Skip to main content

Research on Internet of Things Vulnerability Based on Complex Network Attack Model

  • Conference paper
  • First Online:
  • 732 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 972))

Abstract

The Internet of Things brings convenience to people’s lives and it is also vulnerable to external attacks due to its own vulnerability. For this reason, analyzing the vulnerability of the Internet of Things is very necessary and meaningful. The paper starts with the characteristics of the Internet of Things and firstly constructs its network attack model. And then we simulate the attack on the model according to the attack rules. Furthermore, an experimental analysis of the nodes vulnerability is conducted by the theory of complex networks, and indicators of network characteristics are quantified based on the removal of vulnerable nodes. The experimental results show that the vulnerability of the system will show different patterns of attenuation as the proportion of node deletion increases.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kumar, S.D., Thapliyal, H., Mohammad, A.: FinSAL: FinFET based secure adiabatic logic for energy-efficient and DPA resistant IoT devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. PP(99), 1 (2017)

    Google Scholar 

  2. Zhang, J., Tian, G.Y., Zhao, A.B.: Passive RFID sensor systems for crack detection & characterization. NDT E Int. 86, 89–99 (2016)

    Article  Google Scholar 

  3. Li, F., Han, Y., Jin, C.: Certificateless online/offline signcryption for the Internet of Things. Wirel. Netw. 23(1), 1–14 (2017)

    Article  Google Scholar 

  4. Benaissa, S., Plets, D., Tanghe, E., et al.: Internet of animals: characterisation of LoRa sub-GHz off-body wireless channel in dairy barns. Electron. Lett. 53(18), 1281–1283 (2017)

    Article  Google Scholar 

  5. Sulyman, A.I., Oteafy, S.M.A., Hassanein, H.S.: Expanding the cellular-IoT umbrella: an architectural approach. IEEE Wirel. Commun. 24(3), 66–71 (2017)

    Article  Google Scholar 

  6. Quiers, M., Batiot-Guilhe, C., Bicalho, C.C., et al.: Characterisation of rapid infiltration flows and vulnerability in a karst aquifer using a decomposed fluorescence signal of dissolved organic matter. Environ. Earth Sci. 71(2), 553–561 (2014)

    Article  Google Scholar 

  7. Bertino, E., Islam, N.: Botnets and Internet of Things security. Computer 50(2), 76–79 (2017)

    Article  Google Scholar 

  8. Lv, H.Y., Wang, R.M.: Network real-time threat awareness and analysis based on attack state transition graph. In: ICT Energy Efficiency and Workshop on Information Theory and Security, pp. 198–203 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chengxiang Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, C., Xiong, W. (2019). Research on Internet of Things Vulnerability Based on Complex Network Attack Model. In: Yu, Q. (eds) Space Information Networks. SINC 2018. Communications in Computer and Information Science, vol 972. Springer, Singapore. https://doi.org/10.1007/978-981-13-5937-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5937-8_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5936-1

  • Online ISBN: 978-981-13-5937-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics