Adaboost-based security level classification of mobile intelligent terminals
- 71 Downloads
With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results to the security level. Finally, a scheme of security level classification for mobile intelligent terminals based on Adaboost algorithm is proposed. The experimental results demonstrate that compared to a baseline that statistically calculates the security level, the proposed method can complete the security level classification with lower latency and high accuracy when massive mobile intelligent terminals access the network at the same time.
KeywordsInternet of Things Adaboost Edge server Mobile intelligent terminal Security level classification
This work was supported by National Natural Science Foundation of China (No. 61571104), Sichuan Science and Technology Program (No. 2018JY0539), Key projects of the Sichuan Provincial Education Department (No. 18ZA0219), Fundamental Research Funds for the Central Universities (No. ZYGX2017KYQD170) and Innovation Funding (No. 2018510007000134). The authors wish to thank the reviewers for their helpful comments. Dr. Dingde Jiang and Dr. Hong Wen are corresponding authors of this paper.
- 4.Lee YK, Kim JN, Lim KS et al (2017) Secure mobile device structure for trust IoT. J Supercomput 2017(7):1–19Google Scholar
- 6.Kraijak S, Tuwanut P (2015) A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends. In: Proceedings of the WiCOM’15, pp 1–6Google Scholar
- 14.Jia Q, Guo L, Jin Z et al (2016) Privacy-preserving data classification and similarity evaluation for distributed systems. In: Proceedings of the ICDCS’16, pp 690–699Google Scholar
- 16.Irwan D, Asnar Y, Hendradjaya B (2015) Confidentiality and privacy information security risk assessment for Android-based mobile devices. In: Proceedings of the ICoDSE’15, pp 1–6 Google Scholar
- 20.Ding X, Jiang T, Zou W (2017) A new method of dynamic gesture recognition using Wi-Fi signals based on Adaboost. In: Proceedings of the ISCIT’17, pp 1–5Google Scholar
- 23.Jiang D, Huo L, Li Y (2018) Fine-granularity inference and estimations to network traffic for SDN. PLoS ONE 13(5):1–23Google Scholar