Abstract
The Internet of Things (IOT) is based on the computer Internet, using RFID, wireless data communication and other technologies to construct a network covering everything in the world. It contains numerous entities such as sensors, processors, transmitters and actuators, meanwhile the interactions of which are complicated. These characteristics of IOT are consistent with those of the complex network. Motivated by this, this paper comprehends the security issue of IOT from the sight of the observability of complex network and regards the ability of reconstruction as a security threat to IOT network. We try to identify the minimum vertices whose data could reconstruct the whole data of network, in other words, we need to implement additional protective measures on these vertices to enhance the security of IOT network. By analyzing the topology of IOT network, an identification strategy is adopted and the corresponding algorithm is proposed to identify the minimum protection vertices.
Keywords: IOT, Security, Complex networks, Structural observability
1. Introduction
Now, we live in an era where the Internet of Things is all around us, from mobile terminals like smartphones and wearable devices [1], smart home facilities like temperature controller [2], automatism curtain, and robot vacuum cleaner, industrial systems [3,4] like supply chain management and safety production management, intelligent transportation like vehicle networking [5] and intelligent traffic scheduling. One-sentence understanding of the Internet of Things is connecting all things to the Internet through sensing equipment to realize information exchange, intelligent identification and management. This requires giving each object the intelligence and connectivity to collect, process and transmit data [6]. No matter the smart dust advocating the interconnection of various sensor devices [7,8], the RFID IOT advocating the unique identification of all items [9], or the data ubiquitous aggregation IOT advocating the precise marking on each piece of data [10], all deal with immense amounts of data, along with the close association of industry, military, energy, transportation, logistics and all crucially important fields, the security issues of IOT are of great value and deserve much attention [[11], [12], [13]].
It is requested that the hardware, software and data in IOT are protected and free from accidental or malicious damage, tampering and theft. However due to the vulnerability of Internet, the complexity of network environment, the openness of wireless channels, the lack of monitoring unmanned equipment and so on, the security requirements are difficult to meet. The types of potential attacks include the physical attack, the data eavesdropping and analysis, the unauthorized access [14], the replay attack [15], the Dos attack and the malicious code attack [16]. Specifically, in the perception layer, the sensing devices are numerous in quantity and variety, and their own security protection is weak, simultaneously most of which are deployed at the unmonitored locations, the attackers are relatively easy to access to them [17]. In the transport layer, the malware has a large number of entries in wireless network and sensor network environment, so it needs to apply the IPsec, firewall, tunnel services, digital signatures and certificates to enhance the security [18]. In the application layer, the loopholes will affect the system itself, the support software, the network service software, the network router and the firewall [19].
As mentioned before, there are numerous entities such as sensors, processors, transmitters and actuators in IOT and the interactions of which are complicated. These characteristics are consistent with those of complex networks, so it is possible to study the IOT from the perspective of complex network. A large number of research results on complex network has been obtained in different fields such as the Internet, the communication network [20], the traffic network [21], the power grid [22], the social network [23], etc., which are all closely related to our lives. And the research interest involves the synchronization, state estimation, topology identification [24], fault diagnosis [25], virus spreading [26], multi-agents [27], Big Data [28], network game [29] and so on. In a manner of speaking, it covers almost all of aspects of the network. So, the theoretical framework and methods for complex networks provide a new idea in analyzing the IoT network [30].
The controllability and observability are fundamental issues in most complex networks [[31], [32], [33], [34], [35]], and the observability of network concerns the ability to reconstruct the whole states using the partial measured outputs. For a IOT network, if someone could place some sensors onto the partial processors, transmitters or steal the data of partial sensors, it is possible to reconstruct more data or even the whole data of the IOT network. Inspired by this, the concept of network observability is applied to study the security issue of IOT networks in this work. We introduce the IOT network onto a directed graph and try to identify the minimum vertices for implementing additional protective measures to enhance the security of IOT network, by analyzing its topology, an identification strategy that maximizing the number of pm-rSCCs (the definition sees Section 3) which contain unmatched vertices in a maximum matching is adopted. Then the corresponding algorithm is proposed and demonstrated by simulations.
The rest of the paper is organized as follows. Section 2 describes the main problem studied in this work. In Section 3, an identification strategy is adopted and the corresponding algorithm is proposed. In Section 4, a numerical example is given to validate the theoretical results. Finally, Section 5 concludes the paper and discusses the further research interests.
2. Problem statement
As mentioned above, it could study the IOT network from the perspective of the complex network. For an existing IOT, we could introduce it onto a directed graph , where the entities in IOT are regarded as the vertices and the interactions between these entities are regarded as the links in the IOT network. Concretely, is the vertex set and is the edge set. In Fig. 1(a), there are four vertices in a simple IOT network.
Fig. 1.
A simple example of IOT network. (a) The vertices are marked in white circles and the interactions are marked by black arrows; (b) The bipartite representation and its maximum matching where the matched vertices are marked by grey and the matching edges are marked by red.
According to the observability concept of complex network, it could reconstruct the whole information of the network only by information of partial vertices. So, it only needs to place sensors onto the partial vertices or steal the data of partial vertices in the sensor network, then the data of the whole IOT network could be obtained by reconstruction, and just few vertices are needed for reconstruction in the large-scale real networks in general. Inspired by this, we try to identify the minimum vertices for reconstructing the IOT network in this paper, and then we could implement additional protective measures on these vertices to enhance the security of IOT network. Here, we also called these vertices as the protection vertices.
Here we recall some graph-theoretic concepts.
Definition 1
For a directed graph, a maximum matching is a largest subset of edges which do not share common starting vertices or ending vertices.
The maximum matching of could be determined by its bipartite representation where and denote the starting and ending vertices sets respectively, and . In a maximum matching, a vertex is matched if it is an ending vertex of an edge in the matching and the others are unmatched vertices (see Fig. 1(b), vertices 1, 2, 3 are matched vertices). A maximum matching is called a perfect matching if every vertex is matched.
Definition 2
For a directed graph, a Strongly Connected Component (SCC) is a subgraph where there is a directed path from each vertex to every other vertex.
Further, a SCC is a root SCC (rSCC) if it has no incoming edges to its vertices from other vertices.
3. Main results
In this section, the strategy of identifying the minimum protection vertices is discussed, then the corresponding algorithm is proposed and analyzed.
3.1. Identification strategy
According to the Minimum Inputs Theorem [36] and the duality between the controllability and the observability, it should set sensors to measure the unmatched vertices to guarantee the network is observable. Here, these vertices are called sensor vertices (According to the security considerations in this paper, the sensor vertices are also the protection vertices). If the maximum matching of this rSCC is perfect, there exist no sensor vertices, whereas by definition, a rSCC is overall inaccessible, so we also need to measure it and a random vertex of which to be measured is enough. Here we called a rSCC which has perfect matching as a pm-rSCC (see Fig. 1, vertices 1, 2 and edges , form a pm-rSCC). In this paper, we concentrate on the identification of the minimum protection vertices with the pm-rSCC existing in the IOT network.
With a goal of minimizing the number of protection vertices, the number of additional measured vertices should be minimized. While there exists an unmatched vertex in a pm-rSCC, there is no need to additionally set a sensor for this pm-rSCC. Consequently, the identification strategy in this paper is maximizing the number of pm-rSCCs which contain unmatched vertices in a maximum matching. For example, in Fig. 2, in the first kind of maximum matching, there exist no unmatched vertices in the pm-rSCC formed by vertices 1, 2 and edges , , so we need to choose the vertex 1 or 2 as an additional protection vertex, the number of protection vertices is 3. While in the second kind of maximum matching, vertex 1 is unmatched, so we just choose the unmatched vertices as the protection vertices, the number of protection vertices is 2.
Remark 1
For a directed graph, its maximum matching is not unique in the vast majority of cases. Therefore, we could choose an appropriate maximum matching to conform with the adopted identification strategy.
Fig. 2.
An illustration of the adopted identification strategy. In the first kind of maximum matching, vertices 1, 3, 5 are protection vertices. In the second kind of maximum matching, vertices 1, 5 are protection vertices. The second kind of maximum matching conforms with the adopted identification strategy.
