Efficient Detection of False Data Fusion in IoT
-
摘要: 数据融合(data fusion)是物联网数据传输和处理的关键步骤之一,在传输过程中提前汇总和处理中间数据,仅将逐层融合的结果发送到应用层,有效降低了中间节点的功耗和负载.然而,在这一过程中,各节点没有保存被融合数据,因此,无法发现和定位针对数据融合结果的数据伪造或篡改攻击.为了杜绝这一安全隐患,提出一种高效的物联网数据融合安全检验机制,通过对数据融合过程建模,发现并刻画被输入数据和融合结果之间的联系,并利用这一模型发现异常的数据融合结果,杜绝恶意数据融合,优化物联网传输安全.首先,在节点/网络的输入端和输出端分别进行数据收集,构建了基于被融合数据的特征压缩摘要机制,提升了数据收集效率并优化了节点资源消耗;其次,提出了基于概率图概率模型的数据融合模型,描述被融合数据和融合结果的时空域关系,并基于这一模型高效检测异常数据融合结果.实验结果表明:所提出的方法能够高效、准确地发现恶意数据融合操作,优化物联网传输安全.Abstract: Data fusion is the critical process for data transmission in the Internet of things (IoT). In data fusion process, the original sensing data is processed and aggregated in the network, and only the aggregated results of data fusion are sent to the application layer, which effectively reduces the resource consumption and alleviates the workload on the sink node. Since no network node caches the aggregated data in the data fusion process, it is impossible to detect and locate the false data injection attack against data fusion results. In order to mitigate this significant vulnerability, an efficient detection scheme of false data fusion is proposed in this paper. By modeling the data fusion process, we discover and model the relationship between the input data and the fusion results, and apply the obtained model to detect abnormal data fusion results. In this way, we can mitigate malicious data fusion and optimize the IoT transmission security. In detail, we first collect input data and the relevant data fusion results for each node, and a compressed feature representation mechanism is designed to improve the data collection efficiency and reduce the resource consumption. In addition, a data fusion model based on probabilistic graph model is proposed to depict the spatial and temporal relationship between the input data and the data fusion results. Ultimately, we take the model to detect the abnormal data fusion results in an efficient way. The experimental results demonstrate that the proposed detection scheme can detect malicious data fusion operations efficiently and accurately and thus guarantee IoT transmission security.
-
-
期刊类型引用(9)
1. 韦晓敏,彭灿华. 基于Prim的物联网安全数据融合信誉度模型. 计算机仿真. 2022(06): 421-424+443 . 百度学术 2. 朱然,曾宇. 基于信任评估模型的物联网节点篡改共识仿真. 计算机仿真. 2021(04): 267-271 . 百度学术 3. 王珊慧. 基于异常数据驱动数据融合方法. 科技创新与应用. 2021(02): 135-137 . 百度学术 4. 曲艺. 轻量级物联网数据三维空间安全交换方法仿真. 计算机仿真. 2021(06): 273-277 . 百度学术 5. 曾丽,曾玉林. 基于节点信誉度的传感器数据安全融合方法. 计算机仿真. 2021(07): 290-293 . 百度学术 6. 曾纪钧,陆庭辉. 基于区块链技术的物联网通用数据认证传输技术研究. 电子设计工程. 2021(15): 106-110 . 百度学术 7. 孔令信,马亚军. 基于模糊矩阵的大数据自适应迁移融合仿真. 计算机仿真. 2020(03): 389-392 . 百度学术 8. 张娜. 可信物联网虚拟化数据中心数据融合结果检测技术研究. 内蒙古农业大学学报(自然科学版). 2020(04): 70-75 . 百度学术 9. 陈二阳,袁姜红,黎忠文,蒋毅,江丹. 基于JSON的土壤环境监测物联网感知源信任评价模型研究. 西安理工大学学报. 2020(04): 557-561 . 百度学术 其他类型引用(1)
计量
- 文章访问数: 1278
- HTML全文浏览量: 0
- PDF下载量: 388
- 被引次数: 10