• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Shuqin, Bai Guangyao, Li Hong, Zhang Minzhi. IoT Security Knowledge Reasoning Method of Multi-Source Data Fusion[J]. Journal of Computer Research and Development, 2022, 59(12): 2735-2749. DOI: 10.7544/issn1000-1239.20210954
Citation: Zhang Shuqin, Bai Guangyao, Li Hong, Zhang Minzhi. IoT Security Knowledge Reasoning Method of Multi-Source Data Fusion[J]. Journal of Computer Research and Development, 2022, 59(12): 2735-2749. DOI: 10.7544/issn1000-1239.20210954

IoT Security Knowledge Reasoning Method of Multi-Source Data Fusion

Funds: This work was supported by the Key Program Research Fund of Higher Education of Henan Province (21A520053, 19A520048) and the Science and Technique Foundation of Henan Province (182102210526).
More Information
  • Published Date: November 30, 2022
  • With the development of the information technology industry and the increase of the number of IoT devices, the difficulty and complexity of IoT security defense are rising continuously. Major security incidents for IoT and the supply chain occur frequently, which reveals the complexity of the security management of the IoT supply chain. Nowadays, there are kinds of public knowledge bases about information security which can be used for the IoT security threat analysis. However, the heterogeneity of these knowledge bases makes it difficult for threat assessment. Aiming at improving the capabilities of threat elements assessment of IoT security, which used disclosed threat events, we exploit multiple information security knowledge bases, integrate the sources of security knowledge which the defenders are concerned about, and the tactics, attack patterns, attack techniques of attackers into a unified relational mapping linkages graph knowledge base. An IoT security ontology, namely, Risk Analysis of IoT Supply Chain Ontology (RIoTSCO) is constructed. Based on RIoTSCO, the inference rules of IoT security are defined to establish the semantic relationship among the knowledge bases of IoT security which can solve the semantic heterogeneity of multi-source knowledge. Meanwhile, based on the IoT security knowledge reasoning method proposed above in this paper, we conduct a security threat assessment on an IoT supply chain scenario. Moreover, RIoTSCO can also automatically infer mitigations in respond to threats, and describe the overall perspective of the inbound and outbound supply chain intelligences related to the threat events.
  • Related Articles

    [1]Luo Yuanyi, Wu Rui, Liu Jiafeng, Tang Xianglong. Multimodal Sentiment Analysis Method for Sentimental Semantic Inconsistency[J]. Journal of Computer Research and Development, 2025, 62(2): 374-382. DOI: 10.7544/issn1000-1239.202330199
    [2]Sun Ying, Ding Weiping, Huang Jiashuang, Ju Hengrong, Li Ming, Geng Yu. RCAR-UNet:Retinal Vessels Segmentation Network Based on Rough Channel Attention Mechanism[J]. Journal of Computer Research and Development, 2023, 60(4): 947-961. DOI: 10.7544/issn1000-1239.202110735
    [3]Wang Chenglong, Yi Jiangyan, Tao Jianhua, Ma Haoxin, Tian Zhengkun, Fu Ruibo. Global and Temporal-Frequency Attention Based Network in Audio Deepfake Detection[J]. Journal of Computer Research and Development, 2021, 58(7): 1466-1475. DOI: 10.7544/issn1000-1239.2021.20200799
    [4]Cheng Yan, Yao Leibo, Zhang Guanghe, Tang Tianwei, Xiang Guoxiong, Chen Haomai, Feng Yue, Cai Zhuang. Text Sentiment Orientation Analysis of Multi-Channels CNN and BiGRU Based on Attention Mechanism[J]. Journal of Computer Research and Development, 2020, 57(12): 2583-2595. DOI: 10.7544/issn1000-1239.2020.20190854
    [5]Wei Zhenkai, Cheng Meng, Zhou Xiabing, Li Zhifeng, Zou Bowei, Hong Yu, Yao Jianmin. Convolutional Interactive Attention Mechanism for Aspect Extraction[J]. Journal of Computer Research and Development, 2020, 57(11): 2456-2466. DOI: 10.7544/issn1000-1239.2020.20190748
    [6]Li Mengying, Wang Xiaodong, Ruan Shulan, Zhang Kun, Liu Qi. Student Performance Prediction Model Based on Two-Way Attention Mechanism[J]. Journal of Computer Research and Development, 2020, 57(8): 1729-1740. DOI: 10.7544/issn1000-1239.2020.20200181
    [7]Sun Xiaowan, Wang Ying, Wang Xin, Sun Yudong. Aspect-Based Sentiment Analysis Model Based on Dual-Attention Networks[J]. Journal of Computer Research and Development, 2019, 56(11): 2384-2395. DOI: 10.7544/issn1000-1239.2019.20180823
    [8]Su Jindian, Ouyang Zhifan, Yu Shanshan. Aspect-Level Sentiment Classification for Sentences Based on Dependency Tree and Distance Attention[J]. Journal of Computer Research and Development, 2019, 56(8): 1731-1745. DOI: 10.7544/issn1000-1239.2019.20190102
    [9]Zhang Zhichang, Zhang Zhenwen, Zhang Zhiman. User Intent Classification Based on IndRNN-Attention[J]. Journal of Computer Research and Development, 2019, 56(7): 1517-1524. DOI: 10.7544/issn1000-1239.2019.20180648
    [10]Liang Bin, Liu Quan, Xu Jin, Zhou Qian, Zhang Peng. Aspect-Based Sentiment Analysis Based on Multi-Attention CNN[J]. Journal of Computer Research and Development, 2017, 54(8): 1724-1735. DOI: 10.7544/issn1000-1239.2017.20170178
  • Cited by

    Periodical cited type(2)

    1. 张学旺,雷响. 基于层次化群签名的联盟链身份隐私保护方案. 信息安全研究. 2024(12): 1160-1164 .
    2. 夏莹杰,朱思雨,刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究. 通信学报. 2023(04): 111-123 .

    Other cited types(6)

Catalog

    Article views (236) PDF downloads (119) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return