| Literature DB >> 35957231 |
Laicheng Cao1, Min Zhu1.
Abstract
In the Internet of things (IoTs), data transmission via network coding is highly vulnerable to intra-generation and inter-generation pollution attacks. To mitigate such attacks, some resource-intensive privacy-preserving schemes have been adopted in the previous literature. In order to balance resource consumption and data-privacy-preserving issues, a novel fuzzy-based privacy-preserving scheme is proposed. Our scheme is constructed on a T-S fuzzy trust theory, and network coding data streams are routed in optimal clusters formulated by a designed repeated game model to defend against pollution attacks. In particular, the security of our scheme relies on the hardness of the discrete logarithm. Then, we prove that the designed repeated game model has a subgame-perfect Nash equilibrium, and the model can improve resource utilization efficiency under the condition of data security. Simulation results show that the running time of the proposed privacy-preserving scheme is less than 1 s and the remaining energy is higher than 4 J when the length of packets is greater than 400 and the number of iterations is 100. Therefore, our scheme has higher time and energy efficiency than those of previous studies. In addition, the effective trust cluster formulation scheme (ETCFS) can formulate an optimal cluster more quickly under a kind of camouflage attack.Entities:
Keywords: ETCFS; camouflage attack; fuzzy trust; optimal cluster; pollution attacks; repeated game
Mesh:
Year: 2022 PMID: 35957231 PMCID: PMC9370935 DOI: 10.3390/s22155674
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1The framework of the fuzzy-based privacy-preserving scheme based on the repeated game. The devices in the solid line frame are common IoT devices in the cluster, and the dotted line is the routing device that guarantees data uploading.
The different payoffs under different behaviors of players.
| Strategy | To Be CH | To Be CM |
|---|---|---|
| Normal | ||
| Malicious |
The simulation network parameters.
| Parameter | Value | Parameter | Value |
|---|---|---|---|
| Network region | 200 × 200 m | Communication radius | 2 m |
| Number of IoT devices | 100 | Sensing radius | 1 m |
| Initial trustworthiness | 0.6 | Attack intensity | 0.2–0.6 |
| Packet length | 400–1000 |
| 0.2, 0.2, 0.4 |
| Initial energy | 10 J | Maximum iteration | 100 |
| 4 J | Hop limit | 2 |
Figure 2The energy consumption with T-S fuzzy trust model.
Figure 3The remaining energy for the T-S fuzzy trust model with different iterations.
Figure 4The running time of signature, encryption, and verification in different schemes against packet length.
Figure 5The time consumption with cluster formulation under different schemes in camouflage attack (hop limit = 1).
Figure 6The time consumption with cluster formulation under different schemes in camouflage attack (hop limit = 2).