3.2. Algorithm design and analysis
According to the identification strategy mentioned in Section 3.1, we try to force the vertices in pm-rSCCs as the unmatched vertices, as long as one vertex in a pm-rSCC could be an unmatched vertex in a maximum matching, the number of protection vertices will decrease by one, hence an Algorithm is proposed. Some initial preparations are as follows: Compute an initial maximum matching of , and obtain the pm-rSCCs by applying twice depth-first searches, denoted by where .
Algorithm.
Identify the set of minimum protection vertices of an IOT network.
| Input: , , |
| Output: Set of protection vertices |
| 1: ; |
| 2: for all |
| 3: Compute a maximum matching with , obtaining the unmatched vertices set ; |
| 4: if where |
| 5: ; |
| 6: ; |
| 7: ; |
| 8: ; |
| 9: else ; |
| 10: end if |
| 11: end for |
| 12: for all |
| 13: Randomly choose a vertex from and ; |
| 14: end |
Now, we will explain the process of obtaining the minimum protection vertices of the IOT network with an illustrative example shown in Fig. 3. In this simple IOT network, there exist 3 p.m.-rSCCs which contain vertices 1 and 4, vertices 2 and 3, vertices 7 and 8 respectively. In the initial situation (see Fig. 3(a)), the matching edges are marked by red and the unmatched vertices are vertices 5 and 9. Here there are no pm-rSCCs which contain unmatched vertices, so randomly choose a vertex from each pm-rSCC, specifically, vertices 1, 2, 7 are chosen as the additional sensor vertices, here . Now it's time to execute the Algorithm, the initial data is , , . Select from and remove the edge in , now the maximum matching , so , , the edge is definitely removed, , if we stop at this moment and choose vertices 2, 7 as the additional sensor vertices, (see Fig. 3(b)). Now execute the next loop, select from and remove the edge in , now the maximum matching , (see Fig. 3(c)), so execute the next loop, select from and remove the edge in , now the maximum matching , (see Fig. 3(d)). So continue the next loop, select from and remove the edge in , now the maximum matching , so , , the edge is definitely removed, , and at this moment the steps (1)–(11) have been completed, , and then choose the vertex 2 from , the final (steps (12)–(14)), which is shown in Fig. 3(e). Through the Algorithm, the number of protection vertices decrease from 5 to 3, as well as the minimum number of protection vertices.
Remark 2
The main process of the Algorithm is calculating multi maximum matchings, whose time complexity is . And the time complexity of the other processes is constant complexity.
Fig. 3.
An illustration of obtaining the minimum protection vertices. (a) The initial situation; (b)–(e) The execution of the Algorithm.
4. Simulations
Here, the IOT network for simulation still uses the example in Fig. 3. Simultaneously, in order to verify the reconstruction of the protection vertices, each vertex is given the following discrete dynamic:
| (1) |
where is the system matrix of the vertex, each vertex state is denoted as , . And then the IOT network could be formulated as follows:
| (2) |
where is the inner connecting matrix, denotes the network topology.
From the previous results, vertices 1, 2 and 7 are protection vertices, so the output could be formulated as follows:
| (3) |
where denotes the output matrix, and for , for else, is a zero matrix of suitable dimension. Then equations (2), (3) could be rewritten as follows:
| (4) |
where , , .
Then an observer for this network is built as follows:
| (5) |
where and denote the states and outputs of the observer respectively, is the observer gain. Then the observation errors could be obtained:
| (6) |
Define a Lyapunov function as follows:
| (7) |
Differentiating gives
| (8) |
According to the Lyapunov stability theory, system (6) is asymptotically stable if , that is
| (9) |
Then the observer gain could be obtained by solving the inequation (9), here , due to its large size, the concrete value is omitted.
Shown in Fig. 4, it is apparent that all observation errors converge to zero finally, implying it just needs the data of 3 vertices that the data of the whole IOT network could be reconstructed. Consequently, it is necessary to implement additional protective measures on these vertices to enhance the security of the whole IOT network.
Fig. 4.
The observation errors in each vertex.
5. Conclusion
In this paper, from the perspective of the observability of complex networks, we study the security of IOT network. The observability of complex networks is converted into the ability to reconstruct the whole data of the IOT network from the data of partial vertices. By analyzing the topology of IOT network, an identification strategy that maximizing the number of pm-rSCCs which contain unmatched vertices in a maximum matching is adopted. Then a corresponding algorithm is proposed and demonstrated by simulations that the algorithm proposed is effective.
