing decision so as to choose a high secure and trusted path for information transmission in IoT. The evaluation results showed that our algorithm achieves a much better security performance than comparison algorithms in overhead and computational complexity for real time applications. In addition, our algorithm has also an adaptive capability and can quickly react to the denial of the service attack, which effectively suppress the threat of abnormal entity in the IoT.

نتیجه گیری

5 Conclusion


Aiming at the insecure network environment, a secure link state routing protocol based on the node trusted measurement is proposed in this paper. Through the introduction of a trusted mechanism in the network, our algorithm considers the node trusted measurement and path trusted measurement during route calculation in an integrated manner, and the CPK-based security authentication technology is adopted to enhance the security of the protocol interaction. Simulation experiments show that our algorithm has a better timeliness and dynamic adaptive ability in the case of a denial of service attack, which lays a good foundation for the trusted network connection technology. The future work is to optimize our algorithm and further study the routing jitter problem of the secure link state routing protocol under continuous attack.


بدون دیدگاه