Skip to main content
Log in

Security threat model under internet of things using deep learning and edge analysis of cyberspace governance

  • Original article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

Under the background of information age, it is essential to cope with network security problems, ensure the popularization of Internet of Things (IoT) technology based on the Internet, and guarantee the information security, life security, and property security of all countries and individuals. Therefore, the principle and advantages of deep learning (DL) technology is expounded first, and then an IoT security threat model is established combined with edge computing (EC) technology. Additionally, the traditional algorithm is improved to be adapted to the application environment of the current United Nations cyberspace governance actions, and is trained and optimized by data sets. Finally, a modification plan is formulated according to the actual test results. In the experiment, EC is used to establish an excellent IoT security threat model with an efficient and accurate algorithm. The result shows that DL technology and EC technology significantly improve the judgment ability of the IoT security threat model and promote the efficiency of network space governance. This model can inspire the application of emerging computer technology to the IoT network and cyberspace governance, guarantee the construction of global information interconnection, and provide a reference for future research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Abdulkawi WM, Sheta AA (2020) High coding capacity chipless radiofrequency identification tags. Microw Opt Technol Lett 62(2):592–599

    Article  Google Scholar 

  • Aditya S, Ramasubbareddy S, Govinda K (2019) Estimation of web vulnerabilities based on attack tree and threat model analysis. J Comput Theor Nanosci 1(2):122–149

    Google Scholar 

  • Aghili SF, Ashouri-Talouki M, Mala H (2018) DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT. J Supercomput 74(1):509–525

    Article  Google Scholar 

  • Ahn J, Cho S, Chung DH (2017) Analysis of energy and control efficiencies of fuzzy logic and artificial neural network technologies in the heating energy supply system responding to the changes of user demands. Appl Energy 5(190):222–231

    Article  Google Scholar 

  • Ali A, Haseeb M (2019) Radio frequency identification (RFID) technology as a strategic tool towards higher performance of supply chain operations in textile and apparel industry of Malaysia. Uncertain Supply Chain Manag 7(2):215–226

    Article  Google Scholar 

  • Aufner P (2020) The IoT security gap: a look down into the valley between threat models and their implementation. Int J Inf Secur 19(1):3–14

    Article  Google Scholar 

  • Azmoodeh K (2019) Robust malware detection for intemet of Battlefield things devices using deep eigenspace leaming. IEEE Trans Sustain Comput 4(1):88–95

    Article  Google Scholar 

  • Basodi S, Ji C (2020) Gradient amplification: an efficient way to train deep neural networks. Big Data Mining Analytics 3(3):196–207

    Article  Google Scholar 

  • Bayat M, Atashgah MB, Barari M et al (2019) Cryptanalysis and improvement of a user authentication scheme for internet of things using elliptic curve cryptography. Int J Netw Secur 21(6):897–911

    Google Scholar 

  • Buldas A, Gadyatskaya O, Lenin A (2020) Attribute evaluation on attack trees with incomplete information. Comput Secur 88(6):1–17

    Google Scholar 

  • Chiou SY, Ko WT, Lu EH (2018) A secure ECC-based mobile RFID mutual authentication protocol and its application. Int J Netw Secur 20(2):396–402

    Google Scholar 

  • Dalal G, Gilboa E, Mannor S (2019) Chance-constrained outage scheduling using a machine learning proxy. Power Syst Trans 9(3):232–251

    Google Scholar 

  • Dhillon A, Verma GK (2020) Convolutional neural network: a review of models, methodologies and applications to object detection. Prog Artif Intell 9(2):85–112

    Article  Google Scholar 

  • Garg S, Aujla G, Kumar N (2019) Tree-based attack-defense model for risk assessment in multi-UAV networks. Consum Electron Mag 8(6):35–41

    Article  Google Scholar 

  • Ghazal TM, Hasan MK, Hassan R et al (2020) Security vulnerabilities, attacks, threats and the proposed countermeasures for the internet of things applications. Solid State Technol 63(1):1566–1567

    Google Scholar 

  • Herzog S, Tetzlaff C, Wrgtter F (2020) Evolving artificial neural networks with feedback. Neural Netw 123(1):153–162

    Article  Google Scholar 

  • Hosseinzadeh M, Quan T, Ali S et al (2020) A hybrid service selection and composition model for cloud-edge computing in the Internet of Things. Access 8(1):99–100

    Google Scholar 

  • Hou Y, Liang H, Liu J (2021) Super lightweight mobile RFID authentication protocol for bit replacement operation. Int J Mobile Comput Multimed Commun (IJMCMC) 12(1):63–77

