Abstract
Under the background of information age, it is essential to cope with network security problems, ensure the popularization of Internet of Things (IoT) technology based on the Internet, and guarantee the information security, life security, and property security of all countries and individuals. Therefore, the principle and advantages of deep learning (DL) technology is expounded first, and then an IoT security threat model is established combined with edge computing (EC) technology. Additionally, the traditional algorithm is improved to be adapted to the application environment of the current United Nations cyberspace governance actions, and is trained and optimized by data sets. Finally, a modification plan is formulated according to the actual test results. In the experiment, EC is used to establish an excellent IoT security threat model with an efficient and accurate algorithm. The result shows that DL technology and EC technology significantly improve the judgment ability of the IoT security threat model and promote the efficiency of network space governance. This model can inspire the application of emerging computer technology to the IoT network and cyberspace governance, guarantee the construction of global information interconnection, and provide a reference for future research.
Similar content being viewed by others
References
Abdulkawi WM, Sheta AA (2020) High coding capacity chipless radiofrequency identification tags. Microw Opt Technol Lett 62(2):592–599
Aditya S, Ramasubbareddy S, Govinda K (2019) Estimation of web vulnerabilities based on attack tree and threat model analysis. J Comput Theor Nanosci 1(2):122–149
Aghili SF, Ashouri-Talouki M, Mala H (2018) DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT. J Supercomput 74(1):509–525
Ahn J, Cho S, Chung DH (2017) Analysis of energy and control efficiencies of fuzzy logic and artificial neural network technologies in the heating energy supply system responding to the changes of user demands. Appl Energy 5(190):222–231
Ali A, Haseeb M (2019) Radio frequency identification (RFID) technology as a strategic tool towards higher performance of supply chain operations in textile and apparel industry of Malaysia. Uncertain Supply Chain Manag 7(2):215–226
Aufner P (2020) The IoT security gap: a look down into the valley between threat models and their implementation. Int J Inf Secur 19(1):3–14
Azmoodeh K (2019) Robust malware detection for intemet of Battlefield things devices using deep eigenspace leaming. IEEE Trans Sustain Comput 4(1):88–95
Basodi S, Ji C (2020) Gradient amplification: an efficient way to train deep neural networks. Big Data Mining Analytics 3(3):196–207
Bayat M, Atashgah MB, Barari M et al (2019) Cryptanalysis and improvement of a user authentication scheme for internet of things using elliptic curve cryptography. Int J Netw Secur 21(6):897–911
Buldas A, Gadyatskaya O, Lenin A (2020) Attribute evaluation on attack trees with incomplete information. Comput Secur 88(6):1–17
Chiou SY, Ko WT, Lu EH (2018) A secure ECC-based mobile RFID mutual authentication protocol and its application. Int J Netw Secur 20(2):396–402
Dalal G, Gilboa E, Mannor S (2019) Chance-constrained outage scheduling using a machine learning proxy. Power Syst Trans 9(3):232–251
Dhillon A, Verma GK (2020) Convolutional neural network: a review of models, methodologies and applications to object detection. Prog Artif Intell 9(2):85–112
Garg S, Aujla G, Kumar N (2019) Tree-based attack-defense model for risk assessment in multi-UAV networks. Consum Electron Mag 8(6):35–41
Ghazal TM, Hasan MK, Hassan R et al (2020) Security vulnerabilities, attacks, threats and the proposed countermeasures for the internet of things applications. Solid State Technol 63(1):1566–1567
Herzog S, Tetzlaff C, Wrgtter F (2020) Evolving artificial neural networks with feedback. Neural Netw 123(1):153–162
Hosseinzadeh M, Quan T, Ali S et al (2020) A hybrid service selection and composition model for cloud-edge computing in the Internet of Things. Access 8(1):99–100
Hou Y, Liang H, Liu J (2021) Super lightweight mobile RFID authentication protocol for bit replacement operation. Int J Mobile Comput Multimed Commun (IJMCMC) 12(1):63–77
Jaballah A, Meddeb A (2021) A new algorithm based CSP framework for RFID network planning. J Ambient Intell Humaniz Comput 12(2):2905–2914
Kumar C (2020) The united nations and global environmental governance. Strateg Anal 3(4):99–107
Lambers L, Ricken T, Knig M (2019) Model order reduction (MOR) of function-erfusion-rowth simulation in the human fatty liver via artificial neural network (ANN). PAMM 19(1):23–51
Landaluce H, Arjona L, Perallos A et al (2020) A review of IoT sensing applications and challenges using RFID and wireless sensor networks. Sensors 20(9):2495
Nicolas G, Andrei M, Bradley G (2019) Deep learning from 21-cm tomography of the cosmic dawn and reionization. Mon Not R Astron Soc 3(1):1–7
Pereira P, Araujo J, Melo C (2021) Analytical models for availability evaluation of edge and fog computing nodes. J Supercomput 7(2):191–213
Poltavtseva M (2019) Big data management system security threat model. Autom Control Comput Sci 53(8):903–913
Rizvi S, Pipetti R, Mcintyre N et al (2020a) Threat model for securing internet of things (iot) network at device-level. Internet of Things 11(2):240–241
Rizvi S, Pipetti R, Mcintyre N (2020b) Threat model for securing internet of things (IoT) network at device-level. Internet Things 11(2):100–121
Sawyer S (2019) The. J Am Soc Inform Sci Technol 70(6):638–639
Sha K, Yang T, Wei W (2020) A survey of edge computing-based designs for IoT security. Digital Commun Netw 6(2):195–202
Shao B (2020) Design method of agricultural environmental monitoring system based on the internet of things. J Agri Mech Res 5(1):344–391
Singh R, Singh E, Nalwa HS (2017) Inkjet printed nanomaterial based flexible radio frequency identification (RFID) tag sensors for the internet of nano things. RSC Adv 7(77):48597–48630
Singh MM, Adzman K, Hassan R (2018) Near field communication (NFC) technology security vulnerabilities and countermeasures. Int J Eng Technol 7(31):298–305
Sinha B, Dhanalakshmi R (2020) Building a fuzzy logic-based McCulloch-Pitts neuron recommendation model to uplift accuracy. J Supercomput 1(8):12–28
Van K (2019) Asymmetrical training scheme of binary-memristor-crossbar-based neural networks for energy-efficient edge-computing nanoscale systems. Micromachines 2(3):23–42
Wang N, Wang P, Alipour-Fanid A et al (2019) Physical-layer security of 5gwireless networks for iot: challenges and opportunities. IEEE Internet of Things J 6(5):8169–8181
Yan B, Chen X, Yuan Q et al (2020) Sustainability in fresh agricultural product supply chain based on radio frequency identification under an emergency. CEJOR 28(4):1343–1361
Yang H, Chen W (2020) Game modes and investment cost locations in radio-frequency identification (RFID) adoption. Eur J Oper Res 286(3):883–896
Yang L, Ding C, Wu M et al (2019) Robust detection of false data injection attacksfor data aggregation in an Internet of Things-based environmental surveillance. Computer Networks 129(1):410–428
Funding
This work was supported by the National Social Science Fund of China of the Youth Project “A Comparative Study on the Laws of Global Cyberspace Security Governance and Its Enlightenment to China” (Grant No. 19CXW039).
Author information
Authors and Affiliations
Contributions
All authors listed have made a substantial, direct and intellectual contribution to the work, and approved it for publication.
Corresponding author
Ethics declarations
Conflict of interest
All Authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Li, Z., Ge, Y., Guo, J. et al. Security threat model under internet of things using deep learning and edge analysis of cyberspace governance. Int J Syst Assur Eng Manag 13 (Suppl 3), 1164–1176 (2022). https://doi.org/10.1007/s13198-021-01533-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-021-01533-w