Research on Internet of Things Vulnerability Based on Complex Network Attack Model
Communications in Computer and Information Science, ISSN: 1865-0937, Vol: 972, Page: 21-29
2019
- 2Citations
Metric Options: CountsSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Metrics Details
- Citations2
- Citation Indexes2
Conference Paper Description
The Internet of Things brings convenience to people’s lives and it is also vulnerable to external attacks due to its own vulnerability. For this reason, analyzing the vulnerability of the Internet of Things is very necessary and meaningful. The paper starts with the characteristics of the Internet of Things and firstly constructs its network attack model. And then we simulate the attack on the model according to the attack rules. Furthermore, an experimental analysis of the nodes vulnerability is conducted by the theory of complex networks, and indicators of network characteristics are quantified based on the removal of vulnerable nodes. The experimental results show that the vulnerability of the system will show different patterns of attenuation as the proportion of node deletion increases.
Bibliographic Details
http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=85066894290&origin=inward; http://dx.doi.org/10.1007/978-981-13-5937-8_4; http://link.springer.com/10.1007/978-981-13-5937-8_4; http://link.springer.com/content/pdf/10.1007/978-981-13-5937-8_4; https://dx.doi.org/10.1007/978-981-13-5937-8_4; https://link.springer.com/chapter/10.1007/978-981-13-5937-8_4
Springer Science and Business Media LLC
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know