当前位置: X-MOL 学术IEEE Trans. Control Netw. Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Optimal Secure Two-Layer IoT Network Design
IEEE Transactions on Control of Network Systems ( IF 4.0 ) Pub Date : 2019-03-25 , DOI: 10.1109/tcns.2019.2906893
Juntao Chen , Corinne Touati , Quanyan Zhu

With the remarkable growth of the Internet and communication technologies over the past few decades, Internet of Things (IoTs) is enabling the ubiquitous connectivity of heterogeneous physical devices with software, sensors, and actuators. IoT networks are naturally two layers with the cloud and cellular networks coexisting with the underlaid device-to-device communications. The connectivity of IoTs plays an important role in information dissemination for mission-critical and civilian applications. However, IoT communication networks are vulnerable to cyber attacks including the denial-of-service and jamming attacks, resulting in link removals in the IoT network. In this paper, we develop a heterogeneous IoT network design framework in which a network designer can add links to provide additional communication paths between two nodes or secure links against attacks by investing resources. By anticipating the strategic cyber attacks, we characterize the optimal design of the secure IoT network by first providing a lower bound on the number of links a secure network requires for a given budget of protected links, and then developing a method to construct networks that satisfy the heterogeneous network design specifications. Therefore, each layer of the designed heterogeneous IoT network is resistant to a predefined level of malicious attacks with minimum resources. Finally, we provide case studies on the Internet of Battlefield Things to corroborate and illustrate our obtained results.

中文翻译:

最佳的安全两层物联网网络设计

在过去的几十年中,随着Internet和通信技术的飞速发展,物联网(IoT)正在实现异构物理设备与软件,传感器和执行器的普遍连接。物联网网络自然是两层,其中云和蜂窝网络与底层的设备到设备通信共存。物联网的连通性在关键任务和民用应用的信息传播中起着重要作用。但是,物联网通信网络容易受到包括拒绝服务和干扰攻击在内的网络攻击,从而导致物联网网络中的链路被删除。在本文中,我们开发了一个异构的IoT网络设计框架,其中网络设计师可以添加链接以在两个节点之间提供附加的通信路径,或者通过投资来保护链接免受攻击。通过预见战略性网络攻击,我们首先确定安全网络在给定的受保护链接预算下所需的链接数量下限,然后制定一种构建满足以下条件的网络的方法,从而确定安全物联网网络的最佳设计:异构网络设计规范。因此,设计的异构物联网网络的每一层都可以使用最少的资源抵御预定义级别的恶意攻击。最后,我们在《战地物联网》上提供了案例研究,以证实和说明我们获得的结果。
更新日期:2020-04-22
down
wechat
bug