Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things

The Internet of Things (IoT) is widely valued by governments, academia, and industry for its huge application prospects. The core concepts of IoT are perception, control, transmission, and intelligence. It uses technology to achieve the synergy between objects and objects, people and things, and peo...

Full description

Bibliographic Details
Main Authors: Aimin Yang, Yifan Li, Fanbei Kong, Guoqing Wang, Enhong Chen
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8457191/
_version_ 1818871956095631360
author Aimin Yang
Yifan Li
Fanbei Kong
Guoqing Wang
Enhong Chen
author_facet Aimin Yang
Yifan Li
Fanbei Kong
Guoqing Wang
Enhong Chen
author_sort Aimin Yang
collection DOAJ
description The Internet of Things (IoT) is widely valued by governments, academia, and industry for its huge application prospects. The core concepts of IoT are perception, control, transmission, and intelligence. It uses technology to achieve the synergy between objects and objects, people and things, and people and people so that the sensor network, the Internet and mobile communication network are based on the formation of a larger complex network system. First, a high order voting algorithm for object-networked control is proposed. In this paper, the algorithm redundancy design method for an industrial control network is studied, and the importance of the algorithmic level heterogeneous redundancy is discussed. The most popular voting algorithms are improved, and an improved majority voting algorithm is proposed. Then, it is compared with the standard majority voting algorithm and the median voting algorithm, which proves that the improved algorithm has higher accuracy and output efficiency. Then, a new security key pre-distribution scheme based on the elliptic curve is proposed, which uses different base points of the elliptic curve as the seed key group, and the probability of two neighboring nodes sharing the same private key is large by selecting the appropriate private key ring size. Other neighboring nodes that do not share the private key can secure communications through the intermediate nodes using the path key, thus guaranteeing the security of the entire sensor network’s private communications. The simulation results show that the proposed scheme has good network connectivity and defensive.
first_indexed 2024-12-19T12:31:09Z
format Article
id doaj.art-388e1c4435844896aa50d22754ee7609
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-19T12:31:09Z
publishDate 2018-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-388e1c4435844896aa50d22754ee76092022-12-21T20:21:24ZengIEEEIEEE Access2169-35362018-01-016501875019610.1109/ACCESS.2018.28689518457191Security Control Redundancy Allocation Technology and Security Keys Based on Internet of ThingsAimin Yang0https://orcid.org/0000-0003-0463-9023Yifan Li1Fanbei Kong2Guoqing Wang3Enhong Chen4Laboratory of Engineering Computing, North China University of Science and Technology, Tangshan, ChinaLaboratory of Engineering Computing, North China University of Science and Technology, Tangshan, ChinaLaboratory of Engineering Computing, North China University of Science and Technology, Tangshan, ChinaLaboratory of Engineering Computing, North China University of Science and Technology, Tangshan, ChinaLaboratory of Engineering Computing, North China University of Science and Technology, Tangshan, ChinaThe Internet of Things (IoT) is widely valued by governments, academia, and industry for its huge application prospects. The core concepts of IoT are perception, control, transmission, and intelligence. It uses technology to achieve the synergy between objects and objects, people and things, and people and people so that the sensor network, the Internet and mobile communication network are based on the formation of a larger complex network system. First, a high order voting algorithm for object-networked control is proposed. In this paper, the algorithm redundancy design method for an industrial control network is studied, and the importance of the algorithmic level heterogeneous redundancy is discussed. The most popular voting algorithms are improved, and an improved majority voting algorithm is proposed. Then, it is compared with the standard majority voting algorithm and the median voting algorithm, which proves that the improved algorithm has higher accuracy and output efficiency. Then, a new security key pre-distribution scheme based on the elliptic curve is proposed, which uses different base points of the elliptic curve as the seed key group, and the probability of two neighboring nodes sharing the same private key is large by selecting the appropriate private key ring size. Other neighboring nodes that do not share the private key can secure communications through the intermediate nodes using the path key, thus guaranteeing the security of the entire sensor network’s private communications. The simulation results show that the proposed scheme has good network connectivity and defensive.https://ieeexplore.ieee.org/document/8457191/Redundancy techniquesecure key pre-allocationThe Internet of Things
spellingShingle Aimin Yang
Yifan Li
Fanbei Kong
Guoqing Wang
Enhong Chen
Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things
IEEE Access
Redundancy technique
secure key pre-allocation
The Internet of Things
title Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things
title_full Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things
title_fullStr Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things
title_full_unstemmed Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things
title_short Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things
title_sort security control redundancy allocation technology and security keys based on internet of things
topic Redundancy technique
secure key pre-allocation
The Internet of Things
url https://ieeexplore.ieee.org/document/8457191/
work_keys_str_mv AT aiminyang securitycontrolredundancyallocationtechnologyandsecuritykeysbasedoninternetofthings
AT yifanli securitycontrolredundancyallocationtechnologyandsecuritykeysbasedoninternetofthings
AT fanbeikong securitycontrolredundancyallocationtechnologyandsecuritykeysbasedoninternetofthings
AT guoqingwang securitycontrolredundancyallocationtechnologyandsecuritykeysbasedoninternetofthings
AT enhongchen securitycontrolredundancyallocationtechnologyandsecuritykeysbasedoninternetofthings