Security Model of Internet of Things Based on Binary Wavelet and Sparse Neural Network

Security Model of Internet of Things Based on Binary Wavelet and Sparse Neural Network

Zhihui Wang, Jingjing Yang, Benzhen Guo, Xiaochun Cheng
DOI: 10.4018/IJMCMC.2019010101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

At present, the internet of things has no standard system architecture. According to the requirements of universal sensing, reliable transmission, intelligent processing and the realization of human, human and the material, real-time communication between objects and things, the internet needs the open, hierarchical, extensible network architecture as the framework. The sensation equipment safe examination platform supports the platform through the open style scene examination to measure the equipment and provides the movement simulated environment, including each kind of movement and network environment and safety management center, turning on application gateway supports. It examines the knowledge library. Under this inspiration, this article proposes the novel security model based on the sparse neural network and wavelet analysis. The experiment indicates that the proposed model performs better compared with the other state-of-the-art algorithms.
Article Preview
Top

1. Introduction

The Internet of Things is usually composed of a large number of unattended sensor nodes. The traditional intrusion detection system is difficult to adapt to the power source of the sensor node in the Internet of Things that limited computing ability and limited storage space. Therefore, it is lightweight and Reconstruction is a feasible way to meet the requirements of intrusion detection applications in the context of Internet of the Things. Government, enterprises, scientific research institutions more and more attention to the Internet security issues, for the perception of equipment security Some technical means, including the high-intensity encryption CPU card, RFID tags for the certification, key management mechanism and from the production process using the anti-power consumption/electromagnetic radiation analysis, the fault injection attack technology and so on. Can you see whether these safety precautions are effective on the one hand? Does it meet the relevant standards? It needs to be further clear (Lee, et al., 2013; Perera, et al., 2014; Whitmore, et al., 2015).

Internet security issues involving the network equipment based security, network security, Web security, and based on many aspects, such as Web application security, especially in the Internet of things in this article the Internet part, its content mainly includes security coding, safety and key management and exchange data frames. We firstly review them as the follows.

  • Key management and exchange: In the Internet implements the confidentiality and the complete measure key lies in the key the establishment and the management process, because in the thing networking node computation ability, power source ability and so on are limited that causes traditional the key management way not to be suitable under the thing networking the Internet.

  • Security code: Since any one of the label identification or identification code can be remotely scanned arbitrarily, and the label automatically, without distinguishing the response to the reader and the information stored in the reader to the reader, so the security of the code must be taken seriously (Al-Fuqaha, Guizani, Mohammadi, Aledhari,& Ayyash, 2015).

  • Security: data frames in the Internet information dissemination environment, an attacker could eavesdrop on content of the basic data frame, access to relevant information prepare the way for further attacks (Tao, Cheng, Xu, Zhang, & Li, 2014).

Figure 1.

The security model of internet of things from different levels

IJMCMC.2019010101.f01

The Figure 1 shows the particularity of the composition of the Internet of things, both has the solid facility equipment, and has the intelligence transmission which the network moves. Moreover after its equipment usually deploys the general networking first, therefore, the thing networking node mostly is at nobody guarding the condition, besides has the mobile communication network tradition network security question, but also has some with to have the migration network security different special security problem as follows.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing