IOT security privacy protection mechanism and mechanical structure design simulation optimization

EURASIP Journal on Advances in Signal Processing - Tập 2021 - Trang 1-14 - 2021
Caiping Guo1, Daqing Li2
1School of Mechanical and Electrical Engineering, Jiaozuo University, Jiaozuo, China
2School of Mechanical Engineering, Henan Institute of Engineering, Zhengzhou, China

Tóm tắt

Once the Internet of Things was proposed, it has received great attention from all walks of life and has become one of the top ten technologies that change the world. Therefore, more and more people are engaged in the research of the Internet of Things, after the unremitting efforts of all seniors. Now the Internet of Things has been applied to every aspect of our lives. However, in the application process of the Internet of Things, the protection of personal privacy will undoubtedly be involved. If this problem is not effectively resolved, it will become a major obstacle to the development of the Internet of Things. At present, the research of fully homomorphic technology has attracted great attention from the cryptography community. You can directly calculate the encrypted text encryption to obtain the output and decrypt the output. The result is the same as the output of the unencrypted plain text. This article first comprehensively describes the solution to the privacy protection problem in the existing Internet of Things, and then proposes to apply the fully homomorphic technology to the Internet of Things to make the services provided by the network more secure. Through the analysis of the basic composition and architecture of the existing Internet of Things system, a privacy protection interaction model for the Internet of Things is established, which uses a completely homomorphic technology. On this basis, the algorithm for implementing simple homomorphic encryption is improved, and general homomorphic encryption theory is proposed for some security issues. After using this method to encrypt privacy, the success rate of cracking dropped by 24%.

Tài liệu tham khảo

M.E. Khanouche, Y. Amirat, A. Chibani, et al., Energy-centered and QoS-aware services selection for Internet of Things. IEEE Transact Automat Eng 13(3), 1256–1269 (2016) S. Mayer, J. Hodges, D. Yu, et al., An Open Semantic Framework for the Industrial Internet of Things. IEEE Intell Syst 32(1), 96–101 (2017) H. Sun, X. Wang, R. Buyya, et al., CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices. Softw Pract Exp 47(3), 421–441 (2017) S.H.A.H.R. Chandra, W.A.N.G. Yafeng, Cloud Things Construction - the integration of Internet of things and cloud computing. Future Generation Comput Syst 56(C), 684–700 (2016) C. Chang, S.N. Srirama, R. Buyya, Mobile cloud business process management system for the internet of things: a survey. Acm Comput Surv 49(4), 1–42 (2016) M.D. Giudice, Discovering the Internet of Things (IoT) within the business process management. Bus Process Manage J 22(2), 263–270 (2016) M. Zhou, Y. Wang, Y. Liu, Z. Tian, An information-theoretic view of WLAN localization error bound in GPS-denied environment. IEEE Transact Vehicular Technol 68(4), 4089–4093 (2019) G. Yang, Q. Zhang, Y.-C. Liang, Cooperative ambient backscatter communications for green Internet-of-Things. IEEE Internet Things J 5(2), 1116–1130 (2018) R. Rajiv, R. Omer, N. Surya, et al., The next grand challenges: integrating the Internet of Things and data science. IEEE Cloud Comput 5(3), 12–26 (2018) J.C. Balda, A. Mantooth, R. Blum, et al., Cybersecurity and power electronics: addressing the security vulnerabilities of the Internet of Things. IEEE Pow Electron Mag 4(4), 37–43 (2017) M. Wolf, D. Serpanos, Safety and security in cyber-physical systems and Internet-of-Things systems. Proceed IEEE 106(1), 9–20 (2017) A. Tzounis, N. Katsoulas, T. Bartzanas, et al., Internet of Things in agriculture, recent advances and future challenges. Biosyst Eng 164, 31–48 (2017) G. Kecskemeti, G. Casale, D.N. Jha, et al., Modelling and simulation challenges in Internet of Things. IEEE Cloud Comput 4(1), 62–69 (2017) P.P. Jayaraman, X. Yang, A. Yavari, et al., Privacy preserving Internet of Things: from privacy techniques to a blueprint architecture and efficient implementation. Future Generation Comput Syst 76(Nov.), 540–549 (2017) C. Chang, S.N. Srirama, R. Buyya, Indie fog: an efficient fog-computing infrastructure for the Internet of Things. Computer 50(9), 92–98 (2017) N. Abuzainab, W. Saad, C.S. Hong, et al., Cognitive hierarchy theory for distributed resource allocation in the Internet of Things. IEEE Transact Wireless Commun 16(12), 7687–7702 (2017) I. Azimi, A.M. Rahmani, P. Liljeberg, et al., Internet of things for remote elderly monitoring: a study from user-centered perspective. J Ambient Intell Humanized Comput 8(2), 273–289 (2017) C. Aranzazu-Suescun, M. Cardei, Distributed algorithms for event reporting in mobile-sink WSNs for Internet of Things. Tsinghua ence Technol 22(4), 413–426 (2017) M. Zhou, Y. Li, M.J. Tahir, X. Geng, Y. Wang, W. He, Integrated statistical test of signal distributions and access point contributions for Wi-Fi indoor localization. IEEE Transact Vehicular Technol (2021). https://doi.org/10.1109/TVT.2021.3076269 I. Yaqoob, E. Ahmed, M.H.U. Rehman, et al., The rise of ransomware and emerging security challenges in the Internet of Things. Comput Netw 129P2(DEC.24);129:444–458 (2017). https://doi.org/10.1016/j.comnet.2017.09.003 X. Lin, J. Bergman, F. Gunnarsson, et al., Positioning for the Internet of Things: a 3GPP perspective. IEEE Commun Mag 55(12), 179–185 (2017) Z. Ling, J. Luo, Y. Xu, et al., Security vulnerabilities of Internet of Things: a case study of the Smart Plug System. IEEE Internet Things J 4(6), 1899–1909 (2017) A. Rizzardi, S. Sicari, D. Miorandi, et al., AUPS: an Open Source AUthenticated Publish/Subscribe system for the Internet of Things. Inf Syst 62(dec.), 29–41 (2016) J. Yu, M. Kim, H.C. Bang, et al., IoT as an applications: cloud-based building management systems for the internet of things. Multimedia Tools Appl 75(22), 14583–14596 (2016) O. Iova, P. Picco, T. Istomin, et al., RPL, the Routing Standard for the Internet of Things. Or Is It? IEEE Commun Mag 54(12), 16–22 (2016) T. Xu, I. Darwazeh, Non-orthogonal narrowband Internet of Things: a design for saving bandwidth and doubling the number of connected devices. IEEE Internet Things J 5(3), 2120–2129 (2018) V.H. Le, J. Den Hartog, N. Zannone, Security and privacy for innovative automotive applications: a survey. Comput Commun 132(NOV.), 17–41 (2018) L. Li, G. Ren, Y. Liu, et al., Secure DHCPv6 mechanism for DHCPv6 security and privacy protection. Tsinghua ence Technol 23(001), 13–21 (2018) Z.P. Zhang, M. Fu, X.Y. Feng, A lightweight dynamic enforcement of privacy protection for android. J Comput Technol 34(4), 901–923 (2019) L. Hongwei, L. Rongxing, M. Jelena, et al., Security and privacy of connected vehicular cloud computing. IEEE Netw 32(3), 4–6 (2018) N. Kaaniche, M. Laurent, Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput Commun 111(oct.1), 120–141 (2017)