CN109246155A - A method of attack is trusted in the wireless sensor network defence based on trust management - Google Patents

A method of attack is trusted in the wireless sensor network defence based on trust management Download PDF

Info

Publication number
CN109246155A
CN109246155A CN201811363645.6A CN201811363645A CN109246155A CN 109246155 A CN109246155 A CN 109246155A CN 201811363645 A CN201811363645 A CN 201811363645A CN 109246155 A CN109246155 A CN 109246155A
Authority
CN
China
Prior art keywords
trust
trusted
attack
node
fuzzy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811363645.6A
Other languages
Chinese (zh)
Inventor
陶洋
潘蕾娜
王成宇
王进
杨理
侯尧
胡静
徐娟
纪瑞娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201811363645.6A priority Critical patent/CN109246155A/en
Publication of CN109246155A publication Critical patent/CN109246155A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity

Abstract

The present invention relates to a kind of, and the method for attack is trusted in the wireless sensor network defence based on trust management, belongs to field of communication technology.This method mainly comprises the steps that step 1) directly trusts calculating process: being calculated by fuzzy synthetic evaluation model and the controlling elements of design the direct trust of node;Step 2) trusts calculating process indirectly: screening to the recommendation trust being collected into, is then based on irrelevance and distributes weight to multiple recommendation trusts, finally calculate indirect trust;Step 3) is comprehensive to trust calculating process: fusion, which is directly trusted, first obtains current composite trust with trust indirectly, obtains comprehensive trust value then in conjunction with the synthesis trust value of current composite trust value and a upper period.The method that attack is trusted in wireless sensor network defence provided by the invention based on trust management can effectively handle trust model attack, promote the accuracy of trust evaluation.

Description

A method of attack is trusted in the wireless sensor network defence based on trust management
Technical field
The invention belongs to fields of communication technology, especially wireless sensor network security art field, are related to a kind of based on letter The wireless sensor network defence of management is appointed to trust the method for attack.
Background technique
Under the trend of all things on earth interconnection, the application field of WSNs has obtained further extension, such as remote meter reading, wisdom The emerging fields such as storage.When being related to some Sensitive Domains, researcher just needs to analyze the demand for security of WSNs.This The application of a little Sensitive Domains is usually relatively high to the demand for security of WSNs, such as military and safety-security area.Although WSNs is being disposed Environment, self-characteristic etc. have huge difference with other traditional networks, but demand for safety approach or big Body is consistent.The confidentiality and integrity of data must be all ensured first, while considering the topological dynamics of WSNs, secure side Case must also have certain scalability.
External malicious node generally takes the modes such as steal information, playback to influence network.But external attack is usually right Network bring hazard ratio is relatively limited, and scholars generally believe that traditional encryption authentication techniques can take precautions against from network-external Attack.It internals attack and refers to that enemy captures the modes such as manipulation by carrying out to internal nodes of network, crack authentication mechanism for encrypting, The node is set to become the attack node of a network internal.The malicious node being captured possesses the confidential information such as key, traditional Security means can not identify the attack from network internal.Compared to external attack, internal attack due to be more difficult to be found to It can come bigger influence, therefore supplement of the faith mechanism as the conventional security mechanism based on encryption to Netowrk tape, receive and grind Study carefully the extensive concern of personnel.
Summary of the invention
In view of this, the purpose of the present invention is to provide a kind of, the wireless sensor network based on trust management is defendd to trust The method of attack effectively can can effectively handle trust model attack, promote the accuracy of trust evaluation.
In order to achieve the above object, the invention provides the following technical scheme:
A method of attack is trusted in the wireless sensor network defence based on trust management, comprising the following steps:
Step 1) directly trusts calculating process: by fuzzy synthetic evaluation model and the controlling elements of design to the straight of node Trust is connect to be calculated;
Step 2) trusts calculating process indirectly: screening to the recommendation trust being collected into, is then based on irrelevance to more A recommendation trust distributes weight, finally calculates indirect trust;
Step 3) is comprehensive to trust calculating process: fusion, which is directly trusted, first obtains current composite trust with trust indirectly, so Current composite trust value and the synthesis trust value in a upper period was combined to obtain comprehensive trust value afterwards.
Further, the step 1) specifically includes the following steps:
Step 11) chooses four factors.Set of factors F={ the F directly trusted1,F2,F3,F4}。F1、F2、F3、F4It respectively indicates Data dependence factor, the fresh sexual factor of data, successfully interacts rate factor at data package transmission velocity factor;
The fuzzy subset U of 4 degree is arranged in step 12)i(i=1,2,3,4) the different degrees of of node trust is respectively indicated It is insincere, it is low credible, in it is credible, it is high credible }, degree of membership of some trust factor of node on different trust evaluation collection can Fuzzy vector of this node on the single factor test is formed, this vector can be used to indicate that trust value of the node in each factor is commented Valence size;
Step 13) chooses the subordinating degree function that fuzzy subset is trusted in the building of trapezoidal and triangular representation, as shown in Figure 1;
Weight vectors W=(w in step 14) fuzzy comprehensive evaluation method1,w2,w3,w4), w1、w2、w3、w4Respectively 4 letters Appoint
The weight of factor need to meet w1+w2+w3+w4=1.Using common constant value weight, and enable
Fuzzy weighted values vector W is synthesized with subordinated-degree matrix R using suitable Fuzzy Arithmetic Operators and is respectively commented by step 15) The fuzzy overall evaluation result vector B of valence object, calculating process are as follows:
In formula,For Fuzzy Arithmetic Operators, biIt is seen on the whole to be evaluated node to trust evaluation fuzzy subset UiPerson in servitude Category degree.
Step 16) basisThe definition of operator, biCalculation formula it is as follows:
Direct trust DT of the step 17) node i to ji,j(t) can by fuzzy vector monodrome method to vector B uniformization such as Under: direct trust DT of the node i to ji,jIt (t) can be as follows to vector B uniformization by fuzzy vector monodrome method:
Whether step 18) starts with predictability from trust value, respectively defines successful trust evaluation Si,jWith failure Trust evaluation Fi,j.Then it is as follows to define controlling elements f:
The step 2) specifically includes the following steps:
Step 21) calculates the irrelevance d that each nodes recommendations are trustedk, filter out the excessive recommendation trust of bias;
Step 22) distributes weight according to its irrelevance size, and the smaller recommendation trust weight of departure degree is bigger;
Step 23) calculates trusts indirectly.
The step 3) specifically includes the following steps:
Step 31) is directly trusted in step S2, on the basis of step S3 is trusted indirectly, is calculated current comprehensive It closes and trusts
Step 32) chose the synthesis trust value CT in a upper periodi,j(t-1) CT is included in as historical factori,j(t) calculating In;
Step 33) calculates comprehensive trust.
Detailed description of the invention
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into The detailed description of one step, in which:
Fig. 1 is that challenge model figure is trusted in the wireless sensor network defence of the present invention based on trust management;
Fig. 2 is input variable degree of membership figure;
Specific embodiment
Below in conjunction with attached drawing, a preferred embodiment of the present invention will be described in detail.
The present invention provides a kind of, and the method for attack, this method are trusted in the wireless sensor network defence based on trust management It is firstly introduced into fuzzy synthetic evaluation model and calculates and directly trust, switch attack node is further reduced using controlling elements Trust codomain range;Then recommendation trust is filtered and weight distribution, reduces malicious node to indirect trust evaluation result Influence;Finally when calculating comprehensive trust, adaptive weighting is devised for history trust, it is suppressed that malicious node trust value Rapid increase;This method can effectively handle trust model attack, promote the accuracy of trust evaluation, this method it is specific Implementation includes the following steps: that step 1) directly trusts calculating process: by the controlling elements of fuzzy synthetic evaluation model and design The direct trust of node is calculated;Step 2) trusts calculating process indirectly: screening to the recommendation trust being collected into, so Weight is distributed to multiple recommendation trusts based on irrelevance afterwards, finally calculates indirect trust;Step 3) is comprehensive to trust calculating process: Fusion, which is directly trusted, first obtains current composite trust with trust indirectly, then in conjunction with current composite trust value and a upper period Comprehensive trust value obtains comprehensive trust value.
Step 1) directly trusts calculating process: by fuzzy synthetic evaluation model and the controlling elements of design to the straight of node Trust is connect to be calculated:
Further, step 1) specifically includes the following steps:
Step 11) chooses four factors.Set of factors F={ the F directly trusted1,F2,F3,F4}。F1、F2、F3、F4It respectively indicates Data dependence factor, the fresh sexual factor of data, successfully interacts rate factor at data package transmission velocity factor;
The fuzzy subset U of 4 degree is arranged in step 12)i(i=1,2,3,4) the different degrees of of node trust is respectively indicated It is insincere, it is low credible, in it is credible, it is high credible }, degree of membership of some trust factor of node on different trust evaluation collection can Fuzzy vector of this node on the single factor test is formed, this vector can be used to indicate that trust value of the node in each factor is commented Valence size;
Step 13) chooses the subordinating degree function that fuzzy subset is trusted in the building of trapezoidal and triangular representation, as shown in Figure 1;
Weight vectors W=(w in step 14) fuzzy comprehensive evaluation method1,w2,w3,w4), w1、w2、w3、w4Respectively 4 letters The weight for appointing factor, need to meet w1+w2+w3+w4=1.Using common constant value weight, and enable
Fuzzy weighted values vector W is synthesized with subordinated-degree matrix R using suitable Fuzzy Arithmetic Operators and is respectively commented by step 15) The fuzzy overall evaluation result vector B of valence object, calculating process are as follows:
In formula,For Fuzzy Arithmetic Operators, biIt is seen on the whole to be evaluated node to trust evaluation fuzzy subset UiPerson in servitude Category degree.
Step 16) basisThe definition of operator, biCalculation formula it is as follows:
Direct trust DT of the step 17) node i to ji,j(t) can by fuzzy vector monodrome method to vector B uniformization such as Under: direct trust DT of the node i to ji,jIt (t) can be as follows to vector B uniformization by fuzzy vector monodrome method:
Whether step 18) starts with predictability from trust value, respectively defines successful trust evaluation Si,jWith failure Trust evaluation Fi,j.Then it is as follows to define controlling elements f:
Further, the step 2) specifically includes the following steps:
Step 21) calculates the irrelevance d that each nodes recommendations are trustedk, filter out the excessive recommendation trust of bias;
Step 22) distributes weight according to its irrelevance size, and the smaller recommendation trust weight of departure degree is bigger;
Step 23) calculates trusts indirectly.
Further, step 3) specifically includes the following steps:
Step 31) is directly trusted in step S2, on the basis of step S3 is trusted indirectly, is calculated current comprehensive It closes and trusts
Step 32) chose the synthesis trust value CT in a upper periodi,j(t-1) CT is included in as historical factori,j(t) calculating In;
Step 33) calculates comprehensive trust.
Finally, it is stated that preferred embodiment above is only used to illustrate the technical scheme of the present invention and not to limit it, although logical It crosses above preferred embodiment the present invention is described in detail, however, those skilled in the art should understand that, can be Various changes are made to it in form and in details, without departing from claims of the present invention limited range.

Claims (10)

1. a kind of method that attack is trusted in wireless sensor network defence based on trust management, it is characterised in that: this method is first It first introduces fuzzy synthetic evaluation model and calculates and directly trust, the letter of switch attack node is further reduced using controlling elements Appoint codomain range;Then recommendation trust is filtered and weight distribution, reduces malicious node to indirect trust evaluation result It influences;Finally calculate it is comprehensive trust when, devise adaptive weighting for history trust, it is suppressed that malicious node trust value it is fast Speed rises;This method can effectively handle trust model attack, promote the accuracy of trust evaluation;
Method includes the following steps:
S1) directly trust calculating process: the direct trust by fuzzy synthetic evaluation model and the controlling elements of design to node It is calculated;
S2 calculating process) is trusted indirectly: the recommendation trust being collected into is screened, and is then based on irrelevance to multiple recommendations Appoint distribution weight, finally calculates indirect trust;
S3) comprehensive to trust calculating process: fusion, which is directly trusted, first obtains current composite trust with trust indirectly, then in conjunction with working as Preceding comprehensive trust value and the synthesis trust value in a upper period obtain comprehensive trust value.
2. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as described in claim 1, Be characterized in that: in the step S1, directly trust calculating process specifically includes the following steps:
S11) the selection of trust-factor has chosen four factors: data dependence factor, data package transmission velocity factor, data Fresh sexual factor successfully interacts rate factor, the set of factors F={ F that the set of factors directly trusted directly is trusted1,F2,F3,F4};
S12 direct trust evaluation collection) is constructed, reflects the size directly trusted using the degree of membership of each trust evaluation collection;
S13) construction subordinated-degree matrix and determining weight;
S14) fuzzy weighted values are synthesized to obtain the fuzzy overall evaluation result vector of each evaluation object with subordinated-degree matrix;
S15) start with from trust value with predictability, define controlling elements f;
S16 it) calculates and directly trusts.
3. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as claimed in claim 2, It is characterized in that: in the step S13, determining degree of membership size of the trust factor in each trust fuzzy set, choose trapezoidal and three The subordinating degree function of fuzzy subset is trusted in angular representation building, as shown in Figure 1.
4. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as claimed in claim 2, Be characterized in that: in the step S14, detailed process is as follows:
Step S141) weight vectors W=(w in fuzzy comprehensive evaluation method1,w2,w3,w4), w1、w2、w3、w4Respectively 4 trusts The weight of factor need to meet w1+w2+w3+w4=1, using common constant value weight, and enable
Step S142) fuzzy weighted values vector W is synthesized using suitable Fuzzy Arithmetic Operators to obtain each evaluation with subordinated-degree matrix R The fuzzy overall evaluation result vector B of object, calculating process are as follows:
In formula,For Fuzzy Arithmetic Operators, biIt is seen on the whole to be evaluated node to trust evaluation fuzzy subset UiBe subordinate to journey Degree;
Step S143) basisThe definition of operator, biCalculation formula it is as follows:
Step S144) node i is to the direct trust DT of ji,jIt (t) can be as follows to vector B uniformization by fuzzy vector monodrome method: Direct trust DT of the node i to ji,jIt (t) can be as follows to vector B uniformization by fuzzy vector monodrome method:
Thus node i is obtained to the direct trust DT of ji,j(t)。
5. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as claimed in claim 2, It is characterized in that: in the step S15, whether starting with from trust value with predictability, respectively define successful trust evaluation Si,jWith the trust evaluation F of failurei,j, it is as follows then to define controlling elements f:
By controlling elements f multiplied by directly trust DTi,j(t) trust value of switch attack node can be controlled.
6. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as claimed in claim 2, It is characterized in that: in the step S16, directly trust DTi,j(t) calculation formula updates as follows:
Above formula is final node i to j direct trust value.
7. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as described in claim 1, Be characterized in that: in the step S2, indirectly trust calculating process specifically includes the following steps:
S21 the irrelevance d that each nodes recommendations are trusted) is calculatedk, filter out the excessive recommendation trust of bias;
S22 weight) is distributed according to its irrelevance size, the smaller recommendation trust weight of departure degree is bigger;
S23 it) calculates and trusts indirectly.
8. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as claimed in claim 7, It is characterized in that: in the step S21, trusting IT indirectly calculatingi,j(t) when, the deviation that each nodes recommendations are trusted can first be calculated Degree, filters out the excessive recommendation trust of bias, recommendation trust of some common neighbors k to jIt can calculate as follows:
In formula, DTi,k(t), DTk,j(t) direct trust value of the node i to the direct trust value of k and node k to j is respectively indicated.
9. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as claimed in claim 7, It is characterized in that: in the step S22, specifically includes the following steps:
S221 the recommendation trust irrelevance d of common neighbor node k) is definedkIt is as follows:
S222) definition set CfThe total drift degree D (t) of interior joint recommendation trust is as follows:
S223) definition set CfThe total departure D (t) of interior joint and any drift rate dk(t) the numerical relation r betweenk(t) such as Under:
rk(t)=D (t)/dk(t)
S224) set CfIn arbitrary node k weight wkIt can be by rk(t) normalization is taken to be calculated:
Above formula is weight wk
10. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as described in claim 1, Be characterized in that: in the step S3, it is comprehensive trust calculating process specifically includes the following steps:
S31) directly trusted in step S2, on the basis of step S3 is trusted indirectly, current composite trust is calculated
S32 the synthesis trust value CT in a upper period) was choseni,j(t-1) CT is included in as historical factori,j(t) in calculating;
S33 comprehensive trust) is calculated.
CN201811363645.6A 2018-12-07 2018-12-07 A method of attack is trusted in the wireless sensor network defence based on trust management Pending CN109246155A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811363645.6A CN109246155A (en) 2018-12-07 2018-12-07 A method of attack is trusted in the wireless sensor network defence based on trust management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811363645.6A CN109246155A (en) 2018-12-07 2018-12-07 A method of attack is trusted in the wireless sensor network defence based on trust management

Publications (1)

Publication Number Publication Date
CN109246155A true CN109246155A (en) 2019-01-18

Family

ID=65074879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811363645.6A Pending CN109246155A (en) 2018-12-07 2018-12-07 A method of attack is trusted in the wireless sensor network defence based on trust management

Country Status (1)

Country Link
CN (1) CN109246155A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109978709A (en) * 2019-04-08 2019-07-05 燕山大学 A kind of trust network construction method based on node interbehavior
CN112689281A (en) * 2020-12-21 2021-04-20 重庆邮电大学 Sensor network malicious node judgment method based on two-type fuzzy system
CN112866283A (en) * 2021-02-20 2021-05-28 国网重庆市电力公司电力科学研究院 Fuzzy evidence theory-based Internet of things node evaluation method
CN113282417A (en) * 2021-05-31 2021-08-20 广东电网有限责任公司广州供电局 Task allocation method and device, computer equipment and storage medium
CN116546498A (en) * 2023-05-30 2023-08-04 哈尔滨工程大学 Underwater wireless sensor network trust evaluation method based on variable membership function

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101466098A (en) * 2009-01-21 2009-06-24 中国人民解放军信息工程大学 Method, device and communication system for evaluating network trust degree
CN101765231A (en) * 2009-12-30 2010-06-30 北京航空航天大学 Wireless sensor network trust evaluating method based on fuzzy logic
CN103237333A (en) * 2013-04-01 2013-08-07 东南大学 Cluster routing method based on multi-factor trust mechanism
CN104009992A (en) * 2014-05-29 2014-08-27 安徽师范大学 Trust evaluation system construction method based on fuzzy control
CN104080140A (en) * 2013-03-29 2014-10-01 南京邮电大学 Cooperative communication method based on trust evaluation for mobile ad hoc network
CN107750053A (en) * 2017-05-25 2018-03-02 天津大学 Based on multifactor wireless sensor network dynamic trust evaluation system and method
CN108124274A (en) * 2017-12-11 2018-06-05 重庆邮电大学 A kind of wireless sensor network security method for routing based on faith mechanism

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101466098A (en) * 2009-01-21 2009-06-24 中国人民解放军信息工程大学 Method, device and communication system for evaluating network trust degree
CN101765231A (en) * 2009-12-30 2010-06-30 北京航空航天大学 Wireless sensor network trust evaluating method based on fuzzy logic
CN104080140A (en) * 2013-03-29 2014-10-01 南京邮电大学 Cooperative communication method based on trust evaluation for mobile ad hoc network
CN103237333A (en) * 2013-04-01 2013-08-07 东南大学 Cluster routing method based on multi-factor trust mechanism
CN104009992A (en) * 2014-05-29 2014-08-27 安徽师范大学 Trust evaluation system construction method based on fuzzy control
CN107750053A (en) * 2017-05-25 2018-03-02 天津大学 Based on multifactor wireless sensor network dynamic trust evaluation system and method
CN108124274A (en) * 2017-12-11 2018-06-05 重庆邮电大学 A kind of wireless sensor network security method for routing based on faith mechanism

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109978709A (en) * 2019-04-08 2019-07-05 燕山大学 A kind of trust network construction method based on node interbehavior
CN112689281A (en) * 2020-12-21 2021-04-20 重庆邮电大学 Sensor network malicious node judgment method based on two-type fuzzy system
CN112866283A (en) * 2021-02-20 2021-05-28 国网重庆市电力公司电力科学研究院 Fuzzy evidence theory-based Internet of things node evaluation method
CN113282417A (en) * 2021-05-31 2021-08-20 广东电网有限责任公司广州供电局 Task allocation method and device, computer equipment and storage medium
CN113282417B (en) * 2021-05-31 2023-02-21 广东电网有限责任公司广州供电局 Task allocation method and device, computer equipment and storage medium
CN116546498A (en) * 2023-05-30 2023-08-04 哈尔滨工程大学 Underwater wireless sensor network trust evaluation method based on variable membership function
CN116546498B (en) * 2023-05-30 2024-01-26 哈尔滨工程大学 Underwater wireless sensor network trust evaluation method based on variable membership function

Similar Documents

Publication Publication Date Title
CN109246155A (en) A method of attack is trusted in the wireless sensor network defence based on trust management
Demertzis et al. Anomaly detection via blockchained deep learning smart contracts in industry 4.0
Tao et al. Food safety supervision system based on hierarchical multi-domain blockchain network
Ge et al. Distributed memetic algorithm for outsourced database fragmentation
Zhang et al. Privacy-aware smart city: A case study in collaborative filtering recommender systems
Wang et al. Privacy-preserving diverse keyword search and online pre-diagnosis in cloud computing
Yang et al. Autonomous and privacy-preserving energy trading based on redactable blockchain in smart grid
Sheth et al. Deep Learning, blockchain based multi-layered Authentication and Security Architectures
Duan et al. Application of blockchain for internet of things: a bibliometric analysis
Zhu et al. Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks
Yu Decision making based on generalized geometric operator under interval-valued intuitionistic fuzzy environment
Kumar et al. Digital twin-driven SDN for smart grid: A deep learning integrated blockchain for cybersecurity
Weaver et al. Toward a cyber-physical topology language: Applications to NERC CIP audit
Das et al. A state-of-the-art security and attacks analysis in blockchain applications network
Raj et al. A secured blockchain method for multivariate industrial IoT-oriented infrastructure based on deep residual squeeze and excitation network with single candidate optimizer
Djenouri et al. Blockchain: applications, challenges, and opportunities in consumer electronics
Lv et al. Blockchain based decentralized learning for security in digital twins
Piccialli et al. Data science for the Internet of Things
De et al. Blockchain Based Internet of Things
Zhu Personal information security environment monitoring and law protection using big data analysis
Cheng et al. Ocean data sharing based on blockchain
Karthikeyan et al. A comprehensive survey on variants and its extensions of big data in cloud environment
Nanda et al. Security, trust and privacy in cyber (STPCyber): future trends and challenges
Ao et al. Manufacturing Data Privacy Protection System for Secure Predictive Maintenance
CN115580493B (en) Power data classification encryption transmission method and device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190118

WD01 Invention patent application deemed withdrawn after publication