Integrity protection method for trusted data of IoT nodes based on transfer learning

被引:0
作者
Tang, Lin [1 ]
机构
[1] Chongqing Vocat Inst Engn, Chongqing 402260, Peoples R China
关键词
Homomorphic encryption; IoT; data protection; transfer learning;
D O I
10.3233/WEB-210467
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to overcome the problems of high data storage occupancy and long encryption time in traditional integrity protection methods for trusted data of IoT node, this paper proposes an integrity protection method for trusted data of IoT node based on transfer learning. Through the transfer learning algorithm, the data characteristics of the IoT node is obtained, the feature mapping function in the common characteristics of the node data is set to complete the classification of the complete data and incomplete data in the IoT nodes. The data of the IoT nodes is input into the data processing database to verify its security, eliminate the node data with low security, and integrate the security data and the complete data. On this basis, homomorphic encryption algorithm is used to encrypt the trusted data of IoT nodes, and embedded processor is added to the IoT to realize data integrity protection. The experimental results show that: after using the proposed method to protect the integrity of trusted data of IoT nodes, the data storage occupancy rate is only about 3.5%, the shortest time-consuming of trusted data encryption of IoT nodes is about 3 s, and the work efficiency is high.
引用
收藏
页码:203 / 213
页数:11
相关论文
共 50 条
  • [21] Transfer Learning Based Method for Frequency Response Model Updating with Insufficient Data
    Deng, Zhongmin
    Zhang, Xinjie
    Zhao, Yanlin
    SENSORS, 2020, 20 (19) : 1 - 16
  • [22] Interactive visualization generation method for time series data based on transfer learning
    Zhou Z.
    Wang X.
    Chen W.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2024, 58 (02): : 239 - 246
  • [23] An optimized deep learning model to ensure data integrity and security in IoT based e-commerce block chain application
    Navaneethan, M.
    Janakiraman, S.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (05) : 8697 - 8709
  • [24] Learning nodes: machine learning-based energy and data management strategy
    Kim, Yunmin
    Lee, Tae-Jin
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [25] Learning nodes: machine learning-based energy and data management strategy
    Yunmin Kim
    Tae-Jin Lee
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [26] Transfer-Learning-Based Intrusion Detection Framework in IoT Networks
    Rodriguez, Eva
    Valls, Pol
    Otero, Beatriz
    Jose Costa, Juan
    Verdu, Javier
    Alejandro Pajuelo, Manuel
    Canal, Ramon
    SENSORS, 2022, 22 (15)
  • [27] The Deep Learning Solutions on Lossless Compression Methods for Alleviating Data Load on IoT Nodes in Smart Cities
    Nasif, Ammar
    Othman, Zulaiha Ali
    Sani, Nor Samsiah
    SENSORS, 2021, 21 (12)
  • [28] Transfer Learning Method for Cuffless Blood Pressure Estimation Based on Measured PPG Data
    Mou, Hanlin
    Yu, Junsheng
    2022 CROSS STRAIT RADIO SCIENCE & WIRELESS TECHNOLOGY CONFERENCE, CSRSWTC, 2022,
  • [29] High precision aerodynamic heat prediction method based on data augmentation and transfer learning
    Wang, Ze
    Zhang, Weiwei
    Wang, Xu
    Song, Shufang
    AEROSPACE SCIENCE AND TECHNOLOGY, 2024, 155
  • [30] DGTRL: Deep graph transfer reinforcement learning method based on fusion of knowledge and data
    Chen, Genxin
    Qi, Jin
    Gao, Yu
    Zhu, Xingjian
    Dong, Zhenjiang
    Sun, Yanfei
    INFORMATION SCIENCES, 2024, 658