Title
Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things.
Abstract
The Internet of Things (IoT) is widely valued by governments, academia, and industry for its huge application prospects. The core concepts of IoT are perception, control, transmission, and intelligence. It uses technology to achieve the synergy between objects and objects, people and things, and people and people so that the sensor network, the Internet and mobile communication network are based on the formation of a larger complex network system. First, a high order voting algorithm for object-networked control is proposed. In this paper, the algorithm redundancy design method for an industrial control network is studied, and the importance of the algorithmic level heterogeneous redundancy is discussed. The most popular voting algorithms are improved, and an improved majority voting algorithm is proposed. Then, it is compared with the standard majority voting algorithm and the median voting algorithm, which proves that the improved algorithm has higher accuracy and output efficiency. Then, a new security key pre-distribution scheme based on the elliptic curve is proposed, which uses different base points of the elliptic curve as the seed key group, and the probability of two neighboring nodes sharing the same private key is large by selecting the appropriate private key ring size. Other neighboring nodes that do not share the private key can secure communications through the intermediate nodes using the path key, thus guaranteeing the security of the entire sensor network's private communications. The simulation results show that the proposed scheme has good network connectivity and defensive.
Year
DOI
Venue
2018
10.1109/ACCESS.2018.2868951
IEEE ACCESS
Keywords
Field
DocType
Redundancy technique,secure key pre-allocation,The Internet of Things
Security controls,Telecommunications network,Voting,Computer science,Computer network,Redundancy (engineering),Majority rule,Wireless sensor network,Public-key cryptography,The Internet,Distributed computing
Journal
Volume
ISSN
Citations 
6
2169-3536
0
PageRank 
References 
Authors
0.34
0
5
Name
Order
Citations
PageRank
Ai-Min Yang1204.82
Yifan Li28423.59
Fanbei Kong300.34
Guoqing Wang47517.84
Enhong Chen52106165.57