Abstract

In order to prove the effect of data fusion technology in the Internet of things, a wireless sensor Internet of things security technology based on data fusion is designed, and the impact of data fusion in the field of communication technology is studied. Therefore, two security fusion algorithms are designed on the basis of analyzing and comparing the advantages and disadvantages of various security fusion algorithms, namely, data security fusion algorithm EDCSDA and approximate fusion algorithm PADSA. By analyzing the probability distribution model of the data collected by the nodes, the disturbance data is superimposed on the original data to hide the effect of the original data. A test bed system for perception layer of the Internet of things is designed and implemented. The test results prove the feasibility of the two algorithms. Meanwhile, it shows that the two algorithms can reduce the transmission overhead of the network while guaranteeing the security. Based on the above finding, it is concluded that data fusion technology is very effective for improving network efficiency and prolonging the network life cycle as one of the key technologies in the perception layer of Internet of things.

Highlights

  • The Internet of things (IOT) refers to the acquisition of physical world information or control of objects in the physical world by deploying a variety of devices that have certain capabilities such as perception, computation, execution, and communication

  • The results show that the ECDSDA method has obvious advantages over the CMT method in terms of transmission overhead, and improves the security

  • The results show that the PADSA method has obvious advantages over the EDCDSA algorithm proposed in the previous chapter and the CMT algorithm in terms of transmission overhead, but the fusion result is approximate

Read more

Summary

Introduction

The Internet of things (IOT) refers to the acquisition of physical world information or control of objects in the physical world by deploying a variety of devices that have certain capabilities such as perception, computation, execution, and communication. The perceived extension network of the Internet of things perception layer has the characteristics of large number of nodes, large scale and data multi hop transmission. Huge transmission and computation overhead will be generated, resulting in network congestion and excessive consumption of resources [2]. In the routing protocol, the transmission overhead can be reduced by adding the data fusion to the nodes. Data fusion brings new security problems while reducing network overhead. A certain security mechanism in routing protocols is needed to improve the security of the fusion algorithm. The main task at this stage is to find high efficiency, high energy saving and high stability data security fusion algorithm to improve network performance and ensure the communication security of the Internet of things perception layer

The data security fusion scheme
Network model and security hypothesis
Document content
Example verifications
Performance analysis
Approximate fusion method based on probability distribution
Acquisition data distribution model
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.