Research article Special Issues

ONS resolution prediction based on Rasch model

  • IoT (Internet of Things) involves a wide range of fields, and its application scenarios are complex and diverse. Failure of security defense in any link of IoT may lead to huge information leakage and immeasurable losses. IoT security problem is affecting and restricting its application prospect, and has become one of the hotspots in the field of IoT. ONS (Object Naming Service) is responsible for mapping function from EPC code information to URI (Uniform Resource Identifier). The security mechanism of ONS has been extensively studied by more and more scholars in recent years. The purpose of this paper is to apply Rasch, a famous psychological model, to ONS resolution security technology. Through observing the past resolution result, the ability of ONS resolution and the difficulty of EPC code can be calculated. With the difference between the ability of ONS resolution and the difficulty of EPC code, this model can predict the probability of the ONS future resolution to achieve the purpose of privacy protection in IoT addressing. Through simulation and Ministep software, the feasibility of the model is verified.

    Citation: Huqing Wang, Feng Xiang, Wenbing Zhao, Zhixin Sun. ONS resolution prediction based on Rasch model[J]. Mathematical Biosciences and Engineering, 2019, 16(6): 6683-6695. doi: 10.3934/mbe.2019333

    Related Papers:

    [1] Zhenguo Bai . Threshold dynamics of a periodic SIR model with delay in an infected compartment. Mathematical Biosciences and Engineering, 2015, 12(3): 555-564. doi: 10.3934/mbe.2015.12.555
    [2] Curtis L. Wesley, Linda J. S. Allen, Michel Langlais . Models for the spread and persistence of hantavirus infection in rodents with direct and indirect transmission. Mathematical Biosciences and Engineering, 2010, 7(1): 195-211. doi: 10.3934/mbe.2010.7.195
    [3] Jie He, Zhenguo Bai . Global Hopf bifurcation of a cholera model with media coverage. Mathematical Biosciences and Engineering, 2023, 20(10): 18468-18490. doi: 10.3934/mbe.2023820
    [4] Cuicui Jiang, Kaifa Wang, Lijuan Song . Global dynamics of a delay virus model with recruitment and saturation effects of immune responses. Mathematical Biosciences and Engineering, 2017, 14(5&6): 1233-1246. doi: 10.3934/mbe.2017063
    [5] Lin Zhao, Zhi-Cheng Wang, Liang Zhang . Threshold dynamics of a time periodic and two–group epidemic model with distributed delay. Mathematical Biosciences and Engineering, 2017, 14(5&6): 1535-1563. doi: 10.3934/mbe.2017080
    [6] Yilei Tang, Dongmei Xiao, Weinian Zhang, Di Zhu . Dynamics of epidemic models with asymptomatic infection and seasonal succession. Mathematical Biosciences and Engineering, 2017, 14(5&6): 1407-1424. doi: 10.3934/mbe.2017073
    [7] Yan Zhang, Sanyang Liu, Zhenguo Bai . Global dynamics of a di usive single species model with periodic delay. Mathematical Biosciences and Engineering, 2019, 16(4): 2293-2304. doi: 10.3934/mbe.2019114
    [8] Shengqiang Liu, Lin Wang . Global stability of an HIV-1 model with distributed intracellular delays and a combination therapy. Mathematical Biosciences and Engineering, 2010, 7(3): 675-685. doi: 10.3934/mbe.2010.7.675
    [9] Qian Ding, Jian Liu, Zhiming Guo . Dynamics of a malaria infection model with time delay. Mathematical Biosciences and Engineering, 2019, 16(5): 4885-4907. doi: 10.3934/mbe.2019246
    [10] Rong Ming, Xiao Yu . Global dynamics of an impulsive vector-borne disease model with time delays. Mathematical Biosciences and Engineering, 2023, 20(12): 20939-20958. doi: 10.3934/mbe.2023926
  • IoT (Internet of Things) involves a wide range of fields, and its application scenarios are complex and diverse. Failure of security defense in any link of IoT may lead to huge information leakage and immeasurable losses. IoT security problem is affecting and restricting its application prospect, and has become one of the hotspots in the field of IoT. ONS (Object Naming Service) is responsible for mapping function from EPC code information to URI (Uniform Resource Identifier). The security mechanism of ONS has been extensively studied by more and more scholars in recent years. The purpose of this paper is to apply Rasch, a famous psychological model, to ONS resolution security technology. Through observing the past resolution result, the ability of ONS resolution and the difficulty of EPC code can be calculated. With the difference between the ability of ONS resolution and the difficulty of EPC code, this model can predict the probability of the ONS future resolution to achieve the purpose of privacy protection in IoT addressing. Through simulation and Ministep software, the feasibility of the model is verified.




