Method of Complex Internet of Things Simulation Attack and Reliability Analysis

  • Bingwei ChenEmail author
  • Zidi Chen
  • Hecun Yuan
  • Lanlan Rui
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 905)


In recent years, with the rapid development of Internet of Things, the scale of networks has gradually increased, link capacity has become higher and higher. In this context, the research on the reliability of complex networks has been paid more and more attention. The network reliability analysis and evaluation technology need to be implemented by a corresponding network simulation and reliability comprehensive test analysis system, and presented to the user in a variety of visual forms more intuitively, so as to be further applied to the actual network environment. Simulate the network attack mode under complex network environment and get the reliability evaluation results under different attack strategies. Establishing complex network simulation attacks and analyzing them is of great significance in evaluating the reliability of complex IoT topologies. In this paper, a complex network evaluation model was further established. At the same time, three kinds of strategies are designed to simulate attacks on complex networks. Based on Django and the smart home network, the method is implemented in a more appropriate form of visualization. Finally, the method is tested and analyzed. The results show that the method can better represent the process of complex network simulation attacks and the changes of network reliability indicators.


IoT Simulation attack Reliability analysis 



The work presented in this paper was supported by the National Natural Science Foundation of China (61302078, 61702048), 863 Program (2011AA01A102).


  1. 1.
    Islam, K., Shen, W., Wang, X.: Wireless sensor network reliability and security in factory automation: a survey. IEEE Trans. Syst. Man Cybern. Part C 42(6), 1243–1256 (2012)CrossRefGoogle Scholar
  2. 2.
    Chen, X.Z., Zhen, J.M., Liu, J., Zhen, Y.: Applications of IoT in smart grid. Electricity 33(2), 15–19 (2012)Google Scholar
  3. 3.
    Ni, X.P., Mei, S.W., Zhang, X.M.: Transmission lines’ vulnerability assessment based on complex network theory. Autom. Electr. Power Syst. 32, 1–5 (2008)Google Scholar
  4. 4.
    Wang, J., Sun, E., Xu, B., Li, P., Ni, C.: Abnormal cascading failure spreading on complex networks. Chaos Solitons Fractals Interdisc. J. Nonlinear Sci. Nonequilibrium Complex Phenomena 91, 695–701 (2016)zbMATHGoogle Scholar
  5. 5.
    Opsahl, T., Agneessens, F., Skvoretz, J.: Node centrality in weighted networks: generalizing degree and shortest paths. Soc. Netw. 32(3), 245–251 (2010)CrossRefGoogle Scholar
  6. 6.
    Meghanathan, N.: Spectral radius as a measure of variation in node degree for complex network graphs. In: International Conference on u- and e-Service, Science and Technology, pp. 30–33. IEEE (2015)Google Scholar
  7. 7.
    Nie, T., Guo, Z., Zhao, K., Lu, Z.M.: The dynamic correlation between degree and betweenness of complex network under attack. Phys. A Stat. Mech. Appl. 457, 129–137 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Bingwei Chen
    • 1
    Email author
  • Zidi Chen
    • 1
  • Hecun Yuan
    • 1
  • Lanlan Rui
    • 1
  1. 1.State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijingChina

Personalised recommendations