...
首页> 外文期刊>Control of Network Systems, IEEE Transactions on >Optimal Secure Two-Layer IoT Network Design
【24h】

Optimal Secure Two-Layer IoT Network Design

机译:最优安全双层网络设计

获取原文
获取原文并翻译 | 示例
           

摘要

With the remarkable growth of the Internet and communication technologies over the past few decades, Internet of Things (IoTs) is enabling the ubiquitous connectivity of heterogeneous physical devices with software, sensors, and actuators. IoT networks are naturally two layers with the cloud and cellular networks coexisting with the underlaid device-to-device communications. The connectivity of IoTs plays an important role in information dissemination for mission-critical and civilian applications. However, IoT communication networks are vulnerable to cyber attacks including the denial-of-service and jamming attacks, resulting in link removals in the IoT network. In this paper, we develop a heterogeneous IoT network design framework in which a network designer can add links to provide additional communication paths between two nodes or secure links against attacks by investing resources. By anticipating the strategic cyber attacks, we characterize the optimal design of the secure IoT network by first providing a lower bound on the number of links a secure network requires for a given budget of protected links, and then developing a method to construct networks that satisfy the heterogeneous network design specifications. Therefore, each layer of the designed heterogeneous IoT network is resistant to a predefined level of malicious attacks with minimum resources. Finally, we provide case studies on the Internet of Battlefield Things to corroborate and illustrate our obtained results.
机译:随着互联网和通信技术的显着增长,在过去的几十年中,物联网(IOTS)可以通过软件,传感器和执行器实现异构物理设备的无处不在的连接。 IOT网络自然是两层,云和蜂窝网络与下划线设备到设备通信共存。 IOT的连接在关键任务和民用申请的信息传播中起着重要作用。然而,物联网通信网络容易受到网络攻击,包括拒绝服务和干扰攻击,导致物联网网络中的链路删除。在本文中,我们开发了一个异构的IOT网络设计框架,其中网络设计人员可以添加链接,以在两个节点之间提供额外的通信路径或通过投资资源来解决攻击的安全链路。通过预期战略网络攻击,我们通过首先提供安全网络的链路数量的下限来表征安全物联网网络的最佳设计,要求保护链接的给定预算,然后开发一种构建满足网络的方法异构网络设计规范。因此,设计的非均质物联网网络的每层具有最小资源的预定义的恶意攻击水平。最后,我们提供了对战地互联网互联网的案例研究,以证实我们获得的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号