Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks.

Sensors (Basel)

School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, Zhejiang, China.

Published: September 2019

The privacy and security of the Internet of Things (IoT) are emerging as popular issues in the IoT. At present, there exist several pieces of research on network analysis on the IoT network, and malicious network analysis may threaten the privacy and security of the leader in the IoT networks. With this in mind, we focus on how to avoid malicious network analysis by modifying the topology of the IoT network and we choose closeness centrality as the network analysis tool. This paper makes three key contributions toward this problem: (1) An optimization problem of removing edges to minimize (maximize) the closeness value (rank) of the leader; (2) A greedy (greedy and simulated annealing) algorithm to solve the closeness value (rank) case of the proposed optimization problem in polynomial time; and (3)UpdateCloseness (FastTopRank)-algorithm for computing closeness value (rank) efficiently. Experimental results prove the efficiency of our pruning algorithms and show that our heuristic algorithms can obtain accurate solutions compared with the optimal solution (the approximation ratio in the worst case is 0.85) and outperform the solutions obtained by other baseline algorithms (e.g., choose edges with the highest degree sum).

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6767009PMC
http://dx.doi.org/10.3390/s19183886DOI Listing

Publication Analysis

Top Keywords

network analysis
16
closeness rank
12
leader iot
8
iot networks
8
privacy security
8
iot network
8
malicious network
8
optimization problem
8
iot
6
network
6

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!