Next Article in Journal
An Energy-Efficient Clustering Method for Target Tracking Based on Tracking Anchors in Wireless Sensor Networks
Next Article in Special Issue
Automated Android Malware Detection Using User Feedback
Previous Article in Journal
Optical Biosensor for the Detection of Infectious Diseases Using the Copolymer F8T2 with Application to COVID-19
Previous Article in Special Issue
Improving Network-Based Anomaly Detection in Smart Home Environment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model

School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China
*
Author to whom correspondence should be addressed.
Submission received: 16 June 2022 / Revised: 25 July 2022 / Accepted: 26 July 2022 / Published: 29 July 2022
(This article belongs to the Special Issue Threat Identification and Defence for Internet-of-Things 2021-2022)

Abstract

:
In the Internet of things (IoTs), data transmission via network coding is highly vulnerable to intra-generation and inter-generation pollution attacks. To mitigate such attacks, some resource-intensive privacy-preserving schemes have been adopted in the previous literature. In order to balance resource consumption and data-privacy-preserving issues, a novel fuzzy-based privacy-preserving scheme is proposed. Our scheme is constructed on a T-S fuzzy trust theory, and network coding data streams are routed in optimal clusters formulated by a designed repeated game model to defend against pollution attacks. In particular, the security of our scheme relies on the hardness of the discrete logarithm. Then, we prove that the designed repeated game model has a subgame-perfect Nash equilibrium, and the model can improve resource utilization efficiency under the condition of data security. Simulation results show that the running time of the proposed privacy-preserving scheme is less than 1 s and the remaining energy is higher than 4 J when the length of packets is greater than 400 and the number of iterations is 100. Therefore, our scheme has higher time and energy efficiency than those of previous studies. In addition, the effective trust cluster formulation scheme (ETCFS) can formulate an optimal cluster more quickly under a kind of camouflage attack.

1. Introduction

The Internet of things (IoTs) refers to the networked connection of all daily objects, which can play an eminent role in the application of services based on the Internet of things, such as intelligent fire protection, industrial monitoring, intelligence collection, renewable energy adaptation, and so on, greatly simplifying and bringing convenience to life [1,2]. However, IoT is vulnerable to various network attacks, which can destroy the process of data transmission and increase energy consumption. Therefore, in the previous literature, many privacy-preserving schemes have been proposed to protect the security of data. Furthermore, network coding technology has been introduced into IoTs for protecting the privacy of data, where the sensor data is divided into multiple generations. Specifically, the multiple packets in any generation are signed by an identifier. With this kind of packet mixing, characteristic of the network coding, an internal or external enemy can inject some fake or modified packets into the information flow, making it more vulnerable to contamination attack, so that IoT devices cannot identify the correct and trusted data. In addition, the polluted data will spread widely. In response to network-coding-enabled IoT attack scenarios, we consider two typical types of pollution attacks. We firstly consider intra-generation attacks, where the attacker modifies the innocent packets in multiple generations. Secondly, we consider inter-generation attacks, where the attacker forges the malicious packets into valid packets in one generation. In contrast with previous defense works, we introduce a T-S fuzzy trust evaluation model to defend against malicious IoT devices and construct an energy-efficient privacy-preserving framework. In the T-S fuzzy trust evaluation model, limited bandwidth and power consumption are considered. Meanwhile, our T-S fuzzy trust model can obtain a more accurate trust evaluation value under the premise of ensuring the required stability of IoTs. Referring to [3,4,5], we design a repeated game model to perfect the energy-efficient privacy-preserving scheme, where the subgame Nash equilibrium of the repeated game model can balance the data security and network resource consumption [6]. The contributions of this research are given as follows:
  • Firstly, we propose a novel privacy-preserving scheme based on T-S fuzzy trust theory to mitigate the pollution attacks, in which the security is proved according to the hardness of the discrete logarithm.
  • Secondly, we construct a repeated game model to formulate the optimal cluster, in which subgame-perfect Nash equilibrium is achieved, and the energy efficiency is higher than in previous research under a kind of camouflage attack.
  • Finally, we prove the correctness of our privacy-preserving scheme through strict mathematical derivation and verify the performance superiority of our scheme by simulation.
The organization of this paper is as follows. In Section 2, we present the previous theories, including privacy-preserving schemes, T-S fuzzy technology, and the game theory on which this research is based. In addition, we present a variety of improved models adapted to coding trust in IoTs and discuss the shortcomings of these works in Section 3. After that, we propose the energy-efficient privacy-preserving scheme based on the T-S fuzzy trust model and repeated game model in Section 4. Then, the simulation results and discussion are provided in Section 5, proving the correctness and accuracy of our proposed model. Finally, we draw our conclusions in Section 6.

