-
آرشیو :
نسخه زمستان 1397
-
موضوع :
فناوری اطلاعات
-
نویسنده/گان :
توحید ساکت
-
کلید واژه :
اینترنت اشیاء، مدل هرج و مرج، امنیت اینترنت اشیاء، رمزنگاری کلید، الگوریتم.
-
Title :
Security Improving of Internet of Things Base on Chaotic algorithm
-
Abstract :
With the continuous development of information technology in the present age, computer technology has become an important medium for transmitting information in people's lives, and the Internet of Things has led to the rapid advancement of technologies such as data perception, wireless data transmission and intelligent information processing. With the increase in information transfer along with issues such as speed and quality, information security should also be given a lot of attention. In this regard, SMT protocol (secure message transfer protocol) is used to transfer the key. In this paper, an attempt has been made to generate a high-sensitivity, quasi-random key using a chaotic algorithm to encrypt the information, and the key is transmitted to the receiver via the MODSMT (Modified Secure Transmission) protocol. The use of encrypted information can only be reopened by the recipient.
-
مراجع :
1. Deng, L., Li, D., Cai, Z., & Hong, L. (2019). Smart IOT information transmission and security optimization model based on chaotic neural computing. Neural Computing and Applications, 1-14.
2. Wang N, Gao X, Tao D, Yang H, Li X (2018) Facial feature point detection: a comprehensive survey. Neurocomputing275:50–65.
3. Ghorai G, Pal M (2018) A note on ‘‘Regular bipolar fuzzy graphs’’ Neural Computing and Applications 21 (1) (2012) 197–205. Neural Compute Apply 30(5):1569–1572.
4. Qiu Y, Bi Y, Li Y, Wang H (2018) High resolution remote sensing image denoising algorithm based on sparse representation and adaptive dictionary learning. In Computational vision and bio inspired computing. Springer, Cham, pp 892–901
5. Wang N, Gao X, Li J (2018) Random sampling for fast face sketch synthesis. Pattern Recogn 76:215–227
6. Dadras S, Momeni H.R(2009) A novel three-dimensional autonomous chaotic system generating two, three and four-scroll attractors. doi:10.1016/j.physleta.2009.07.088
7. Faezeh Rezaee, Dr Masode Taleb Ziabari, Dr Ahmad Bagheri (2019), Encrypting information using the chaotic model in IOT,http/:csc2019.guilan.ac.ir
8. Niu Z, Hua G, Wang L, Gao X (2018) Knowledge-based topic model for unsupervised object discovery and localization. IEEE Trans Image Process 27(1):50–63
9. Y. A. Liu, Q. Yu, S. G. Hu, G. C. Qiao, and Y. Liu(2019) A memristor-based transient chaotic neural network model and its application. https://doi.org/10.1063/1.5115540
10. L.Salim, B.Stelios (2019) Cryptocurrency forecasting with deep learning chaotic neural networks.
https://doi.org/10.1016/j.chaos.2018.11.014
11. C.Stergiou, K.E. Psannis, B-Gyu.Kim, B.Gupta (2016) Secure integration of IoT and Cloud Computing.http://dx.doi.org/10.1016/j.future.2016.11.031
- صفحات : 64-73
-
دانلود فایل
( 604 KB )