• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于模糊的物联网低消耗、高有效性隐私保护方案:重复博弈模型。

Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model.

机构信息

School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China.

出版信息

Sensors (Basel). 2022 Jul 29;22(15):5674. doi: 10.3390/s22155674.

DOI:10.3390/s22155674
PMID:35957231
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9370935/
Abstract

In the Internet of things (IoTs), data transmission via network coding is highly vulnerable to intra-generation and inter-generation pollution attacks. To mitigate such attacks, some resource-intensive privacy-preserving schemes have been adopted in the previous literature. In order to balance resource consumption and data-privacy-preserving issues, a novel fuzzy-based privacy-preserving scheme is proposed. Our scheme is constructed on a T-S fuzzy trust theory, and network coding data streams are routed in optimal clusters formulated by a designed repeated game model to defend against pollution attacks. In particular, the security of our scheme relies on the hardness of the discrete logarithm. Then, we prove that the designed repeated game model has a subgame-perfect Nash equilibrium, and the model can improve resource utilization efficiency under the condition of data security. Simulation results show that the running time of the proposed privacy-preserving scheme is less than 1 s and the remaining energy is higher than 4 J when the length of packets is greater than 400 and the number of iterations is 100. Therefore, our scheme has higher time and energy efficiency than those of previous studies. In addition, the effective trust cluster formulation scheme (ETCFS) can formulate an optimal cluster more quickly under a kind of camouflage attack.

摘要

在物联网(IoT)中,通过网络编码进行的数据传输极易受到同代和跨代污染攻击。为了减轻此类攻击,先前的文献中采用了一些资源密集型的隐私保护方案。为了平衡资源消耗和数据隐私保护问题,提出了一种新颖的基于模糊的隐私保护方案。我们的方案构建在 T-S 模糊信任理论上,并通过设计的重复博弈模型来路由网络编码数据流到最佳簇中,以防御污染攻击。特别是,我们方案的安全性依赖于离散对数的难度。然后,我们证明设计的重复博弈模型具有子博弈完美纳什均衡,并且在数据安全的条件下,该模型可以提高资源利用效率。仿真结果表明,当数据包的长度大于 400 且迭代次数为 100 时,所提出的隐私保护方案的运行时间小于 1s,剩余能量高于 4J。因此,与先前的研究相比,我们的方案具有更高的时间和能量效率。此外,有效信任簇形成方案(ETCFS)可以在一种伪装攻击下更快地形成最佳簇。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/53f2/9370935/506cfe143b91/sensors-22-05674-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/53f2/9370935/97e680b1788c/sensors-22-05674-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/53f2/9370935/609ab72447d4/sensors-22-05674-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/53f2/9370935/38a7298f5514/sensors-22-05674-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/53f2/9370935/264d91df59a7/sensors-22-05674-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/53f2/9370935/922c78612b32/sensors-22-05674-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/53f2/9370935/506cfe143b91/sensors-22-05674-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/53f2/9370935/97e680b1788c/sensors-22-05674-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/53f2/9370935/609ab72447d4/sensors-22-05674-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/53f2/9370935/38a7298f5514/sensors-22-05674-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/53f2/9370935/264d91df59a7/sensors-22-05674-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/53f2/9370935/922c78612b32/sensors-22-05674-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/53f2/9370935/506cfe143b91/sensors-22-05674-g006.jpg

相似文献

1
Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model.基于模糊的物联网低消耗、高有效性隐私保护方案:重复博弈模型。
Sensors (Basel). 2022 Jul 29;22(15):5674. doi: 10.3390/s22155674.
2
A Novel Privacy Preserving Scheme for Smart Grid-Based Home Area Networks.一种基于智能电网的家庭区域网络的新型隐私保护方案。
Sensors (Basel). 2022 Mar 15;22(6):2269. doi: 10.3390/s22062269.
3
Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing.边缘计算下用于医疗物联网的隐私保护联邦学习
IEEE J Biomed Health Inform. 2023 Feb;27(2):854-865. doi: 10.1109/JBHI.2022.3157725. Epub 2023 Feb 3.
4
An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things.基于物联网的门限哈希函数的聚合签名方案
Sensors (Basel). 2019 Sep 29;19(19):4239. doi: 10.3390/s19194239.
5
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.基于 6LoWPAN 的物联网的安全远程用户认证方案。
PLoS One. 2021 Nov 8;16(11):e0258279. doi: 10.1371/journal.pone.0258279. eCollection 2021.
6
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.用于远程医疗信息系统的基于密码的安全匿名用户认证和会话密钥协商方案。
Comput Methods Programs Biomed. 2016 Oct;135:167-85. doi: 10.1016/j.cmpb.2016.07.028. Epub 2016 Jul 29.
7
Privacy-Preserving and Lightweight Selective Aggregation with Fault-Tolerance for Edge Computing-Enhanced IoT.面向边缘计算增强型物联网的隐私保护、轻量级容错选择性聚合
Sensors (Basel). 2021 Aug 9;21(16):5369. doi: 10.3390/s21165369.
8
Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data.实现高效且隐私保护的 k-NN 查询的外包电子医疗保健数据。
J Med Syst. 2019 Mar 27;43(5):123. doi: 10.1007/s10916-019-1229-1.
9
Profile Matching for IoMT: A Verifiable Private Set Intersection Scheme.物联网医疗保健中的个人资料匹配:可验证的私有集合交集方案。
IEEE J Biomed Health Inform. 2021 Oct;25(10):3794-3803. doi: 10.1109/JBHI.2021.3088289. Epub 2021 Oct 5.
10
An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay.一种基于传输延迟的物理层密钥生成方案的抗勾结攻击防御方法。
PeerJ Comput Sci. 2023 Apr 24;9:e1349. doi: 10.7717/peerj-cs.1349. eCollection 2023.

引用本文的文献

1
Robust MPC for polytopic uncertain systems a high-rate network with the round-robin scheduling.针对多面体不确定系统的鲁棒模型预测控制 一种采用循环调度的高速网络。
PeerJ Comput Sci. 2023 Mar 10;9:e1269. doi: 10.7717/peerj-cs.1269. eCollection 2023.

本文引用的文献

1
Towards Cognitive Authentication for Smart Healthcare Applications.迈向智能医疗保健应用的认知认证。
Sensors (Basel). 2022 Mar 9;22(6):2101. doi: 10.3390/s22062101.
2
Adaptive Fault Estimation for T-S Fuzzy Interconnected Systems Based on Persistent Excitation Condition via Reference Signals.基于参考信号的持续激励条件下T-S模糊互联系统的自适应故障估计
IEEE Trans Cybern. 2019 Aug;49(8):2822-2834. doi: 10.1109/TCYB.2018.2820001. Epub 2018 Apr 9.
3
A New Sensor Fault Isolation Method for T-S Fuzzy Systems.一种 T-S 模糊系统的新型传感器故障隔离方法。
IEEE Trans Cybern. 2017 Sep;47(9):2437-2447. doi: 10.1109/TCYB.2017.2707422. Epub 2017 Jun 5.
4
Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.博弈论与无线传感器网络安全需求及威胁缓解:一项综述
Sensors (Basel). 2016 Jun 29;16(7):1003. doi: 10.3390/s16071003.