The structure of IOT is quite complicated in practice, and in this work, the structure is simplified. The actual IOT networks may possess the multilayer structure, community structure and so on. Hence it faces more challenges to investigate the more complicated IOT network.
Data availability
No data was used for the research described in the article.
CRediT authorship contribution statement
Xu Wu: Writing – review & editing, Writing – original draft, Funding acquisition, Formal analysis. Zhengjun Jing: Supervision, Conceptualization. Xinwei Wang: Visualization, Software.
Declaration of competing interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Acknowledgments
This work is supported by the Natural Science Foundation of the Jiangsu Higher Education Institutions of China (grant No. 21KJB120001).
References
- 1.Wang S. Sports training monitoring of energy-saving IoT wearable devices based on energy harvesting. Sustain. Energy. Techn. 2021;45 [Google Scholar]
- 2.Chang V., Martin C. An industrial IoT sensor system for high-temperature measurement. Comput. Electr. Eng. 2021;95 [Google Scholar]
- 3.Sisinni E., Saifullah A., Han S., et al. Industrial internet of things: challenges, opportunities, and directions. IEEE Trans. Ind. Inf. 2018;14(11):4724–4734. [Google Scholar]
- 4.Radanliev P., Roure D.D., Nicolescu R., et al. Digital twins: artificial intelligence and the IoT cyber-physical systems in Industry 4.0. Int. J. Intell. Robot. 2022;6(1):171–185. [Google Scholar]
- 5.Husni E., Prayoga G.A., Tamba J.D., et al. Microclimate investigation of vehicular traffic on the urban heat island through IoT-Based device. Heliyon. 2022;8(11) doi: 10.1016/j.heliyon.2022.e11739. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 6.Amendola S., et al. RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet Things. 2014;1(2):144–152. [Google Scholar]
- 7.Liu J., Faulkner G., Choubey B., et al. A tunable passband logarithmic photodetector for IoT smart dusts. IEEE Sensor. J. 2018;18(13):5321–5328. [Google Scholar]
- 8.Park J., Park K.H. Springer International Publishing; 2021. A Network Traffic Reduction Method for a Smart Dust IoT System by Sensor Clustering[C]//Advances in Security, Networks, and Internet of Things: Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20; pp. 693–697. [Google Scholar]
- 9.Fan K., Jiang W., Li H., et al. Lightweight RFID protocol for medical privacy protection in IoT[J] IEEE Trans. Ind. Inf. 2018;14(4):1656–1665. [Google Scholar]
- 10.Shen Y., Zhang T., Wang Y., et al. Microthings: a generic iot architecture for flexible data aggregation and scalable service cooperation. IEEE Commun. Mag. 2017;55(9):86–93. [Google Scholar]
- 11.Hughes-Lartey K., Li M., Botchey F.E., et al. Human factor, a critical weak point in the information security of an organization's Internet of Things. Heliyon. 2021;7(3) doi: 10.1016/j.heliyon.2021.e06522. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 12.Xiao L., Wan X., Lu X., et al. IoT security techniques based on machine learning: how do IoT devices use AI to enhance security? IEEE Signal Process. Mag. 2018;35(5):41–49. [Google Scholar]
- 13.Riahi A., Challal Y., Natalizio E., et al. IEEE; 2013. A Systemic Approach for IoT security[C]//2013 IEEE International Conference on Distributed Computing in Sensor Systems; pp. 351–355. [Google Scholar]
- 14.Hahn C., Kim J., Kwon H., et al. Efficient iot management with resilience to unauthorized access to cloud storage. IEEE T Cloud. Comput. 2020;10(2):1008–1020. [Google Scholar]
- 15.Farha F., Ning H., Yang S., et al. Timestamp scheme to mitigate replay attacks in secure ZigBee networks. IEEE Trans. Mobile Comput. 2020;21(1):342–351. [Google Scholar]
- 16.Wei D., Qiu X. IEEE; 2018. Status-based Detection of Malicious Code in Internet of Things (IoT) devices[C]//2018 IEEE Conference on Communications and Network Security (CNS) pp. 1–7. [Google Scholar]
