Visible to the public Biblio

Filters: Keyword is Control engineering  [Clear All Filters]
2022-04-18
Shi, Guowei, Hao, Huajie, Lei, Jianghui, Zhu, Yuechen.  2021.  Application Security System Design of Internet of Things Based on Blockchain Technology. 2021 International Conference on Computer, Internet of Things and Control Engineering (CITCE). :134–137.
In view of the current status of Internet of Things applications and related security problems, the architecture system of Internet of Things applications based on block chain is introduced. First, it introduces the concepts related to blockchain technology, introduces the architecture system of iot application based on blockchain, and discusses its overall architecture design, key technologies and functional structure design. The product embodies the whole process of the Internet of Things platform on the basis of blockchain, which builds an infrastructure based on the Internet of Things and solves the increasingly serious security problems in the Internet of Things through the technical characteristics of decentralization.
2018-02-06
Xiong, X., Yang, L..  2017.  Multi End-Hopping Modeling and Optimization Using Cooperative Game. 2017 4th International Conference on Information Science and Control Engineering (ICISCE). :470–474.

End-hopping is an effective component of Moving Target Defense (MTD) by randomly hopping network configuration of host, which is a game changing technique against cyber-attack and can interrupt cyber kill chain in the early stage. In this paper, a novel end-hopping model, Multi End-hopping (MEH), is proposed to exploit the full potentials of MTD techniques by hosts cooperating with others to share possible configurable space (PCS). And an optimization method based on cooperative game is presented to make hosts form optimal alliances against reconnaissance, scanning and blind probing DoS attack. Those model and method confuse adversaries by establishing alliances of hosts to enlarge their PCS, which thwarts various malicious scanning and mitigates probing DoS attack intensity. Through simulations, we validate the correctness of MEH model and the effectiveness of optimization method. Experiment results show that the proposed model and method increase system stable operational probability while introduces a low overhead in optimization.