Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks

The privacy and security of the Internet of Things (IoT) are emerging as popular issues in the IoT. At present, there exist several pieces of research on network analysis on the IoT network, and malicious network analysis may threaten the privacy and security of the leader in the IoT networks. With...

Full description

Bibliographic Details
Main Authors: Jie Ji, Guohua Wu, Jinguo Shuai, Zhen Zhang, Zhen Wang, Yizhi Ren
Format: Article
Language:English
Published: MDPI AG 2019-09-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/19/18/3886
id doaj-afe686ea227b43dfa61412c413d6764f
record_format Article
spelling doaj-afe686ea227b43dfa61412c413d6764f2020-11-25T01:51:12ZengMDPI AGSensors1424-82202019-09-011918388610.3390/s19183886s19183886Heuristic Approaches for Enhancing the Privacy of the Leader in IoT NetworksJie Ji0Guohua Wu1Jinguo Shuai2Zhen Zhang3Zhen Wang4Yizhi Ren5School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, Zhejiang, ChinaSchool of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, Zhejiang, ChinaSchool of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, Zhejiang, ChinaSchool of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, Zhejiang, ChinaSchool of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, Zhejiang, ChinaSchool of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, Zhejiang, ChinaThe privacy and security of the Internet of Things (IoT) are emerging as popular issues in the IoT. At present, there exist several pieces of research on network analysis on the IoT network, and malicious network analysis may threaten the privacy and security of the leader in the IoT networks. With this in mind, we focus on how to avoid malicious network analysis by modifying the topology of the IoT network and we choose closeness centrality as the network analysis tool. This paper makes three key contributions toward this problem: (1) An optimization problem of removing <i>k</i> edges to minimize (maximize) the closeness value (rank) of the leader; (2) A greedy (greedy and simulated annealing) algorithm to solve the closeness value (rank) case of the proposed optimization problem in polynomial time; and (3)UpdateCloseness (FastTopRank)&#8212;algorithm for computing closeness value (rank) efficiently. Experimental results prove the efficiency of our pruning algorithms and show that our heuristic algorithms can obtain accurate solutions compared with the optimal solution (the approximation ratio in the worst case is 0.85) and outperform the solutions obtained by other baseline algorithms (e.g., choose <i>k</i> edges with the highest degree sum).https://www.mdpi.com/1424-8220/19/18/3886Internet of Thingsnetwork analysiscloseness centralitygreedy algorithmoptimization
collection DOAJ
language English
format Article
sources DOAJ
author Jie Ji
Guohua Wu
Jinguo Shuai
Zhen Zhang
Zhen Wang
Yizhi Ren
spellingShingle Jie Ji
Guohua Wu
Jinguo Shuai
Zhen Zhang
Zhen Wang
Yizhi Ren
Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks
Sensors
Internet of Things
network analysis
closeness centrality
greedy algorithm
optimization
author_facet Jie Ji
Guohua Wu
Jinguo Shuai
Zhen Zhang
Zhen Wang
Yizhi Ren
author_sort Jie Ji
title Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks
title_short Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks
title_full Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks
title_fullStr Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks
title_full_unstemmed Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks
title_sort heuristic approaches for enhancing the privacy of the leader in iot networks
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2019-09-01
description The privacy and security of the Internet of Things (IoT) are emerging as popular issues in the IoT. At present, there exist several pieces of research on network analysis on the IoT network, and malicious network analysis may threaten the privacy and security of the leader in the IoT networks. With this in mind, we focus on how to avoid malicious network analysis by modifying the topology of the IoT network and we choose closeness centrality as the network analysis tool. This paper makes three key contributions toward this problem: (1) An optimization problem of removing <i>k</i> edges to minimize (maximize) the closeness value (rank) of the leader; (2) A greedy (greedy and simulated annealing) algorithm to solve the closeness value (rank) case of the proposed optimization problem in polynomial time; and (3)UpdateCloseness (FastTopRank)&#8212;algorithm for computing closeness value (rank) efficiently. Experimental results prove the efficiency of our pruning algorithms and show that our heuristic algorithms can obtain accurate solutions compared with the optimal solution (the approximation ratio in the worst case is 0.85) and outperform the solutions obtained by other baseline algorithms (e.g., choose <i>k</i> edges with the highest degree sum).
topic Internet of Things
network analysis
closeness centrality
greedy algorithm
optimization
url https://www.mdpi.com/1424-8220/19/18/3886
work_keys_str_mv AT jieji heuristicapproachesforenhancingtheprivacyoftheleaderiniotnetworks
AT guohuawu heuristicapproachesforenhancingtheprivacyoftheleaderiniotnetworks
AT jinguoshuai heuristicapproachesforenhancingtheprivacyoftheleaderiniotnetworks
AT zhenzhang heuristicapproachesforenhancingtheprivacyoftheleaderiniotnetworks
AT zhenwang heuristicapproachesforenhancingtheprivacyoftheleaderiniotnetworks
AT yizhiren heuristicapproachesforenhancingtheprivacyoftheleaderiniotnetworks
_version_ 1724997959257423872