Abstract
The Internet of Things brings convenience to people’s lives and it is also vulnerable to external attacks due to its own vulnerability. For this reason, analyzing the vulnerability of the Internet of Things is very necessary and meaningful. The paper starts with the characteristics of the Internet of Things and firstly constructs its network attack model. And then we simulate the attack on the model according to the attack rules. Furthermore, an experimental analysis of the nodes vulnerability is conducted by the theory of complex networks, and indicators of network characteristics are quantified based on the removal of vulnerable nodes. The experimental results show that the vulnerability of the system will show different patterns of attenuation as the proportion of node deletion increases.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kumar, S.D., Thapliyal, H., Mohammad, A.: FinSAL: FinFET based secure adiabatic logic for energy-efficient and DPA resistant IoT devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. PP(99), 1 (2017)
Zhang, J., Tian, G.Y., Zhao, A.B.: Passive RFID sensor systems for crack detection & characterization. NDT E Int. 86, 89–99 (2016)
Li, F., Han, Y., Jin, C.: Certificateless online/offline signcryption for the Internet of Things. Wirel. Netw. 23(1), 1–14 (2017)
Benaissa, S., Plets, D., Tanghe, E., et al.: Internet of animals: characterisation of LoRa sub-GHz off-body wireless channel in dairy barns. Electron. Lett. 53(18), 1281–1283 (2017)
Sulyman, A.I., Oteafy, S.M.A., Hassanein, H.S.: Expanding the cellular-IoT umbrella: an architectural approach. IEEE Wirel. Commun. 24(3), 66–71 (2017)
Quiers, M., Batiot-Guilhe, C., Bicalho, C.C., et al.: Characterisation of rapid infiltration flows and vulnerability in a karst aquifer using a decomposed fluorescence signal of dissolved organic matter. Environ. Earth Sci. 71(2), 553–561 (2014)
Bertino, E., Islam, N.: Botnets and Internet of Things security. Computer 50(2), 76–79 (2017)
Lv, H.Y., Wang, R.M.: Network real-time threat awareness and analysis based on attack state transition graph. In: ICT Energy Efficiency and Workshop on Information Theory and Security, pp. 198–203 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, C., Xiong, W. (2019). Research on Internet of Things Vulnerability Based on Complex Network Attack Model. In: Yu, Q. (eds) Space Information Networks. SINC 2018. Communications in Computer and Information Science, vol 972. Springer, Singapore. https://doi.org/10.1007/978-981-13-5937-8_4
Download citation
DOI: https://doi.org/10.1007/978-981-13-5937-8_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5936-1
Online ISBN: 978-981-13-5937-8
eBook Packages: Computer ScienceComputer Science (R0)