Skip to main content

Security Risk Management of the Internet of Things Based on 5G Technology

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1796))

Included in the following conference series:

  • 300 Accesses

Abstract

The Internet of Things brings security issues as well as high connectivity. This paper proposes a security risk decision based on the bounded rationality of users, aiming at the security problems of power Internet of things. First of all, a sparse node cognitive network is constructed for each user. Based on this simplified cognitive network, each user establishes his own security decision by minimizing his own security cost in the real world. These two stages constitute a game-to-game framework. Then the concept of a structured Nash equilibrium (GNE) solution is proposed to solve the game decisions of users in security management under this bounded rationality. At the same time, an iterative algorithm based on the nearest point is designed to calculate GNE. Finally, we analyze the case of intelligent power station in the Internet of Things, and the results show that this algorithm can successfully identify key users. Other users need to consider the decisions of these key users in the security decision-making process, and their own security decisions also reduce each other’s security management costs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jia, Y., Peng, Z.: The analysis and simulation of communication network in Iridium system based on OPNET. In: The 2nd IEEE International Conference on Information Management and Engineering, Chengdu, China, 16–18 April (2010)

    Google Scholar 

  2. Ding, K., Chan, F.T.S., Zhang, X., et al.: Defining a Digital Twin-based Cyber-Physical Production System for autonomous manufacturing in smart shop floors. Int. J. Prod. Res. 57(20), 6315–6334 (2019)

    Article  Google Scholar 

  3. Zhuang, C., Liu, J., Xiong, H.: Digital twin-based smart production management and control framework for the complex product assembly shop-floor. Int. J. Adv. Manuf. Technol. 96, 1149–1163 (2018)

    Article  Google Scholar 

  4. Tao, F., Cheng, J., Qi, Q., et al.: Digital twin-driven product design, manufacturing and service with big data. Int. J. Adv. Manuf. Technol. 94, 3563–3576 (2018)

    Article  Google Scholar 

  5. Liu, Q., Zhang, H., Leng, J., et al.: Digital twin-driven rapid individualised designing of automated flow-shop manufacturing system. Int. J. Prod. Res. 57(12), 3903–3919 (2019)

    Article  Google Scholar 

  6. Mittal, S., Khan, M.A., Romero, D., et al.: Smart manufacturing: characteristics, technologies and enabling factors. Inst. Mech. Eng. 233(5), 1342–1361 (2017)

    Article  Google Scholar 

  7. Huang, S., Wang, G., Yan, Y., et al.: Blockchain-based data management for digital twin of product. J. Manuf. Syst. 54, 361–371 (2019)

    Article  Google Scholar 

  8. Rosen, R., Wichert, G., Lo, G., et al.: About the importance of autonomy and digital twins for the future of manufacturing. IFAC-Papers OnLine 48(3), 567–572 (2015)

    Article  Google Scholar 

  9. Wang, X., Zong, P., Yu, J.: Link analyzing and simulation of TDRSS based on OPNET. In: The International Conference on Communications and Mobile Computing, Shenzhen, China, 12–14 April (2010)

    Google Scholar 

  10. He, X., Ai, Q., Qiu, R.C., et al.: A big data architecture design for smart grids based on random matrix theory. IEEE Trans. Smart Grid 8(2), 674–686 (2015)

    Google Scholar 

  11. Gray, J.: Jim gray on escience: a transformed scientific method. In: The Fourth Paradigm: Data-Intensive Scientific Discovery, pp. xvii–xxxi (2009)

    Google Scholar 

  12. Hong, T., Chen, C., Huang, J., et al.: Guest editorial big data analytics for grid modernization. IEEE Trans. Smart Grid 7(5), 2395–2396 (2016)

    Article  Google Scholar 

  13. Burges, C., Shaked, T., Renshaw, E., et al.: Learning to rank using gradient descent. In: Proceedings of the 22nd International Conference on Machine learning (ICML-05), pp. 89–96 (2005)

    Google Scholar 

  14. Yuan, Y., Ardakanian, O., Low, S., et al.: On the inverse power flow problem. arXiv preprint arXiv:1610.06631 (2016)

  15. Chen, Y.C., Wang, J., Domínguez-García, A.D., et al.: Measurement-based estimation of the power flow Jacobian matrix. IEEE Trans. Smart Grid 7(5), 2507–2515 (2015)

    Article  Google Scholar 

  16. Kelly, J., Knottenbelt, W.: Neural nilm: deep neural networks applied to energy disaggregation. In: Proceedings of the 2nd ACM International Conference on Embedded Systems for Energy-Efficient Built Environments, pp. 55–64. ACM (2015)

    Google Scholar 

  17. Xu, S., Qiu, C., Zhang, D., et al.: A deep learning approach for fault type identification of transmission line. Proc. CSEE 39(1), 65–74 (2019)

    Google Scholar 

  18. Boschert, S., Rosen, R.: Digital twin—The simulation aspect. In: Hehenberger, P., Bradley, D. (eds.) Mechatronic Futures, pp. 59–74. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-32156-1_5

    Chapter  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the anonymous reviewers and editor for their comments that improved the quality of this paper. This work is supported by scientific project under Grant NO. 5246DR220010, the name of the project is research and application of the key technology of power 5G lightweight module and management platform.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jia Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cao, W., Hu, Y., Yang, S., Zhu, Xy., Yu, J. (2023). Security Risk Management of the Internet of Things Based on 5G Technology. In: Tian, Y., Ma, T., Jiang, Q., Liu, Q., Khan, M.K. (eds) Big Data and Security. ICBDS 2022. Communications in Computer and Information Science, vol 1796. Springer, Singapore. https://doi.org/10.1007/978-981-99-3300-6_32

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-3300-6_32

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-3299-3

  • Online ISBN: 978-981-99-3300-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics