• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Ning, Zhenhu (Ning, Zhenhu.) | Gong, Bei (Gong, Bei.) (Scholars:公备) | Xu, Meng (Xu, Meng.) | Zhou, Caiqiu (Zhou, Caiqiu.)

Indexed by:

EI Scopus SCIE

Abstract:

Trusted date collection is the precondition of the security of Internet of Things (IOT). Recently, compressed sensing technology, which can enable the reduction of the energy consumption and time delay of data collection, has been extensively studied in IOT; However, the security of compressed sensing technology in IOT has not been sufficiently considered. Since compressed sensing depends the cooperation between IOT nodes and then sensing data is transparent for all IOT nodes, which is subjected to malicious nodes attack. Therefore, we propose a trusted data collection scheme based on compressed sensing oriented to the IOT. When data collection is tampered with, the scheme can detect malicious nodes. Experiments demonstrate that the proposed scheme can ensure data security with a low energy consumption. © 2021 John Wiley & Sons, Ltd.

Keyword:

Internet of things Energy utilization Compressed sensing Trusted computing Data acquisition

Author Community:

  • [ 1 ] [Ning, Zhenhu]Faculty of Information Technology, Beijing University of Technology, Beijing, China
  • [ 2 ] [Ning, Zhenhu]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China
  • [ 3 ] [Ning, Zhenhu]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China
  • [ 4 ] [Gong, Bei]Faculty of Information Technology, Beijing University of Technology, Beijing, China
  • [ 5 ] [Gong, Bei]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China
  • [ 6 ] [Gong, Bei]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China
  • [ 7 ] [Xu, Meng]Faculty of Information Technology, Beijing University of Technology, Beijing, China
  • [ 8 ] [Xu, Meng]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China
  • [ 9 ] [Xu, Meng]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China
  • [ 10 ] [Zhou, Caiqiu]Faculty of Information Technology, Nanjing University of Technology, Nanjing, China

Reprint Author's Address:

  • [ning, zhenhu]beijing key laboratory of trusted computing, beijing university of technology, beijing, china;;[ning, zhenhu]faculty of information technology, beijing university of technology, beijing, china;;[ning, zhenhu]national engineering laboratory for critical technologies of information security classified protection, beijing, china

Show more details

Related Keywords:

Source :

Concurrency Computation

ISSN: 1532-0626

Year: 2021

Issue: 10

Volume: 33

2 . 0 0 0

JCR@2022

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:87

JCR Journal Grade:3

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 8

Online/Total:1058/10690771
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.