    [1] L. Atzori, A. Iera, G. Morabito, The internet of things: A survey, Comput. Netw., 54(2010), 2787–2805.
    [2] C. Chang and C. Li, Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems, Math. Biosci. Eng., 16(2019), 3367–3381.
    [3] C. Stergiou, K. E. Psannis, A. P. Plageras, et al., Algorithms for efficient digital media transmission over IoT and cloud networking, J. Multi. Inf. Syst., 5(2018), 27–34.
    [4] F. X. Yu, I-Japan strategy 2015, Zhong guo Xinxihua, 13(2014), 13–23.
    [5] F. Gao, Z. Y. Zhao, K. X. Zhao, et al., Interpretation of the medium-term and long-term strategy of Korean ICT R&D (2013–2017), Sci. Tech. Mgt. Res., 6(2015), 30–34.
    [6] W. Ejaz, M. Naeem, A. Shahid, et al., Efficient energy management for the internet of thins in smart cities, IEEE Commun. Mag., 55(2017), 84–91.
    [7] C. M. Medaglia and A. Serbanati, An overview of privacy and security issues in the Internet of Things, Proceedings of the 20th Tyrrhenian Workshop on Digital Communications (Italy), Springer, (2010), 389–394.
    [8] Y. L. Liu, P. Hua and J. Wang, Verifiable diversity ranking search over encrypted outsourced data, CMC-Comput. Mater. Con., 55(2018), 037–057.
    [9] J. Wang, C. W. Ju, Y. Gao, et al., A PSO based energy efficient coverage control algorithm for wireless sensor networks, CMC-Comput. Mater. Con., 56(2018), 433–446.
    [10] Z. W. Li and Y. Xie, A security query protocol of ONS in EPC system, 2012 International Conference on Anti-Counterfeiting, Security and Identification (Taipei), IEEE, (2012), Article number: 6325293.
    [11] L. J. Zhang and Z. Q. Wu, A controllable trusted and anonymous query mechanism of Internet of Things, Comput. Technol. Develop., 23(2013), 122–125.
    [12] C. Fachkha, H. B. Elias and M. Debbabi, Fingerprinting internet DNS amplification DDoS Activities, 2014 6th International Conference on New Technologies, Mobility and Security ( Dubai), OALib J., (2014), article number: 6814019.
    [13] A. Friedlander, A. Mankin, W. D. Maughan, et al., DNSSEC: A protocol toward securing the Internet infrastructure, Commu. ACM, 50(2007), 44–50.
    [14] M. Dempsky, DNSCurve: Link-Level Security for the Domain Name System, Int. Draft, 2004.
    [15] Z. Wu, Y. Zhou and J. Ma, A security transmission model for Internet of Things, Chinese J. Comput., 34(2011), 1351–1364.
    [16] W. Ren, L. Ma and Y. Ren, APP: An Ultralightweight scheme to authenticate ONS and protect epc privacy without cryptography in EPCglobal networks, Int J. Distrib. Sens. N., (2013), Article ID: 784618.
    [17] P. Danielis, V. Altmann, J. Skodzik, et al., P-DONAS: A P2P-based domain name system in access networks, ACM T. Int. Techn., 15(2015), 1–11.
    [18] E. Zhang, X. T. Duan, S. M. Xiu, et al., Server-aided multi-secret sharing scheme for weak computational devices, CMC-Comput. Mater. Con., 56(2018), 401–414.
    [19] R. Georg, Probalilistic models for some intelligence and attainment tests, Copenhagen: Institute of Education Research, 1960.
  • This article has been cited by:

    1. Mahmoud A. Ibrahim, Attila Dénes, A mathematical model for Lassa fever transmission dynamics in a seasonal environment with a view to the 2017–20 epidemic in Nigeria, 2021, 60, 14681218, 103310, 10.1016/j.nonrwa.2021.103310
    2. Robert R. Parmenter, Gregory E. Glass, Hantavirus outbreaks in the American Southwest: Propagation and retraction of rodent and virus diffusion waves from sky-island refugia, 2022, 36, 0217-9792, 10.1142/S021797922140052X
    3. Juan Pablo Gutiérrez Jaraa, María Teresa Quezada, Modeling of hantavirus cardiopulmonary syndrome, 2022, 22, 07176384, e002526, 10.5867/medwave.2022.03.002526
    4. 惠振阳 Hui Zhenyang, 李卓宣 Li Zhuoxuan, 程朋根 Cheng Penggen, 蔡诏晨 Cai Zhaochen, 郭先春 Guo Xianchun, 基于多约束图形分割的点云对象基元获取方法, 2024, 61, 1006-4125, 1037001, 10.3788/LOP231575
    5. Juan Pablo Gutiérrez-Jara, María Teresa Muñoz-Quezada, Fernando Córdova-Lepe, Alex Silva-Guzmán, Mathematical Model of the Spread of Hantavirus Infection, 2023, 12, 2076-0817, 1147, 10.3390/pathogens12091147
    6. Yuhang Li, Yanni Xiao, Effects of nonlinear impulsive controls and seasonality on hantavirus infection, 2025, 00255564, 109378, 10.1016/j.mbs.2025.109378
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4206) PDF downloads(347) Cited by(0)

Article outline

Figures and Tables

Figures(5)  /  Tables(2)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog