CN109246155A - A method of attack is trusted in the wireless sensor network defence based on trust management - Google Patents
A method of attack is trusted in the wireless sensor network defence based on trust management Download PDFInfo
- Publication number
- CN109246155A CN109246155A CN201811363645.6A CN201811363645A CN109246155A CN 109246155 A CN109246155 A CN 109246155A CN 201811363645 A CN201811363645 A CN 201811363645A CN 109246155 A CN109246155 A CN 109246155A
- Authority
- CN
- China
- Prior art keywords
- trust
- trusted
- attack
- node
- fuzzy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
Abstract
The present invention relates to a kind of, and the method for attack is trusted in the wireless sensor network defence based on trust management, belongs to field of communication technology.This method mainly comprises the steps that step 1) directly trusts calculating process: being calculated by fuzzy synthetic evaluation model and the controlling elements of design the direct trust of node;Step 2) trusts calculating process indirectly: screening to the recommendation trust being collected into, is then based on irrelevance and distributes weight to multiple recommendation trusts, finally calculate indirect trust;Step 3) is comprehensive to trust calculating process: fusion, which is directly trusted, first obtains current composite trust with trust indirectly, obtains comprehensive trust value then in conjunction with the synthesis trust value of current composite trust value and a upper period.The method that attack is trusted in wireless sensor network defence provided by the invention based on trust management can effectively handle trust model attack, promote the accuracy of trust evaluation.
Description
Technical field
The invention belongs to fields of communication technology, especially wireless sensor network security art field, are related to a kind of based on letter
The wireless sensor network defence of management is appointed to trust the method for attack.
Background technique
Under the trend of all things on earth interconnection, the application field of WSNs has obtained further extension, such as remote meter reading, wisdom
The emerging fields such as storage.When being related to some Sensitive Domains, researcher just needs to analyze the demand for security of WSNs.This
The application of a little Sensitive Domains is usually relatively high to the demand for security of WSNs, such as military and safety-security area.Although WSNs is being disposed
Environment, self-characteristic etc. have huge difference with other traditional networks, but demand for safety approach or big
Body is consistent.The confidentiality and integrity of data must be all ensured first, while considering the topological dynamics of WSNs, secure side
Case must also have certain scalability.
External malicious node generally takes the modes such as steal information, playback to influence network.But external attack is usually right
Network bring hazard ratio is relatively limited, and scholars generally believe that traditional encryption authentication techniques can take precautions against from network-external
Attack.It internals attack and refers to that enemy captures the modes such as manipulation by carrying out to internal nodes of network, crack authentication mechanism for encrypting,
The node is set to become the attack node of a network internal.The malicious node being captured possesses the confidential information such as key, traditional
Security means can not identify the attack from network internal.Compared to external attack, internal attack due to be more difficult to be found to
It can come bigger influence, therefore supplement of the faith mechanism as the conventional security mechanism based on encryption to Netowrk tape, receive and grind
Study carefully the extensive concern of personnel.
Summary of the invention
In view of this, the purpose of the present invention is to provide a kind of, the wireless sensor network based on trust management is defendd to trust
The method of attack effectively can can effectively handle trust model attack, promote the accuracy of trust evaluation.
In order to achieve the above object, the invention provides the following technical scheme:
A method of attack is trusted in the wireless sensor network defence based on trust management, comprising the following steps:
Step 1) directly trusts calculating process: by fuzzy synthetic evaluation model and the controlling elements of design to the straight of node
Trust is connect to be calculated;
Step 2) trusts calculating process indirectly: screening to the recommendation trust being collected into, is then based on irrelevance to more
A recommendation trust distributes weight, finally calculates indirect trust;
Step 3) is comprehensive to trust calculating process: fusion, which is directly trusted, first obtains current composite trust with trust indirectly, so
Current composite trust value and the synthesis trust value in a upper period was combined to obtain comprehensive trust value afterwards.
