Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things
The Internet of Things (IoT) is widely valued by governments, academia, and industry for its huge application prospects. The core concepts of IoT are perception, control, transmission, and intelligence. It uses technology to achieve the synergy between objects and objects, people and things, and peo...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8457191/ |
_version_ | 1818871956095631360 |
---|---|
author | Aimin Yang Yifan Li Fanbei Kong Guoqing Wang Enhong Chen |
author_facet | Aimin Yang Yifan Li Fanbei Kong Guoqing Wang Enhong Chen |
author_sort | Aimin Yang |
collection | DOAJ |
description | The Internet of Things (IoT) is widely valued by governments, academia, and industry for its huge application prospects. The core concepts of IoT are perception, control, transmission, and intelligence. It uses technology to achieve the synergy between objects and objects, people and things, and people and people so that the sensor network, the Internet and mobile communication network are based on the formation of a larger complex network system. First, a high order voting algorithm for object-networked control is proposed. In this paper, the algorithm redundancy design method for an industrial control network is studied, and the importance of the algorithmic level heterogeneous redundancy is discussed. The most popular voting algorithms are improved, and an improved majority voting algorithm is proposed. Then, it is compared with the standard majority voting algorithm and the median voting algorithm, which proves that the improved algorithm has higher accuracy and output efficiency. Then, a new security key pre-distribution scheme based on the elliptic curve is proposed, which uses different base points of the elliptic curve as the seed key group, and the probability of two neighboring nodes sharing the same private key is large by selecting the appropriate private key ring size. Other neighboring nodes that do not share the private key can secure communications through the intermediate nodes using the path key, thus guaranteeing the security of the entire sensor network’s private communications. The simulation results show that the proposed scheme has good network connectivity and defensive. |
first_indexed | 2024-12-19T12:31:09Z |
format | Article |
id | doaj.art-388e1c4435844896aa50d22754ee7609 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-19T12:31:09Z |
publishDate | 2018-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-388e1c4435844896aa50d22754ee76092022-12-21T20:21:24ZengIEEEIEEE Access2169-35362018-01-016501875019610.1109/ACCESS.2018.28689518457191Security Control Redundancy Allocation Technology and Security Keys Based on Internet of ThingsAimin Yang0https://orcid.org/0000-0003-0463-9023Yifan Li1Fanbei Kong2Guoqing Wang3Enhong Chen4Laboratory of Engineering Computing, North China University of Science and Technology, Tangshan, ChinaLaboratory of Engineering Computing, North China University of Science and Technology, Tangshan, ChinaLaboratory of Engineering Computing, North China University of Science and Technology, Tangshan, ChinaLaboratory of Engineering Computing, North China University of Science and Technology, Tangshan, ChinaLaboratory of Engineering Computing, North China University of Science and Technology, Tangshan, ChinaThe Internet of Things (IoT) is widely valued by governments, academia, and industry for its huge application prospects. The core concepts of IoT are perception, control, transmission, and intelligence. It uses technology to achieve the synergy between objects and objects, people and things, and people and people so that the sensor network, the Internet and mobile communication network are based on the formation of a larger complex network system. First, a high order voting algorithm for object-networked control is proposed. In this paper, the algorithm redundancy design method for an industrial control network is studied, and the importance of the algorithmic level heterogeneous redundancy is discussed. The most popular voting algorithms are improved, and an improved majority voting algorithm is proposed. Then, it is compared with the standard majority voting algorithm and the median voting algorithm, which proves that the improved algorithm has higher accuracy and output efficiency. Then, a new security key pre-distribution scheme based on the elliptic curve is proposed, which uses different base points of the elliptic curve as the seed key group, and the probability of two neighboring nodes sharing the same private key is large by selecting the appropriate private key ring size. Other neighboring nodes that do not share the private key can secure communications through the intermediate nodes using the path key, thus guaranteeing the security of the entire sensor network’s private communications. The simulation results show that the proposed scheme has good network connectivity and defensive.https://ieeexplore.ieee.org/document/8457191/Redundancy techniquesecure key pre-allocationThe Internet of Things |
spellingShingle | Aimin Yang Yifan Li Fanbei Kong Guoqing Wang Enhong Chen Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things IEEE Access Redundancy technique secure key pre-allocation The Internet of Things |
title | Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things |
title_full | Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things |
title_fullStr | Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things |
title_full_unstemmed | Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things |
title_short | Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things |
title_sort | security control redundancy allocation technology and security keys based on internet of things |
topic | Redundancy technique secure key pre-allocation The Internet of Things |
url | https://ieeexplore.ieee.org/document/8457191/ |
work_keys_str_mv | AT aiminyang securitycontrolredundancyallocationtechnologyandsecuritykeysbasedoninternetofthings AT yifanli securitycontrolredundancyallocationtechnologyandsecuritykeysbasedoninternetofthings AT fanbeikong securitycontrolredundancyallocationtechnologyandsecuritykeysbasedoninternetofthings AT guoqingwang securitycontrolredundancyallocationtechnologyandsecuritykeysbasedoninternetofthings AT enhongchen securitycontrolredundancyallocationtechnologyandsecuritykeysbasedoninternetofthings |