Security authentication technology based on dynamic Bayesian network in Internet of Things

被引:14
|
作者
Zhang, Qing [1 ,2 ]
Xu, Dilong [3 ]
机构
[1] Hunan Univ, Changsha 410006, Hunan, Peoples R China
[2] Hunan City Univ, Yiyang 413000, Hunan, Peoples R China
[3] Guangzhou Acad Social Sci, Guangzhou 510410, Guangdong, Peoples R China
关键词
Internet of Things; Dynamic Bayesian network; Security authentication; Trusted transmission; Combined public key; Security information exchange;
D O I
10.1007/s12652-018-0949-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of the Internet of Things (IoT) technology in the information society, how to meet the urgent requirements of current users for trusted transmission services is a research hot-spots in the field of the IoT industry. In view of the research status on security authentication in IoT, a security authentication technology based on dynamic Bayesian network combined with trusted protocol is proposed in this paper. Through the introduction of the trusted measurement and the combined public key-based security authentication mechanism in the network, it enhances the security information exchange and considers the node credibility and the path reliability in the routing decision so as to choose a high secure and trusted path for information transmission in IoT. The evaluation results showed that our algorithm achieves a much better security performance than comparison algorithms in overhead and computational complexity for real time applications. In addition, our algorithm has also an adaptive capability and can quickly react to the denial of the service attack, which effectively suppress the threat of abnormal entity in the IoT.
引用
收藏
页码:573 / 580
页数:8
相关论文
共 50 条
  • [31] Dual Access Authentication Mechanism in Mobile Internet of Things Security
    Shi, Zhi-Yong
    Han, Hui
    Yu, Gang
    Ying, Shi-Ping
    [J]. INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND AUTOMATION (ICCEA 2014), 2014, : 145 - 150
  • [32] Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
    Ndibanje, Bruce
    Lee, Hoon-Jae
    Lee, Sang-Gon
    [J]. SENSORS, 2014, 14 (08): : 14786 - 14805
  • [33] Physical Layer Security for the Internet of Things: Authentication and Key Generation
    Zhang, Junqing
    Rajendran, Sekhar
    Sun, Zhi
    Woods, Roger
    Hanzo, Lajos
    [J]. IEEE WIRELESS COMMUNICATIONS, 2019, 26 (05) : 92 - 98
  • [34] Dynamic authentication for intelligent sensor clouds in the Internet of Things
    Al-Aqrabi, Hussain
    Manasrah, Ahmed M.
    Hill, Richard
    Shatnawi, Mohammed Q.
    Daoud, Mohammad Sh
    Alkhzaimi, Hoda
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 2003 - 2021
  • [35] Research on Data Security Technology in Internet of Things
    Zhao Yanling
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1752 - 1755
  • [36] Internet Of Things: Review On Security Of Novel Technology
    Syal, Arshdeep Singh
    Gupta, Abhinav
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 1405 - 1410
  • [37] Cloud-Based Remote RFID Authentication for Security of Smart Internet of Things Applications
    Ahmed, Mohammed Imtyaz
    Kannan, G.
    [J]. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2021, 20
  • [38] Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security
    Jabbari, A.
    Mohasefi, J. B.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 2565 - 2591
  • [39] Problems of Information Security Technology the "Internet of Things"
    Semin, Valeriy G.
    Kabanov, Artem S.
    Los, Alexei B.
    Khakimullin, Eugeniy R.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 110 - 113
  • [40] Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security
    A. Jabbari
    J. B. Mohasefi
    [J]. Wireless Personal Communications, 2021, 116 : 2565 - 2591