Research on Internet of Things Vulnerability Based on Complex Network Attack Model
The Internet of Things brings convenience to people’s lives and it is also vulnerable to external attacks due to its own vulnerability. For this reason, analyzing the vulnerability of the Internet of Things is very necessary and meaningful. The paper starts with the characteristics of the Internet of Things and firstly constructs its network attack model. And then we simulate the attack on the model according to the attack rules. Furthermore, an experimental analysis of the nodes vulnerability is conducted by the theory of complex networks, and indicators of network characteristics are quantified based on the removal of vulnerable nodes. The experimental results show that the vulnerability of the system will show different patterns of attenuation as the proportion of node deletion increases.
KeywordsInternet of Things Complex network Vulnerability Attack model
- 1.Kumar, S.D., Thapliyal, H., Mohammad, A.: FinSAL: FinFET based secure adiabatic logic for energy-efficient and DPA resistant IoT devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. PP(99), 1 (2017)Google Scholar
- 8.Lv, H.Y., Wang, R.M.: Network real-time threat awareness and analysis based on attack state transition graph. In: ICT Energy Efficiency and Workshop on Information Theory and Security, pp. 198–203 (2012)Google Scholar