Integrity protection method for trusted data of IoT nodes based on transfer learning

被引:0
|
作者
Tang, Lin [1 ]
机构
[1] Chongqing Vocat Inst Engn, Chongqing 402260, Peoples R China
关键词
Homomorphic encryption; IoT; data protection; transfer learning;
D O I
10.3233/WEB-210467
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to overcome the problems of high data storage occupancy and long encryption time in traditional integrity protection methods for trusted data of IoT node, this paper proposes an integrity protection method for trusted data of IoT node based on transfer learning. Through the transfer learning algorithm, the data characteristics of the IoT node is obtained, the feature mapping function in the common characteristics of the node data is set to complete the classification of the complete data and incomplete data in the IoT nodes. The data of the IoT nodes is input into the data processing database to verify its security, eliminate the node data with low security, and integrate the security data and the complete data. On this basis, homomorphic encryption algorithm is used to encrypt the trusted data of IoT nodes, and embedded processor is added to the IoT to realize data integrity protection. The experimental results show that: after using the proposed method to protect the integrity of trusted data of IoT nodes, the data storage occupancy rate is only about 3.5%, the shortest time-consuming of trusted data encryption of IoT nodes is about 3 s, and the work efficiency is high.
引用
收藏
页码:203 / 213
页数:11
相关论文
共 50 条
  • [41] IoT anomaly detection method in intelligent manufacturing industry based on trusted evaluation
    Chao Wang
    The International Journal of Advanced Manufacturing Technology, 2020, 107 : 993 - 1005
  • [42] IoT anomaly detection method in intelligent manufacturing industry based on trusted evaluation
    Wang, Chao
    INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2020, 107 (3-4): : 993 - 1005
  • [43] A Data-Efficient Training Model for Signal Integrity Analysis based on Transfer Learning
    Zhang, Tingrui
    Chen, Siyu
    Wei, Shuwu
    Chen, Jienan
    2019 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2019), 2019, : 182 - 185
  • [44] Smart contract-based integrity audit method for IoT
    Wang, Chunbo
    Liu, Xu
    Li, Hang
    Di, Xiaoqiang
    Cong, Ligang
    Zhang, Siyu
    Qi, Hui
    INFORMATION SCIENCES, 2023, 647
  • [45] Blockchain Based Data Integrity Verification for Large-Scale IoT Data
    Wang, Haiyan
    Zhang, Jiawei
    IEEE ACCESS, 2019, 7 : 164996 - 165006
  • [46] Sensor-based IoT data privacy protection
    Xiaoyu Ji
    Wenjun Zhu
    Shilin Xiao
    Wenyuan Xu
    Nature Reviews Electrical Engineering, 2024, 1 (7): : 427 - 428
  • [47] Active Learning for IoT Data Prioritization in Edge Nodes Over Wireless Networks
    Chen-Khong Tham
    Rajagopalan, Rajalaxmi
    IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2020, : 4453 - 4458
  • [48] A sustainable and trusted solution for IoT-based federated learning using feedback behavior
    Rathee, Geetanjali
    Kerrache, Chaker Abdelaziz
    Calafate, Carlos T.
    INTERNET OF THINGS, 2024, 26
  • [49] A Memory Integrity Protection Method based on Bloom Filter
    Yao Nianmin
    Ma Haifeng
    Cai Shaobin
    Han Qilong
    2012 11TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING & SCIENCE (DCABES), 2012, : 305 - 309
  • [50] Trusted audit with untrusted auditors: A decentralized data integrity Crowdauditing approach based on blockchain
    Chen, Haiwen
    Zhou, Huan
    Yu, Jiaping
    Wu, Kui
    Liu, Fang
    Zhou, Tongqing
    Cai, Zhiping
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (11) : 6213 - 6239