Advertisement

Research on Internet of Things Vulnerability Based on Complex Network Attack Model

  • Chengxiang LiuEmail author
  • Wei Xiong
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 972)

Abstract

The Internet of Things brings convenience to people’s lives and it is also vulnerable to external attacks due to its own vulnerability. For this reason, analyzing the vulnerability of the Internet of Things is very necessary and meaningful. The paper starts with the characteristics of the Internet of Things and firstly constructs its network attack model. And then we simulate the attack on the model according to the attack rules. Furthermore, an experimental analysis of the nodes vulnerability is conducted by the theory of complex networks, and indicators of network characteristics are quantified based on the removal of vulnerable nodes. The experimental results show that the vulnerability of the system will show different patterns of attenuation as the proportion of node deletion increases.

Keywords

Internet of Things Complex network Vulnerability Attack model 

References

  1. 1.
    Kumar, S.D., Thapliyal, H., Mohammad, A.: FinSAL: FinFET based secure adiabatic logic for energy-efficient and DPA resistant IoT devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. PP(99), 1 (2017)Google Scholar
  2. 2.
    Zhang, J., Tian, G.Y., Zhao, A.B.: Passive RFID sensor systems for crack detection & characterization. NDT E Int. 86, 89–99 (2016)CrossRefGoogle Scholar
  3. 3.
    Li, F., Han, Y., Jin, C.: Certificateless online/offline signcryption for the Internet of Things. Wirel. Netw. 23(1), 1–14 (2017)CrossRefGoogle Scholar
  4. 4.
    Benaissa, S., Plets, D., Tanghe, E., et al.: Internet of animals: characterisation of LoRa sub-GHz off-body wireless channel in dairy barns. Electron. Lett. 53(18), 1281–1283 (2017)CrossRefGoogle Scholar
  5. 5.
    Sulyman, A.I., Oteafy, S.M.A., Hassanein, H.S.: Expanding the cellular-IoT umbrella: an architectural approach. IEEE Wirel. Commun. 24(3), 66–71 (2017)CrossRefGoogle Scholar
  6. 6.
    Quiers, M., Batiot-Guilhe, C., Bicalho, C.C., et al.: Characterisation of rapid infiltration flows and vulnerability in a karst aquifer using a decomposed fluorescence signal of dissolved organic matter. Environ. Earth Sci. 71(2), 553–561 (2014)CrossRefGoogle Scholar
  7. 7.
    Bertino, E., Islam, N.: Botnets and Internet of Things security. Computer 50(2), 76–79 (2017)CrossRefGoogle Scholar
  8. 8.
    Lv, H.Y., Wang, R.M.: Network real-time threat awareness and analysis based on attack state transition graph. In: ICT Energy Efficiency and Workshop on Information Theory and Security, pp. 198–203 (2012)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Company of Postgraduate ManagementSpace Engineering UniversityBeijingChina
  2. 2.Science and Technology on Complex Electronic System Simulation LaboratorySpace Engineering UniversityBeijingChina

Personalised recommendations