Bayesian Game-Based Privacy Protection Method for Internet of Things Nodes under Fog Computing Architecture

A privacy protection and Internet of Things technology, which is applied in the field of privacy protection of Internet of Things nodes based on Bayesian game, can solve the problems of limited computing power of Internet of Things nodes, no consideration of malicious nodes and normal nodes of Internet of Things nodes, etc.

Active Publication Date: 2022-05-10
SHAOXING UNIVERSITY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the above defects or improvement needs of the prior art, the present invention provides a Bayesian game-based privacy protection method for IoT nodes under the fog computing framework. Normal nodes, and technical issues with limited computing power of IoT nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bayesian Game-Based Privacy Protection Method for Internet of Things Nodes under Fog Computing Architecture
  • Bayesian Game-Based Privacy Protection Method for Internet of Things Nodes under Fog Computing Architecture
  • Bayesian Game-Based Privacy Protection Method for Internet of Things Nodes under Fog Computing Architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0058] The Bayesian game-based privacy protection method for Internet of Things nodes under the fog computing architecture provided by the present invention is applied in an environment including Internet of Things nodes and fog computing nodes, wherein the Internet of Things nodes include a series of sensing nodes to achieve real-time online Monitoring, positioning traceability, remote control and other management or ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Bayesian game-based privacy protection method for Internet of Things nodes under the fog computing framework, which is applied in an environment including Internet of Things nodes and fog computing nodes, wherein the Internet of Things nodes include a series of sensing nodes, realizing real-time online Monitoring, positioning traceability, remote control and other management or application functions; fog computing nodes, as edge nodes of the Internet of Things, have strong computing and storage resources, can support complex privacy protection calculations, detect IoT nodes, and implement privacy protection Various calculations of protection. The IoT node privacy protection method provided by the present invention is based on the Bayesian game model to model the malicious nodes and normal nodes existing in the actual IoT, and the fog computing nodes detect the IoT nodes according to the optimal probability, so that the The privacy leakage of networked nodes is minimal.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things security, and more specifically, relates to a privacy protection method for Internet of Things nodes based on a Bayesian game under a fog computing architecture. Background technique [0002] The Internet of Things combines physical objects and the Internet in different areas of life, such as industry, family, hospital, and environmental monitoring, and utilizes ubiquitous computing, embedded devices, communication technologies, sensor networks, Internet protocols, and applications to transform these objects from traditional become intelligent. However, due to the nature of IoT connectivity, an important issue facing IoT is security and privacy. [0003] Most IoT applications are connected by wireless communication. In practical applications, users more or less need to provide sensitive privacy information such as their identity information and geographical location, which are likely t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/10H04L67/12G16Y30/10
CPCH04L63/1416H04L67/10H04L67/12G16Y30/10
Inventor 沈士根刘建华黄龙军周海平冯晟方朝曦吴宗大和青青
Owner SHAOXING UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products