    Article  Google Scholar 

  • Jaballah A, Meddeb A (2021) A new algorithm based CSP framework for RFID network planning. J Ambient Intell Humaniz Comput 12(2):2905–2914

    Article  Google Scholar 

  • Kumar C (2020) The united nations and global environmental governance. Strateg Anal 3(4):99–107

    Google Scholar 

  • Lambers L, Ricken T, Knig M (2019) Model order reduction (MOR) of function-erfusion-rowth simulation in the human fatty liver via artificial neural network (ANN). PAMM 19(1):23–51

    Article  Google Scholar 

  • Landaluce H, Arjona L, Perallos A et al (2020) A review of IoT sensing applications and challenges using RFID and wireless sensor networks. Sensors 20(9):2495

    Article  Google Scholar 

  • Nicolas G, Andrei M, Bradley G (2019) Deep learning from 21-cm tomography of the cosmic dawn and reionization. Mon Not R Astron Soc 3(1):1–7

    Google Scholar 

  • Pereira P, Araujo J, Melo C (2021) Analytical models for availability evaluation of edge and fog computing nodes. J Supercomput 7(2):191–213

    Google Scholar 

  • Poltavtseva M (2019) Big data management system security threat model. Autom Control Comput Sci 53(8):903–913

    Article  Google Scholar 

  • Rizvi S, Pipetti R, Mcintyre N et al (2020a) Threat model for securing internet of things (iot) network at device-level. Internet of Things 11(2):240–241

    Google Scholar 

  • Rizvi S, Pipetti R, Mcintyre N (2020b) Threat model for securing internet of things (IoT) network at device-level. Internet Things 11(2):100–121

    Google Scholar 

  • Sawyer S (2019) The. J Am Soc Inform Sci Technol 70(6):638–639

    Article  Google Scholar 

  • Sha K, Yang T, Wei W (2020) A survey of edge computing-based designs for IoT security. Digital Commun Netw 6(2):195–202

    Article  Google Scholar 

  • Shao B (2020) Design method of agricultural environmental monitoring system based on the internet of things. J Agri Mech Res 5(1):344–391

    Google Scholar 

  • Singh R, Singh E, Nalwa HS (2017) Inkjet printed nanomaterial based flexible radio frequency identification (RFID) tag sensors for the internet of nano things. RSC Adv 7(77):48597–48630

    Article  Google Scholar 

  • Singh MM, Adzman K, Hassan R (2018) Near field communication (NFC) technology security vulnerabilities and countermeasures. Int J Eng Technol 7(31):298–305

    Google Scholar 

  • Sinha B, Dhanalakshmi R (2020) Building a fuzzy logic-based McCulloch-Pitts neuron recommendation model to uplift accuracy. J Supercomput 1(8):12–28

    Google Scholar 

  • Van K (2019) Asymmetrical training scheme of binary-memristor-crossbar-based neural networks for energy-efficient edge-computing nanoscale systems. Micromachines 2(3):23–42

    Google Scholar 

  • Wang N, Wang P, Alipour-Fanid A et al (2019) Physical-layer security of 5gwireless networks for iot: challenges and opportunities. IEEE Internet of Things J 6(5):8169–8181

    Article  Google Scholar 

  • Yan B, Chen X, Yuan Q et al (2020) Sustainability in fresh agricultural product supply chain based on radio frequency identification under an emergency. CEJOR 28(4):1343–1361

    Article  MathSciNet  MATH  Google Scholar 

  • Yang H, Chen W (2020) Game modes and investment cost locations in radio-frequency identification (RFID) adoption. Eur J Oper Res 286(3):883–896

    Article  MathSciNet  MATH  Google Scholar 

  • Yang L, Ding C, Wu M et al (2019) Robust detection of false data injection attacksfor data aggregation in an Internet of Things-based environmental surveillance. Computer Networks 129(1):410–428

    Google Scholar 

Download references

Funding

This work was supported by the National Social Science Fund of China of the Youth Project “A Comparative Study on the Laws of Global Cyberspace Security Governance and Its Enlightenment to China” (Grant No. 19CXW039).

Author information

Authors and Affiliations

Authors

Contributions

All authors listed have made a substantial, direct and intellectual contribution to the work, and approved it for publication.

Corresponding author

Correspondence to Junwei Wang.

Ethics declarations

Conflict of interest

All Authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Z., Ge, Y., Guo, J. et al. Security threat model under internet of things using deep learning and edge analysis of cyberspace governance. Int J Syst Assur Eng Manag 13 (Suppl 3), 1164–1176 (2022). https://doi.org/10.1007/s13198-021-01533-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-021-01533-w

Keywords

Navigation