Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet of Things node selection method and system for privacy protection, equipment and terminal

A privacy protection and IoT technology, applied in the system, privacy protection IoT node optimization method, equipment and terminal fields, can solve the problem that the platform should not have prior knowledge of IoT nodes, does not conform to the actual scene, and does not consider perception quality value etc.

Active Publication Date: 2021-09-03
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (3) For the problem of unknown node selection, existing schemes use reinforcement learning methods to select multiple nodes to perform tasks together in each round. The condition or threshold for the end of the iteration
[0009] The difficulty in solving the above problems and defects is as follows: the traditional IoT node selection mechanism mainly screens through the information of IoT nodes, which not only exposes private information such as sensitive attributes of node capabilities, but also does not conform to the actual scenario, that is, the platform should not own IoT nodes. any prior knowledge of the node

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things node selection method and system for privacy protection, equipment and terminal
  • Internet of Things node selection method and system for privacy protection, equipment and terminal
  • Internet of Things node selection method and system for privacy protection, equipment and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0063] Aiming at the disclosure of private information such as sensitive attributes of node capabilities on existing technology platforms; the mechanism lacks effective judgment on data quality; in the actual IoT node selection scenario, the platform does not have any prior knowledge of nodes. The present invention provides a privacy-protected Internet of Things node optimization method, system, device, and terminal. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0064] Such as figure 1 As shown, the privacy-protected Internet of Things node preferred method provide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of Internet of Things, and discloses an Internet of Things node selection method and system for privacy protection, equipment and a terminal, the Internet of Things node selection method comprises the steps: modeling a selection problem of an unknown node as a multi-arm gambling machine problem of a multi-node game, and modeling node capability attributes as capability measurement parameters; carrying out a training process on capability measurement parameters based on a Thompson sampling algorithm to realize iterative selection of a node group; in the iteration process, updating the node capability parameters, wherein the nodes use a random response mechanism to disturb feedback values of the capability parameters of the nodes, so that the parameter updating process meets the localized differential privacy constraint. According to the method, the optimal node group can be selected through multiple iterations without context background, and the capability sensitive attributes of the nodes are not leaked. Experimental results show that compared with the prior art, the differentiated node selection method has high efficiency and is suitable for diversified perception tasks.

Description

technical field [0001] The invention belongs to the technical field of the Internet of Things, and in particular relates to a privacy-protected Internet of Things node optimization method, system, device and terminal. Background technique [0002] Currently, with the rapid development of information technology, the Internet of Things (IoT) paradigm has become one of the main attractions for researchers and enterprises. Many see this as the next major technological revolution. IoT is based on the ability of different objects to interact and collaborate to achieve a common goal with minimal human interaction. Such objects include sensors, RFID, actuators and mobile phones. In sensing applications, an important enabler of the IoT paradigm is the Wireless Sensor Network (WSN). A WSN is a network composed of a large number of small, cheap, and battery-powered devices (i.e., nodes equipped with sensors). Typically, these nodes process, store and communicate data, however, IoT ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L12/24G16Y30/10
CPCH04L63/0428H04L67/12H04L41/145H04L41/142G16Y30/10
Inventor 张涛王晗宇韩雅妮董学文沈玉龙宋雄飞
Owner XIDIAN UNIV