Security authentication technology based on dynamic Bayesian network in Internet of Things

被引:0
|
作者
Qing Zhang
Dilong Xu
机构
[1] Hunan University,
[2] Hunan City University,undefined
[3] Guangzhou Academy of Social Sciences,undefined
关键词
Internet of Things; Dynamic Bayesian network; Security authentication; Trusted transmission; Combined public key; Security information exchange;
D O I
暂无
中图分类号
学科分类号
摘要
With the rapid development of the Internet of Things (IoT) technology in the information society, how to meet the urgent requirements of current users for trusted transmission services is a research hot-spots in the field of the IoT industry. In view of the research status on security authentication in IoT, a security authentication technology based on dynamic Bayesian network combined with trusted protocol is proposed in this paper. Through the introduction of the trusted measurement and the combined public key-based security authentication mechanism in the network, it enhances the security information exchange and considers the node credibility and the path reliability in the routing decision so as to choose a high secure and trusted path for information transmission in IoT. The evaluation results showed that our algorithm achieves a much better security performance than comparison algorithms in overhead and computational complexity for real time applications. In addition, our algorithm has also an adaptive capability and can quickly react to the denial of the service attack, which effectively suppress the threat of abnormal entity in the IoT.
引用
收藏
页码:573 / 580
页数:7
相关论文
共 50 条
  • [1] Security authentication technology based on dynamic Bayesian network in Internet of Things
    Zhang, Qing
    Xu, Dilong
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (02) : 573 - 580
  • [2] Network Security Risk Investigation System Based on Internet of Things Technology
    He, Qian
    [J]. 2021 6TH INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2021), 2021, : 397 - 400
  • [3] Multidomain security authentication for the Internet of things
    Zhang, Qikun
    Zhao, Kunyuan
    Kuang, Xiaohui
    Li, Yongjiao
    Zheng, Yuanpan
    Yuan, Junling
    Wang, Ruifang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16):
  • [4] Research on network security management monitoring platform based on Internet of things technology
    Yang, Qiang
    Cheng, Chen
    Chen, Yang
    Li, Yan
    Shi, Zhenyu
    [J]. APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2023, 9 (01)
  • [5] Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
    Sun, Ning
    Li, Tao
    Song, Gongfei
    Xia, Haoran
    [J]. MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [6] Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios
    Zhao, Junhui
    Hu, Huanhuan
    Huang, Fanwei
    Guo, Yingxuan
    Liao, Longxia
    [J]. ELECTRONICS, 2023, 12 (08)
  • [7] Review on Security of Internet of Things Authentication Mechanism
    Nandy, Tarak
    Bin Idris, Mohd Yamani Idna
    Noor, Rafidah Md
    Kiah, Miss Laiha Mat
    Lun, Lau Sian
    Juma'at, Nor Badrul Annuar
    Ahmedy, Ismail
    Ghani, Norjihan Abdul
    Bhattacharyya, Sananda
    [J]. IEEE ACCESS, 2019, 7 : 151054 - 151089
  • [8] Exploring Security and Authentication Issues in Internet of Things
    Prathibha, L.
    Fatima, Kaleem
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 673 - 678
  • [9] Security Authentication Scheme for Power Internet of Things
    Dang, Fang Fang
    Li, Shuai
    Yan, Li Jing
    Li, Ding Ding
    [J]. 2022 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2022), 2022, : 94 - 97
  • [10] Design of Context Awareness System for Semantic Internet of Things Based on Dynamic Bayesian Network
    吴晓强
    ZHANG Chun-you
    SHI Hong-yan
    [J]. 青岛大学学报(自然科学版), 2018, 31(S1) (自然科学版) : 13 - 18