Security threat model under internet of things using deep learning and edge analysis of cyberspace governance

被引:3
|
作者
Li, Zhi [1 ]
Ge, Yuemeng [2 ]
Guo, Jieying [1 ]
Chen, Mengyao [1 ]
Wang, Junwei [1 ]
机构
[1] NingboTech Univ, Sch Media & Law, Ningbo, Peoples R China
[2] City Univ Macau, Fac Int Tourism & Management, Taipa, Macao, Peoples R China
关键词
Deep learning; Internet of Things; Security threat model; Cyberspace governance; Edge computing; AUTHENTICATION PROTOCOL; NETWORKS; ATTACKS;
D O I
10.1007/s13198-021-01533-w
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Under the background of information age, it is essential to cope with network security problems, ensure the popularization of Internet of Things (IoT) technology based on the Internet, and guarantee the information security, life security, and property security of all countries and individuals. Therefore, the principle and advantages of deep learning (DL) technology is expounded first, and then an IoT security threat model is established combined with edge computing (EC) technology. Additionally, the traditional algorithm is improved to be adapted to the application environment of the current United Nations cyberspace governance actions, and is trained and optimized by data sets. Finally, a modification plan is formulated according to the actual test results. In the experiment, EC is used to establish an excellent IoT security threat model with an efficient and accurate algorithm. The result shows that DL technology and EC technology significantly improve the judgment ability of the IoT security threat model and promote the efficiency of network space governance. This model can inspire the application of emerging computer technology to the IoT network and cyberspace governance, guarantee the construction of global information interconnection, and provide a reference for future research.
引用
收藏
页码:1164 / 1176
页数:13
相关论文
共 50 条
  • [31] Edge QoE: Computation Offloading With Deep Reinforcement Learning for Internet of Things
    Lu, Haodong
    He, Xiaoming
    Du, Miao
    Ruan, Xiukai
    Sun, Yanfei
    Wang, Kun
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) : 9255 - 9265
  • [32] Toward Edge-Based Deep Learning in Industrial Internet of Things
    Liang, Fan
    Yu, Wei
    Liu, Xing
    Griffith, David
    Golmie, Nada
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 4329 - 4341
  • [33] A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
    Al-Garadi, Mohammed Ali
    Mohamed, Amr
    Al-Ali, Abdulla Khalid
    Du, Xiaojiang
    Ali, Ihsan
    Guizani, Mohsen
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1646 - 1685
  • [34] A CONCEPTUAL MODEL TO SUPPORT SECURITY ANALYSIS IN THE INTERNET OF THINGS
    Mavropoulos, Orestis
    Mouratidis, Haralambos
    Fish, Andrew
    Panaousis, Emmanouil
    Kalloniatis, Christos
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2017, 14 (02) : 557 - 578
  • [35] The Analysis of Deep Learning Recurrent Neural Network in English Grading Under the Internet of Things
    Li, Dandan
    Li, Wenling
    Zhao, Yanmei
    Liu, Xutao
    IEEE ACCESS, 2024, 12 : 44640 - 44647
  • [36] Analysis of high-level dance movements under deep learning and internet of things
    Shan Wang
    Shusheng Tong
    The Journal of Supercomputing, 2022, 78 : 14294 - 14316
  • [37] Analysis of high-level dance movements under deep learning and internet of things
    Wang, Shan
    Tong, Shusheng
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (12): : 14294 - 14316
  • [38] An Efficient and Hybrid Deep Learning-Driven Model to Enhance Security and Performance of Healthcare Internet of Things
    Babar, Muhammad
    Tariq, Muhammad Usman
    Qureshi, Basit
    Ullah, Zabeeh
    Arif, Fahim
    Khan, Zahid
    IEEE ACCESS, 2025, 13 : 22931 - 22945
  • [39] Deep reinforcement learning based mobile edge computing for intelligent Internet of Things
    Zhao, Rui
    Wang, Xinjie
    Xia, Junjuan
    Fan, Liseng
    PHYSICAL COMMUNICATION, 2020, 43
  • [40] Energy-saving service management technology of internet of things using edge computing and deep learning
    Defeng Li
    Mingming Lan
    Yuan Hu
    Complex & Intelligent Systems, 2022, 8 : 3867 - 3879