Integrity protection method for trusted data of IoT nodes based on transfer learning

被引:0
|
作者
Tang, Lin [1 ]
机构
[1] Chongqing Vocat Inst Engn, Chongqing 402260, Peoples R China
关键词
Homomorphic encryption; IoT; data protection; transfer learning;
D O I
10.3233/WEB-210467
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to overcome the problems of high data storage occupancy and long encryption time in traditional integrity protection methods for trusted data of IoT node, this paper proposes an integrity protection method for trusted data of IoT node based on transfer learning. Through the transfer learning algorithm, the data characteristics of the IoT node is obtained, the feature mapping function in the common characteristics of the node data is set to complete the classification of the complete data and incomplete data in the IoT nodes. The data of the IoT nodes is input into the data processing database to verify its security, eliminate the node data with low security, and integrate the security data and the complete data. On this basis, homomorphic encryption algorithm is used to encrypt the trusted data of IoT nodes, and embedded processor is added to the IoT to realize data integrity protection. The experimental results show that: after using the proposed method to protect the integrity of trusted data of IoT nodes, the data storage occupancy rate is only about 3.5%, the shortest time-consuming of trusted data encryption of IoT nodes is about 3 s, and the work efficiency is high.
引用
收藏
页码:203 / 213
页数:11
相关论文
共 50 条
  • [1] Trusted Computing and Privacy Protection Method for Computer IoT Nodes Based on Fuzzy Logic Blockchain
    Zhong, Beixin
    Yang, Zilong
    Liu, Zhonghao
    Chen, Xiaoyong
    Cheng, Shi
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [2] RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device
    Qin, Yu
    Liu, Jingbin
    Zhao, Shijun
    Feng, Dengguo
    Feng, Wei
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020 (2020)
  • [3] Privacy and Integrity Protection for IoT Multimodal Data Using Machine Learning and Blockchain
    Liu, Qingzhi
    Huang, Yuchen
    Jin, Chenglu
    Zhou, Xiaohan
    Mao, Ying
    Catal, Cagatay
    Cheng, Long
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2024, 20 (06)
  • [4] A privacy protection method for IoT nodes based on convolutional neural network
    Han Y.
    Sun D.
    Li Y.
    International Journal of Reasoning-based Intelligent Systems, 2024, 16 (01) : 16 - 25
  • [5] An Integrity Protection Model based on Trusted Recovery Technology
    Xu, Xiaojie
    Wang, Lisheng
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 167 - 177
  • [6] A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT
    Zhang, Guoyin
    Kou, Liang
    Zhang, Liguo
    Liu, Chao
    Da, Qingan
    Sun, Jianguo
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [7] Elixir - Efficient Data Transfer in WiFi-based IoT Nodes
    Jaisinghani, Dheryta
    Singh, Gursimran
    Fulara, Harish
    Maity, Mukulika
    Naik, Vinayak
    MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 823 - 825
  • [8] Securing Big Data Integrity for Industrial IoT in Smart Manufacturing Based on the Trusted Consortium Blockchain (TCB)
    Juma, Mazen
    Alattar, Fuad
    Touqan, Basim
    IOT, 2023, 4 (01): : 27 - 55
  • [9] Interface for Data Protection and Integrity in IoT Equipment for Industry
    Belu, N.
    Ionescu, L. M.
    Mazare, A. G.
    MODTECH INTERNATIONAL CONFERENCE - MODERN TECHNOLOGIES IN INDUSTRIAL ENGINEERING VIII, 2020, 916
  • [10] Trusted Execution Environment With Rollback Protection for Smart Contract-Based IoT Data Trading
    Lu, Xin
    Zhang, Zijian
    Ma, Teng
    Li, Meng
    Zhou, Tyler
    Shen, Wei
    Zhu, Liehuang
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 32901 - 32909