Literature DB >> 31505866

Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks.

Jie Ji1, Guohua Wu2, Jinguo Shuai3, Zhen Zhang4, Zhen Wang5, Yizhi Ren6.   

Abstract

The privacy and security of the Internet of Things (IoT) are emerging as popular issues in the IoT. At present, there exist several pieces of research on network analysis on the IoT network, and malicious network analysis may threaten the privacy and security of the leader in the IoT networks. With this in mind, we focus on how to avoid malicious network analysis by modifying the topology of the IoT network and we choose closeness centrality as the network analysis tool. This paper makes three key contributions toward this problem: (1) An optimization problem of removing k edges to minimize (maximize) the closeness value (rank) of the leader; (2) A greedy (greedy and simulated annealing) algorithm to solve the closeness value (rank) case of the proposed optimization problem in polynomial time; and (3)UpdateCloseness (FastTopRank)-algorithm for computing closeness value (rank) efficiently. Experimental results prove the efficiency of our pruning algorithms and show that our heuristic algorithms can obtain accurate solutions compared with the optimal solution (the approximation ratio in the worst case is 0.85) and outperform the solutions obtained by other baseline algorithms (e.g., choose k edges with the highest degree sum).

Entities:  

Keywords:  Internet of Things; closeness centrality; greedy algorithm; network analysis; optimization

Year:  2019        PMID: 31505866      PMCID: PMC6767009          DOI: 10.3390/s19183886

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


  3 in total

1.  Emergence of scaling in random networks

Authors: 
Journal:  Science       Date:  1999-10-15       Impact factor: 47.728

2.  AN IMPROVED INDEX OF CENTRALITY.

Authors:  M A BEAUCHAMP
Journal:  Behav Sci       Date:  1965-04

3.  Collective dynamics of 'small-world' networks.

Authors:  D J Watts; S H Strogatz
Journal:  Nature       Date:  1998-06-04       Impact factor: 49.962

  3 in total
  1 in total

1.  Intrusion Detection of UAVs Based on the Deep Belief Network Optimized by PSO.

Authors:  Xiaopeng Tan; Shaojing Su; Zhen Zuo; Xiaojun Guo; Xiaoyong Sun
Journal:  Sensors (Basel)       Date:  2019-12-14       Impact factor: 3.576

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.