2. Related Works

2.1. Privacy-Preserving Schemes

At present, the technologies to solve pollution attacks in network coding can be roughly divided into two categories: information theory schemes and cryptography-based schemes. The information theory scheme mainly prevents pollution attacks by detecting and correcting the polluted packets on the sink node. Regarding the effectiveness of information theory methods, they cannot make intermediate nodes filter out fake messages, which means that they can only passively tolerate the pollution attacks of sink nodes.
Another solution to the problem of pollution attacks is password-based authentication technology that enables transponders to verify the accuracy of packets they receive in routing. This method enables intermediate nodes to detect and discard fraudulent packets in transmission, which can effectively reduce pollution attacks from the source [7].
In [8], a homomorphic signature scheme based on the hardness of the discrete logarithm problem was proposed, which allows a node to check the validity of a packet without decoding it. In this scheme, the node can check the integrity of the received packet by taking advantage of the linearity of the packet in the coding system. In addition, Zhang et al. [9] proposed a new idea called “orthogonal fill” in network coding, combining a signature scheme based on public keys with a MAC scheme based on symmetric keys. This scheme requires updating the public-private key tuple, which results in a high cost of forwarder calculation. Liu and Wang in [10] divided pollution attacks in actual network coding into intra-generation pollution attacks and inter-generation pollution attacks. Each packet of each generation depends on the correct identifier and the corresponding dynamic public key designed for this generation for validation. The scheme works by shuffling static keys, and each shuffling is only used in one generation. However, the scheme only focuses on the prevention of pollution attacks in general.
Besides the authentication scheme based on the asymmetric key, there is also a class of authentication schemes based on symmetric key encryption. To solve the problem of label contamination, Li et al. in [11] proposed a time-based authentication scheme called RIPPLE, which uses delayed MAC key disclosure to achieve security similar to public key authentication schemes. It is the first scheme to consider tag contamination, allowing nodes to effectively detect corrupted packets and encode only validated packets. Cheng and Jiang proposed a homomorphic message authentication code scheme for network coding in [12], which they claimed could obtain a reliable security parameter.
Although the authentication scheme based on the symmetric key has lower computational complexity than that based on the asymmetric key, it still has large bandwidth overhead and key management problems. In [13], Cheng et al. proposed two improved key distribution schemes for, respectively, signature schemes based on homomorphic subspace and label-encoding schemes based on key pre-allocation, which can reduce the homomorphism of messages belonging to two different generations to combat multi-generation pollution attacks; however, their communication costs increase significantly. In [14], Li et al. proposed a multi-source homomorphic network coding signature in the standard model to deal with multi-source devices in an IoTs network system, to ensure network availability while mitigating pollution attacks. In [15], Fiandrotti et al. propose a simple and effective method to deal with contamination attacks in point-to-point flow based on network coding. The scheme can reduce the impact of pollution attacks by selectively combining the packets of the forwarder and proving that the probability of the packet being drawn increases with time. Subsequently, in [16], Antonopoulos et al. introduced a cooperative nonparametric statistical framework to identify and mitigate node misconduct in IoT coding scenarios. The framework does not require monitoring of wireless channels and additional overhead, but it is not resistant to eavesdropping attacks. In [17], Lawrence et al. proposed a scheme based on homomorphic message authentication coding in IoTs that could identify contamination attacks and attack initiating nodes and developed data/message and marker error correction techniques. In addition, Sodhro et al. included cognitive/brainwaves via electroencephalogram (EEG), which function as a unique performance indicator to construct an energy-efficient cognitive authentication scheme [18] for smart healthcare applications, promoting the development of biometric recognition.

