Integrity protection method for trusted data of IoT nodes based on transfer learning

被引:0
|
作者
Tang, Lin [1 ]
机构
[1] Chongqing Vocat Inst Engn, Chongqing 402260, Peoples R China
关键词
Homomorphic encryption; IoT; data protection; transfer learning;
D O I
10.3233/WEB-210467
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to overcome the problems of high data storage occupancy and long encryption time in traditional integrity protection methods for trusted data of IoT node, this paper proposes an integrity protection method for trusted data of IoT node based on transfer learning. Through the transfer learning algorithm, the data characteristics of the IoT node is obtained, the feature mapping function in the common characteristics of the node data is set to complete the classification of the complete data and incomplete data in the IoT nodes. The data of the IoT nodes is input into the data processing database to verify its security, eliminate the node data with low security, and integrate the security data and the complete data. On this basis, homomorphic encryption algorithm is used to encrypt the trusted data of IoT nodes, and embedded processor is added to the IoT to realize data integrity protection. The experimental results show that: after using the proposed method to protect the integrity of trusted data of IoT nodes, the data storage occupancy rate is only about 3.5%, the shortest time-consuming of trusted data encryption of IoT nodes is about 3 s, and the work efficiency is high.
引用
收藏
页码:203 / 213
页数:11
相关论文
共 50 条
  • [31] Research on Linux Trusted Boot Method Based on Reverse Integrity Verification
    Huang, Chenlin
    Hou, Chuanwang
    Dai, Huadong
    Ding, Yan
    Fu, Songling
    Ji, Mengluo
    SCIENTIFIC PROGRAMMING, 2016, 2016
  • [32] A Method based on Platform Integrity Verification for Activating A Mobile Trusted Module
    Kim, Daewon
    Jeon, Yongsung
    Kim, Jeongnyeo
    2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 1174 - 1176
  • [33] The New Method of Sensor Data Privacy Protection for IoT
    Wu, Yue
    Song, Liangtu
    Liu, Lei
    SHOCK AND VIBRATION, 2021, 2021
  • [34] Data Selection Scheme for Energy Efficient Supervised Learning at IoT Nodes
    Nikoloska, Ivana
    Zlatanov, Nikola
    IEEE COMMUNICATIONS LETTERS, 2021, 25 (03) : 859 - 863
  • [35] A METHOD FOR LOGGING DATA RECONSTRUCTION BASED ON TRANSFER LEARNING
    Zhao, Yuxuan
    Guo, Yong
    Chen, Hao
    Yang, Lei
    Xi, Chuanming
    Xu, Yuqiang
    THERMAL SCIENCE, 2024, 28 (4B): : 3451 - 3456
  • [36] IoT-based trusted wireless communication framework by machine learning approach
    Chakaravarthi, S.
    Saravanan, S.
    Jagadeesh, M.
    Nandhini, S.
    Measurement: Sensors, 2024, 34
  • [37] A supervised active learning method for identifying critical nodes in IoT networks
    Ojaghi, Behnam
    Dehshibi, Mohammad Mahdi
    Antonopoulos, Angelos
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (12): : 16775 - 16794
  • [38] A Trusted Federated Learning Method Based on Consortium Blockchain
    Yin, Xiaojun
    Wu, Xijun
    Zhang, Xinming
    INFORMATION, 2025, 16 (01)
  • [39] Secure sharing of industrial IoT data based on distributed trust management and trusted execution environments: a federated learning approach
    Zheng, Wei
    Cao, Yang
    Tan, Haining
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (29): : 21499 - 21509
  • [40] Secure sharing of industrial IoT data based on distributed trust management and trusted execution environments: a federated learning approach
    Wei Zheng
    Yang Cao
    Haining Tan
    Neural Computing and Applications, 2023, 35 : 21499 - 21509