IEEE Access (Jan 2018)

Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things

  • Aimin Yang,
  • Yifan Li,
  • Fanbei Kong,
  • Guoqing Wang,
  • Enhong Chen

DOI
https://doi.org/10.1109/ACCESS.2018.2868951
Journal volume & issue
Vol. 6
pp. 50187 – 50196

Abstract

Read online

The Internet of Things (IoT) is widely valued by governments, academia, and industry for its huge application prospects. The core concepts of IoT are perception, control, transmission, and intelligence. It uses technology to achieve the synergy between objects and objects, people and things, and people and people so that the sensor network, the Internet and mobile communication network are based on the formation of a larger complex network system. First, a high order voting algorithm for object-networked control is proposed. In this paper, the algorithm redundancy design method for an industrial control network is studied, and the importance of the algorithmic level heterogeneous redundancy is discussed. The most popular voting algorithms are improved, and an improved majority voting algorithm is proposed. Then, it is compared with the standard majority voting algorithm and the median voting algorithm, which proves that the improved algorithm has higher accuracy and output efficiency. Then, a new security key pre-distribution scheme based on the elliptic curve is proposed, which uses different base points of the elliptic curve as the seed key group, and the probability of two neighboring nodes sharing the same private key is large by selecting the appropriate private key ring size. Other neighboring nodes that do not share the private key can secure communications through the intermediate nodes using the path key, thus guaranteeing the security of the entire sensor network’s private communications. The simulation results show that the proposed scheme has good network connectivity and defensive.

Keywords