A privacy protection method for IoT nodes based on convolutional neural network

被引:0
作者
Han Y. [1 ]
Sun D. [1 ]
Li Y. [1 ]
机构
[1] Department of Information Engineering, Shijiazhuang University of Applied Technology, Shijiazhuang
关键词
anonymity; convolutional neural network; internet of things; IoT; node privacy; protection method;
D O I
10.1504/IJRIS.2024.137437
中图分类号
学科分类号
摘要
In order to improve the security of internet of things, a privacy protection method of internet of things nodes based on convolutional neural network is proposed. Firstly, the flow model of IoT network nodes is constructed while using the ant colony algorithm to solve the model to obtain the current flow data of IoT nodes. Secondly, a convolutional neural network model is established to identify abnormal nodes in the internet of things. Finally, the privacy protection strategy of k-anonymous IoT nodes based on the average degree of nodes is adopted to protect the privacy of IoT abnormal nodes. The experimental results show that the method can effectively extract the node traffic before and after the attack on the internet of things, and the deviation value is only 2 kb/s; the identification results are more accurate, and the privacy of the internet of things nodes can be effectively protected. Copyright © 2024 Inderscience Enterprises Ltd.
引用
收藏
页码:16 / 25
页数:9
相关论文
共 50 条
  • [1] IoT individual privacy features analysis based on convolutional neural network
    Meng Xi
    Nie Lingyu
    Song Jiapeng
    COGNITIVE SYSTEMS RESEARCH, 2019, 57 : 126 - 130
  • [2] IoT Fog Computing Optimization Method Based on Improved Convolutional Neural Network
    Jing, Bing
    Xue, Huimin
    IEEE ACCESS, 2024, 12 : 2398 - 2408
  • [3] A security and privacy preserving approach based on social IoT evolving encoding using convolutional neural network
    Maniveena, C.
    Kalaiselvi, R.
    AUTOMATIKA, 2024, 65 (01) : 323 - 332
  • [4] Convolutional Neural Network Protection Method of Lenet-5-Like Structure
    Sun, Lei
    Wang, Yuehan
    Dai, Leyu
    PROCEEDINGS OF 2018 THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (CSAI 2018) / 2018 THE 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY (ICIMT 2018), 2018, : 77 - 80
  • [5] Detecting IoT Malicious Traffic based on Autoencoder and Convolutional Neural Network
    Hwang, Ren-Hung
    Peng, Min-Chun
    Huang, Chien-Wei
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [6] Expression Recognition Method Based on Convolutional Neural Network and Capsule Neural Network
    Wang, Zhanfeng
    Yao, Lisha
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (01): : 1659 - 1677
  • [7] Integrity protection method for trusted data of IoT nodes based on transfer learning
    Tang, Lin
    WEB INTELLIGENCE, 2021, 19 (03) : 203 - 213
  • [8] An SSVEP Classification Method Based on a Convolutional Neural Network
    Lei, Dongyang
    Dong, Chaoyi
    Ma, Pengfei
    Lin, Ruijing
    Liu, Huanzi
    Chen, Xiaoyan
    2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, : 4899 - 4904
  • [9] Deep convolutional neural network and IoT technology for healthcare
    Wassan, Sobia
    Dongyan, Hu
    Suhail, Beenish
    Jhanjhi, N. Z.
    Xiao, Guanghua
    Ahmed, Suhail
    Murugesan, Raja Kumar
    DIGITAL HEALTH, 2024, 10
  • [10] A new IoT resource addressing method based on rough set neural network
    Jin, Liang
    Li, Wei
    Meng, Qinghui
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2023, 16 (01) : 112 - 125