A privacy protection method for IoT nodes based on convolutional neural network

被引:0
|
作者
Han Y. [1 ]
Sun D. [1 ]
Li Y. [1 ]
机构
[1] Department of Information Engineering, Shijiazhuang University of Applied Technology, Shijiazhuang
关键词
anonymity; convolutional neural network; internet of things; IoT; node privacy; protection method;
D O I
10.1504/IJRIS.2024.137437
中图分类号
学科分类号
摘要
In order to improve the security of internet of things, a privacy protection method of internet of things nodes based on convolutional neural network is proposed. Firstly, the flow model of IoT network nodes is constructed while using the ant colony algorithm to solve the model to obtain the current flow data of IoT nodes. Secondly, a convolutional neural network model is established to identify abnormal nodes in the internet of things. Finally, the privacy protection strategy of k-anonymous IoT nodes based on the average degree of nodes is adopted to protect the privacy of IoT abnormal nodes. The experimental results show that the method can effectively extract the node traffic before and after the attack on the internet of things, and the deviation value is only 2 kb/s; the identification results are more accurate, and the privacy of the internet of things nodes can be effectively protected. Copyright © 2024 Inderscience Enterprises Ltd.
引用
收藏
页码:16 / 25
页数:9
相关论文
共 50 条
  • [1] IoT individual privacy features analysis based on convolutional neural network
    Meng Xi
    Nie Lingyu
    Song Jiapeng
    COGNITIVE SYSTEMS RESEARCH, 2019, 57 : 126 - 130
  • [2] Data Privacy Protection Model Based on Graph Convolutional Neural Network
    Gu, Tao
    Yang, Lin
    Wang, Hua
    MOBILE NETWORKS & APPLICATIONS, 2023, 29 (5): : 1433 - 1440
  • [3] A Method for Detecting Abnormal Data of Network Nodes Based on Convolutional Neural Network
    Shen, Xianhao
    Zhu, Changhong
    Zang, Yihao
    Niu, Shaohua
    Journal of Computers (Taiwan), 2022, 33 (03) : 49 - 58
  • [4] Privacy protection and anomaly detection in intelligent sorting based on convolutional neural networks in IoT environment
    Zhou, Han
    Chen, Danping
    Chen, Gengxin
    Lin, Xiaoli
    International Journal of Data Science, 2024, 9 (3-4) : 256 - 275
  • [5] Trusted Computing and Privacy Protection Method for Computer IoT Nodes Based on Fuzzy Logic Blockchain
    Zhong, Beixin
    Yang, Zilong
    Liu, Zhonghao
    Chen, Xiaoyong
    Cheng, Shi
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [6] IoT Fog Computing Optimization Method Based on Improved Convolutional Neural Network
    Jing, Bing
    Xue, Huimin
    IEEE ACCESS, 2024, 12 : 2398 - 2408
  • [7] A security and privacy preserving approach based on social IoT and classification using DenseNet convolutional neural network
    Maniveena, C.
    Kalaiselvi, R.
    AUTOMATIKA, 2024, 65 (01) : 333 - 342
  • [8] A security and privacy preserving approach based on social IoT evolving encoding using convolutional neural network
    Maniveena, C.
    Kalaiselvi, R.
    AUTOMATIKA, 2024, 65 (01) : 323 - 332
  • [9] Privacy-aware quantum convolutional neural network for blockchain-based IoT health care data
    Jagdale, Balaso
    Sugave, Shounak Rushikesh
    Kulkarni, Yogesh R.
    Gutte, Vitthal
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2024, 18 (02): : 1337 - 1354
  • [10] Privacy Protection in Transformer-based Neural Network
    Lang, Jiaqi
    Li, Linjing
    Chen, Weiyun
    Zeng, Daniel
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 182 - 184