Research on the Secure Seeking for the Underground Parties in Internet of Things
With the developing of Internet of things, security has become a significant issue for researchers. This paper proposes the concept of underground party in internet of things or sensor networks and mainly discusses the secured problem of seeking underground party node using secure multiparty computation and information hiding technology. Based on wireless sensor network model assumption, we adopted the information hiding algorithm combined with (m, N) oblivious transfer protocol and dynamic union-find set to realize the above mentioned seeking process, and then it compares the time efficiency between optimization to the trust relationship pairs and non-optimization to that. Thereafter, we analyzed the merits and demerits of “on demand seeking” and “real time seeking”. At last, based on attacker interference probability model, we discussed the impact on secure seeking from inaccurate decision owed to false positive or negative rate.
No Reference information available - sign in for access.
No Citation information available - sign in for access.
No Supplementary Data.
No Article Media
Document Type: Research Article
Publication date: March 1, 2012
More about this publication?
- ADVANCED SCIENCE LETTERS is an international peer-reviewed journal with a very wide-ranging coverage, consolidates research activities in all areas of (1) Physical Sciences, (2) Biological Sciences, (3) Mathematical Sciences, (4) Engineering, (5) Computer and Information Sciences, and (6) Geosciences to publish original short communications, full research papers and timely brief (mini) reviews with authors photo and biography encompassing the basic and applied research and current developments in educational aspects of these scientific areas.
- Editorial Board
- Information for Authors
- Subscribe to this Title
- Ingenta Connect is not responsible for the content or availability of external websites