- 17.Khattak H.A., Shah M.A., Khan S., et al. Perception layer security in internet of things. Future Generat. Comput. Syst. 2019;100:144–164. [Google Scholar]
- 18.Li P., Su J., Wang X. iTLS: lightweight transport-layer security protocol for IoT with minimal latency and perfect forward secrecy. IEEE Internet Things. 2020;7(8):6828–6841. [Google Scholar]
- 19.Donta P.K., Srirama S.N., Amgoth T., et al. Survey on recent advances in IoT application layer protocols and machine learning scope for research directions. Digit Commun. Netw. 2022;8(5):727–744. [Google Scholar]
- 20.Han X., Huangpeng Q., Gao Q., et al. Study of data center communication network topologies using complex network propagation model. Front. Physiol. 2023;11 [Google Scholar]
- 21.Wu J.J., Gao Z.Y., Sun H. Optimal traffic networks topology: a complex networks perspective[J] Physica A. 2008;387(4):1025–1032. [Google Scholar]
- 22.Zhou D., Hu F., Wang S., et al. Power network robustness analysis based on electrical engineering and complex network theory. Physica A. 2021;564 [Google Scholar]
- 23.Wanduku D. A novel complex social network rumor stochastic model: convergence in distribution to a final rumor size. Heliyon. 2023;9(4) doi: 10.1016/j.heliyon.2023.e15125. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 24.Zhu S., Zhou J., Chen G., et al. A new method for topology identification of complex dynamical networks. IEEE Trans. Cybern. 2019;51(4):2224–2231. doi: 10.1109/TCYB.2019.2894838. [DOI] [PubMed] [Google Scholar]
- 25.Huang T., Zhang Q., Tang X., et al. A novel fault diagnosis method based on CNN and LSTM and its application in fault diagnosis for complex systems. Artif. Intell. Rev. 2022:1–27. [Google Scholar]
- 26.Li H.J., Xu W., Song S., et al. The dynamics of epidemic spreading on signed networks. Chaos, Solit. Fractals. 2021;151 [Google Scholar]
- 27.Lu W., Liu X., Chen T. Adaptive algorithms for synchronization, consensus of multi-agents and anti-synchronization of direct complex networks. Neurocomputing. 2020;414:365–370. [Google Scholar]
- 28.Barja-Martinez S., Aragüés-Peñalba M., Munné-Collado Í., et al. Artificial intelligence techniques for enabling Big Data services in distribution networks: a review. Renew. Sust. Energ. Rev. 2021;150 [Google Scholar]
- 29.Fan R., Wang Y., Chen F., et al. How do government policies affect the diffusion of green innovation among peer enterprises?-An evolutionary-game model in complex networks. J. Clean. Prod. 2022;364 [Google Scholar]
- 30.Wu X., Wang J., Li P., et al. Internet of things as complex networks. IEEE Network. 2021;35(3):238–245. [Google Scholar]
- 31.Leitold D., Vathy-Fogarassy Á., Abonyi J. Controllability and observability in complex networks–the effect of connection types. Sci. Rep. 2017;7(1):151. doi: 10.1038/s41598-017-00160-5. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 32.Iudice F.L., Sorrentino F., Garofalo F. On node controllability and observability in complex dynamical networks. IEEE Control Systems Letters. 2019;3(4):847–852. [Google Scholar]
- 33.Pang S., Tian Z., Ma W. Structural controllability and observability of complex network with output feedback. Physica A. 2023;620 [Google Scholar]
- 34.D'Souza R.M., di Bernardo M., Liu Y.-Y. Controlling complex networks with complex nodes. Nat. Rev. Phys. 2023;5(4):250–262. [Google Scholar]
- 35.Hays C.W., Soderlund A., Phillips S., et al. ACC). IEEE; 2023. Ubiquitous Controllability of Single Input Linear Time-Invariant Systems[C]//2023 American Control Conference; pp. 4161–4166. [Google Scholar]
- 36.Liu Y.-Y., Slotine J.J., Barabási A.-L. Controllability of complex networks. Nature. 2011;473(7346):167–173. doi: 10.1038/nature10011. [DOI] [PubMed] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
No data was used for the research described in the article.