Further, the step 1) specifically includes the following steps:
Step 11) chooses four factors.Set of factors F={ the F directly trusted1,F2,F3,F4}。F1、F2、F3、F4It respectively indicates
Data dependence factor, the fresh sexual factor of data, successfully interacts rate factor at data package transmission velocity factor;
The fuzzy subset U of 4 degree is arranged in step 12)i(i=1,2,3,4) the different degrees of of node trust is respectively indicated
It is insincere, it is low credible, in it is credible, it is high credible }, degree of membership of some trust factor of node on different trust evaluation collection can
Fuzzy vector of this node on the single factor test is formed, this vector can be used to indicate that trust value of the node in each factor is commented
Valence size;
Step 13) chooses the subordinating degree function that fuzzy subset is trusted in the building of trapezoidal and triangular representation, as shown in Figure 1;
Weight vectors W=(w in step 14) fuzzy comprehensive evaluation method1,w2,w3,w4), w1、w2、w3、w4Respectively 4 letters
Appoint
The weight of factor need to meet w1+w2+w3+w4=1.Using common constant value weight, and enable
Fuzzy weighted values vector W is synthesized with subordinated-degree matrix R using suitable Fuzzy Arithmetic Operators and is respectively commented by step 15)
The fuzzy overall evaluation result vector B of valence object, calculating process are as follows:
In formula,For Fuzzy Arithmetic Operators, biIt is seen on the whole to be evaluated node to trust evaluation fuzzy subset UiPerson in servitude
Category degree.
Step 16) basisThe definition of operator, biCalculation formula it is as follows:
Direct trust DT of the step 17) node i to ji,j(t) can by fuzzy vector monodrome method to vector B uniformization such as
Under: direct trust DT of the node i to ji,jIt (t) can be as follows to vector B uniformization by fuzzy vector monodrome method:
Whether step 18) starts with predictability from trust value, respectively defines successful trust evaluation Si,jWith failure
Trust evaluation Fi,j.Then it is as follows to define controlling elements f:
The step 2) specifically includes the following steps:
Step 21) calculates the irrelevance d that each nodes recommendations are trustedk, filter out the excessive recommendation trust of bias;
Step 22) distributes weight according to its irrelevance size, and the smaller recommendation trust weight of departure degree is bigger;
Step 23) calculates trusts indirectly.
The step 3) specifically includes the following steps:
Step 31) is directly trusted in step S2, on the basis of step S3 is trusted indirectly, is calculated current comprehensive
It closes and trusts
Step 32) chose the synthesis trust value CT in a upper periodi,j(t-1) CT is included in as historical factori,j(t) calculating
In;
Step 33) calculates comprehensive trust.
Detailed description of the invention
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into
The detailed description of one step, in which:
Fig. 1 is that challenge model figure is trusted in the wireless sensor network defence of the present invention based on trust management;
Fig. 2 is input variable degree of membership figure;
Specific embodiment
Below in conjunction with attached drawing, a preferred embodiment of the present invention will be described in detail.
The present invention provides a kind of, and the method for attack, this method are trusted in the wireless sensor network defence based on trust management
It is firstly introduced into fuzzy synthetic evaluation model and calculates and directly trust, switch attack node is further reduced using controlling elements
Trust codomain range;Then recommendation trust is filtered and weight distribution, reduces malicious node to indirect trust evaluation result
Influence;Finally when calculating comprehensive trust, adaptive weighting is devised for history trust, it is suppressed that malicious node trust value
Rapid increase;This method can effectively handle trust model attack, promote the accuracy of trust evaluation, this method it is specific
Implementation includes the following steps: that step 1) directly trusts calculating process: by the controlling elements of fuzzy synthetic evaluation model and design
The direct trust of node is calculated;Step 2) trusts calculating process indirectly: screening to the recommendation trust being collected into, so
Weight is distributed to multiple recommendation trusts based on irrelevance afterwards, finally calculates indirect trust;Step 3) is comprehensive to trust calculating process:
Fusion, which is directly trusted, first obtains current composite trust with trust indirectly, then in conjunction with current composite trust value and a upper period
Comprehensive trust value obtains comprehensive trust value.
Step 1) directly trusts calculating process: by fuzzy synthetic evaluation model and the controlling elements of design to the straight of node
Trust is connect to be calculated:
Further, step 1) specifically includes the following steps:
Step 11) chooses four factors.Set of factors F={ the F directly trusted1,F2,F3,F4}。F1、F2、F3、F4It respectively indicates
Data dependence factor, the fresh sexual factor of data, successfully interacts rate factor at data package transmission velocity factor;
The fuzzy subset U of 4 degree is arranged in step 12)i(i=1,2,3,4) the different degrees of of node trust is respectively indicated
It is insincere, it is low credible, in it is credible, it is high credible }, degree of membership of some trust factor of node on different trust evaluation collection can
Fuzzy vector of this node on the single factor test is formed, this vector can be used to indicate that trust value of the node in each factor is commented
Valence size;
Step 13) chooses the subordinating degree function that fuzzy subset is trusted in the building of trapezoidal and triangular representation, as shown in Figure 1;
Weight vectors W=(w in step 14) fuzzy comprehensive evaluation method1,w2,w3,w4), w1、w2、w3、w4Respectively 4 letters
The weight for appointing factor, need to meet w1+w2+w3+w4=1.Using common constant value weight, and enable
Fuzzy weighted values vector W is synthesized with subordinated-degree matrix R using suitable Fuzzy Arithmetic Operators and is respectively commented by step 15)
The fuzzy overall evaluation result vector B of valence object, calculating process are as follows:
In formula,For Fuzzy Arithmetic Operators, biIt is seen on the whole to be evaluated node to trust evaluation fuzzy subset UiPerson in servitude
Category degree.
Step 16) basisThe definition of operator, biCalculation formula it is as follows:
Direct trust DT of the step 17) node i to ji,j(t) can by fuzzy vector monodrome method to vector B uniformization such as
Under: direct trust DT of the node i to ji,jIt (t) can be as follows to vector B uniformization by fuzzy vector monodrome method:
Whether step 18) starts with predictability from trust value, respectively defines successful trust evaluation Si,jWith failure
Trust evaluation Fi,j.Then it is as follows to define controlling elements f:
Further, the step 2) specifically includes the following steps:
Step 21) calculates the irrelevance d that each nodes recommendations are trustedk, filter out the excessive recommendation trust of bias;
Step 22) distributes weight according to its irrelevance size, and the smaller recommendation trust weight of departure degree is bigger;
Step 23) calculates trusts indirectly.
Further, step 3) specifically includes the following steps:
Step 31) is directly trusted in step S2, on the basis of step S3 is trusted indirectly, is calculated current comprehensive
It closes and trusts
Step 32) chose the synthesis trust value CT in a upper periodi,j(t-1) CT is included in as historical factori,j(t) calculating
In;
Step 33) calculates comprehensive trust.
Finally, it is stated that preferred embodiment above is only used to illustrate the technical scheme of the present invention and not to limit it, although logical
It crosses above preferred embodiment the present invention is described in detail, however, those skilled in the art should understand that, can be
Various changes are made to it in form and in details, without departing from claims of the present invention limited range.
Claims (10)
1. a kind of method that attack is trusted in wireless sensor network defence based on trust management, it is characterised in that: this method is first
It first introduces fuzzy synthetic evaluation model and calculates and directly trust, the letter of switch attack node is further reduced using controlling elements
Appoint codomain range;Then recommendation trust is filtered and weight distribution, reduces malicious node to indirect trust evaluation result
It influences;Finally calculate it is comprehensive trust when, devise adaptive weighting for history trust, it is suppressed that malicious node trust value it is fast
Speed rises;This method can effectively handle trust model attack, promote the accuracy of trust evaluation;
Method includes the following steps:
S1) directly trust calculating process: the direct trust by fuzzy synthetic evaluation model and the controlling elements of design to node
It is calculated;
S2 calculating process) is trusted indirectly: the recommendation trust being collected into is screened, and is then based on irrelevance to multiple recommendations
Appoint distribution weight, finally calculates indirect trust;
S3) comprehensive to trust calculating process: fusion, which is directly trusted, first obtains current composite trust with trust indirectly, then in conjunction with working as
Preceding comprehensive trust value and the synthesis trust value in a upper period obtain comprehensive trust value.
2. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as described in claim 1,
Be characterized in that: in the step S1, directly trust calculating process specifically includes the following steps:
S11) the selection of trust-factor has chosen four factors: data dependence factor, data package transmission velocity factor, data
Fresh sexual factor successfully interacts rate factor, the set of factors F={ F that the set of factors directly trusted directly is trusted1,F2,F3,F4};
S12 direct trust evaluation collection) is constructed, reflects the size directly trusted using the degree of membership of each trust evaluation collection;
S13) construction subordinated-degree matrix and determining weight;
S14) fuzzy weighted values are synthesized to obtain the fuzzy overall evaluation result vector of each evaluation object with subordinated-degree matrix;
S15) start with from trust value with predictability, define controlling elements f;
S16 it) calculates and directly trusts.
3. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as claimed in claim 2,
It is characterized in that: in the step S13, determining degree of membership size of the trust factor in each trust fuzzy set, choose trapezoidal and three
The subordinating degree function of fuzzy subset is trusted in angular representation building, as shown in Figure 1.
4. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as claimed in claim 2,
Be characterized in that: in the step S14, detailed process is as follows:
Step S141) weight vectors W=(w in fuzzy comprehensive evaluation method1,w2,w3,w4), w1、w2、w3、w4Respectively 4 trusts
The weight of factor need to meet w1+w2+w3+w4=1, using common constant value weight, and enable
Step S142) fuzzy weighted values vector W is synthesized using suitable Fuzzy Arithmetic Operators to obtain each evaluation with subordinated-degree matrix R
The fuzzy overall evaluation result vector B of object, calculating process are as follows:
In formula,For Fuzzy Arithmetic Operators, biIt is seen on the whole to be evaluated node to trust evaluation fuzzy subset UiBe subordinate to journey
Degree;
Step S143) basisThe definition of operator, biCalculation formula it is as follows:
Step S144) node i is to the direct trust DT of ji,jIt (t) can be as follows to vector B uniformization by fuzzy vector monodrome method:
Direct trust DT of the node i to ji,jIt (t) can be as follows to vector B uniformization by fuzzy vector monodrome method:
Thus node i is obtained to the direct trust DT of ji,j(t)。
5. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as claimed in claim 2,
It is characterized in that: in the step S15, whether starting with from trust value with predictability, respectively define successful trust evaluation
Si,jWith the trust evaluation F of failurei,j, it is as follows then to define controlling elements f:
By controlling elements f multiplied by directly trust DTi,j(t) trust value of switch attack node can be controlled.
6. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as claimed in claim 2,
It is characterized in that: in the step S16, directly trust DTi,j(t) calculation formula updates as follows:
Above formula is final node i to j direct trust value.
7. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as described in claim 1,
Be characterized in that: in the step S2, indirectly trust calculating process specifically includes the following steps:
S21 the irrelevance d that each nodes recommendations are trusted) is calculatedk, filter out the excessive recommendation trust of bias;
S22 weight) is distributed according to its irrelevance size, the smaller recommendation trust weight of departure degree is bigger;
S23 it) calculates and trusts indirectly.
8. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as claimed in claim 7,
It is characterized in that: in the step S21, trusting IT indirectly calculatingi,j(t) when, the deviation that each nodes recommendations are trusted can first be calculated
Degree, filters out the excessive recommendation trust of bias, recommendation trust of some common neighbors k to jIt can calculate as follows:
In formula, DTi,k(t), DTk,j(t) direct trust value of the node i to the direct trust value of k and node k to j is respectively indicated.
9. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as claimed in claim 7,
It is characterized in that: in the step S22, specifically includes the following steps:
S221 the recommendation trust irrelevance d of common neighbor node k) is definedkIt is as follows:
S222) definition set CfThe total drift degree D (t) of interior joint recommendation trust is as follows:
S223) definition set CfThe total departure D (t) of interior joint and any drift rate dk(t) the numerical relation r betweenk(t) such as
Under:
rk(t)=D (t)/dk(t)
S224) set CfIn arbitrary node k weight wkIt can be by rk(t) normalization is taken to be calculated:
Above formula is weight wk。
10. the method that attack is trusted in a kind of wireless sensor network defence based on trust management as described in claim 1,
Be characterized in that: in the step S3, it is comprehensive trust calculating process specifically includes the following steps:
S31) directly trusted in step S2, on the basis of step S3 is trusted indirectly, current composite trust is calculated
S32 the synthesis trust value CT in a upper period) was choseni,j(t-1) CT is included in as historical factori,j(t) in calculating;
S33 comprehensive trust) is calculated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811363645.6A CN109246155A (en) | 2018-12-07 | 2018-12-07 | A method of attack is trusted in the wireless sensor network defence based on trust management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811363645.6A CN109246155A (en) | 2018-12-07 | 2018-12-07 | A method of attack is trusted in the wireless sensor network defence based on trust management |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109246155A true CN109246155A (en) | 2019-01-18 |
Family
ID=65074879
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811363645.6A Pending CN109246155A (en) | 2018-12-07 | 2018-12-07 | A method of attack is trusted in the wireless sensor network defence based on trust management |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109246155A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109978709A (en) * | 2019-04-08 | 2019-07-05 | 燕山大学 | A kind of trust network construction method based on node interbehavior |
CN112689281A (en) * | 2020-12-21 | 2021-04-20 | 重庆邮电大学 | Sensor network malicious node judgment method based on two-type fuzzy system |
CN112866283A (en) * | 2021-02-20 | 2021-05-28 | 国网重庆市电力公司电力科学研究院 | Fuzzy evidence theory-based Internet of things node evaluation method |
CN113282417A (en) * | 2021-05-31 | 2021-08-20 | 广东电网有限责任公司广州供电局 | Task allocation method and device, computer equipment and storage medium |
CN116546498A (en) * | 2023-05-30 | 2023-08-04 | 哈尔滨工程大学 | Underwater wireless sensor network trust evaluation method based on variable membership function |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101466098A (en) * | 2009-01-21 | 2009-06-24 | 中国人民解放军信息工程大学 | Method, device and communication system for evaluating network trust degree |
CN101765231A (en) * | 2009-12-30 | 2010-06-30 | 北京航空航天大学 | Wireless sensor network trust evaluating method based on fuzzy logic |
CN103237333A (en) * | 2013-04-01 | 2013-08-07 | 东南大学 | Cluster routing method based on multi-factor trust mechanism |
CN104009992A (en) * | 2014-05-29 | 2014-08-27 | 安徽师范大学 | Trust evaluation system construction method based on fuzzy control |
CN104080140A (en) * | 2013-03-29 | 2014-10-01 | 南京邮电大学 | Cooperative communication method based on trust evaluation for mobile ad hoc network |
CN107750053A (en) * | 2017-05-25 | 2018-03-02 | 天津大学 | Based on multifactor wireless sensor network dynamic trust evaluation system and method |
CN108124274A (en) * | 2017-12-11 | 2018-06-05 | 重庆邮电大学 | A kind of wireless sensor network security method for routing based on faith mechanism |
-
2018
- 2018-12-07 CN CN201811363645.6A patent/CN109246155A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101466098A (en) * | 2009-01-21 | 2009-06-24 | 中国人民解放军信息工程大学 | Method, device and communication system for evaluating network trust degree |
CN101765231A (en) * | 2009-12-30 | 2010-06-30 | 北京航空航天大学 | Wireless sensor network trust evaluating method based on fuzzy logic |
CN104080140A (en) * | 2013-03-29 | 2014-10-01 | 南京邮电大学 | Cooperative communication method based on trust evaluation for mobile ad hoc network |
CN103237333A (en) * | 2013-04-01 | 2013-08-07 | 东南大学 | Cluster routing method based on multi-factor trust mechanism |
CN104009992A (en) * | 2014-05-29 | 2014-08-27 | 安徽师范大学 | Trust evaluation system construction method based on fuzzy control |
CN107750053A (en) * | 2017-05-25 | 2018-03-02 | 天津大学 | Based on multifactor wireless sensor network dynamic trust evaluation system and method |
CN108124274A (en) * | 2017-12-11 | 2018-06-05 | 重庆邮电大学 | A kind of wireless sensor network security method for routing based on faith mechanism |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109978709A (en) * | 2019-04-08 | 2019-07-05 | 燕山大学 | A kind of trust network construction method based on node interbehavior |
CN112689281A (en) * | 2020-12-21 | 2021-04-20 | 重庆邮电大学 | Sensor network malicious node judgment method based on two-type fuzzy system |
CN112866283A (en) * | 2021-02-20 | 2021-05-28 | 国网重庆市电力公司电力科学研究院 | Fuzzy evidence theory-based Internet of things node evaluation method |
CN113282417A (en) * | 2021-05-31 | 2021-08-20 | 广东电网有限责任公司广州供电局 | Task allocation method and device, computer equipment and storage medium |
CN113282417B (en) * | 2021-05-31 | 2023-02-21 | 广东电网有限责任公司广州供电局 | Task allocation method and device, computer equipment and storage medium |
CN116546498A (en) * | 2023-05-30 | 2023-08-04 | 哈尔滨工程大学 | Underwater wireless sensor network trust evaluation method based on variable membership function |
CN116546498B (en) * | 2023-05-30 | 2024-01-26 | 哈尔滨工程大学 | Underwater wireless sensor network trust evaluation method based on variable membership function |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109246155A (en) | A method of attack is trusted in the wireless sensor network defence based on trust management | |
Demertzis et al. | Anomaly detection via blockchained deep learning smart contracts in industry 4.0 | |
Tao et al. | Food safety supervision system based on hierarchical multi-domain blockchain network | |
Ge et al. | Distributed memetic algorithm for outsourced database fragmentation | |
Zhang et al. | Privacy-aware smart city: A case study in collaborative filtering recommender systems | |
Wang et al. | Privacy-preserving diverse keyword search and online pre-diagnosis in cloud computing | |
Yang et al. | Autonomous and privacy-preserving energy trading based on redactable blockchain in smart grid | |
Sheth et al. | Deep Learning, blockchain based multi-layered Authentication and Security Architectures | |
Duan et al. | Application of blockchain for internet of things: a bibliometric analysis | |
Zhu et al. | Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks | |
Yu | Decision making based on generalized geometric operator under interval-valued intuitionistic fuzzy environment | |
Kumar et al. | Digital twin-driven SDN for smart grid: A deep learning integrated blockchain for cybersecurity | |
Weaver et al. | Toward a cyber-physical topology language: Applications to NERC CIP audit | |
Das et al. | A state-of-the-art security and attacks analysis in blockchain applications network | |
Raj et al. | A secured blockchain method for multivariate industrial IoT-oriented infrastructure based on deep residual squeeze and excitation network with single candidate optimizer | |
Djenouri et al. | Blockchain: applications, challenges, and opportunities in consumer electronics | |
Lv et al. | Blockchain based decentralized learning for security in digital twins | |
Piccialli et al. | Data science for the Internet of Things | |
De et al. | Blockchain Based Internet of Things | |
Zhu | Personal information security environment monitoring and law protection using big data analysis | |
Cheng et al. | Ocean data sharing based on blockchain | |
Karthikeyan et al. | A comprehensive survey on variants and its extensions of big data in cloud environment | |
Nanda et al. | Security, trust and privacy in cyber (STPCyber): future trends and challenges | |
Ao et al. | Manufacturing Data Privacy Protection System for Secure Predictive Maintenance | |
CN115580493B (en) | Power data classification encryption transmission method and device and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190118 |
|
WD01 | Invention patent application deemed withdrawn after publication |