2.2. T-S Fuzzy

Nonlinearity is a common feature of many real systems [19,20]. It is also an important factor that directly leads to the complexity of system analysis and design. Fortunately, the “universal approval” of the Takagi–Sugeno (T-S) fuzzy model can solve the problems caused by nonlinearity well. Therefore, in the past few years, many studies have modeled nonlinear systems as T-S fuzzy systems, which are locally linear time-invariant systems connected by if-then rules. Consequently, studies on T-S fuzzy systems have attracted more and more attention [21]. Various meaningful studies on T-S fuzzy systems have been carried out. To avoid the deterioration of system performance, fault-tolerant control (FTC) and fault detection and isolation (FDI) schemes based on the T-S fuzzy model are developed in [22]. By using the set theory description of the T-S fuzzy model, aiming at the problem of fault isolation of the T-S fuzzy system, a new fault isolation method was proposed in [23], which does not introduce the measurement information of the fault isolation sensor into the premise variables of the corresponding observer. A new descriptor fuzzy sliding-mode observer approach was proposed in [24], which augments the original fuzzy plant into a descriptor system to estimate the system state, sensor fault, and actuator fault vectors at the same time.
In [25], the problem of the hybrid-triggered controller design with quantization was investigated for a T–S fuzzy system under cyber-attacks. However, in practical applications, parameter uncertainties in membership functions are usually inevitable. This has encouraged research on the sliding mode control problem of interval type-2 (IT2) fuzzy systems subject to the unmeasurable state and cyber-attacks by introducing two weighting factors [26]. In [27], by designing a fault detection observer and separating the measured premise variables explicitly from the unmeasurable ones, the finite frequency error detection problem of T-S fuzzy systems with some unmeasurable premise variables was studied.

2.3. Game Theory

The methods of using game theory to mitigate different threats to the security of the Internet of things are broadly summarized, and these methods are classified into cooperative games and non-cooperative games [28]. In addition, some potential research trends with great promising prospects in game theory have been proposed. In [29], a privacy protection solution in an intelligent transportation environment was presented based on a game model consisting of two participants (data holder and data requester). Markov chains were utilized to model transformations for finding the optimal protection strategy for data holders to keep data private over a series of interactions with the data requester. Furthermore, the characteristics of the Stackelberg game are used to model security in IoT applications [30]. At the same time, the Stackelberg game has also been extended to deal with false injected data of intelligent attacks in sensor networks to enhance data trustworthiness [31]. A repeated game model was also presented to enhance the resistance of the Internet of things to selective forwarding attacks [32]. More specifically, in this game, the credibility of high-priority data was maximized by detecting malicious nodes that discard high-priority packets. However, the model attaches too much importance to high-priority packets, which leads to the rapid degradation of low-priority packets due to the impact of unprocessed attacks. Then, cooperative game theory was used to improve security and manage cost and delay, focusing on the trust evaluation process based on mixed-strategy Nash equilibrium [33]. In [29], a repeated game model was proposed to detect and mitigate the influence of malicious cluster members, and a TDMA protocol was adopted to keep the synchronization of cluster heads and cluster members, to reduce the complexity of the detection mechanism.

3. System Model

3.1. Network Model

In this paper, a linear network coding enabling IoT is considered, in which an IoT device sends a batch of sequenced messages to multiple target nodes. The delivered messages are divided into M generations, where each message can be regarded as an n-dimensional vector over the finite field F p . Here, p is a pre-determined prime integer. Meanwhile, each generation contains m native messages. Without loss of generality, the i-th generation is labeled by an ρ -bit binary string I d i { 0 , 1 } ρ , where i { 1 , , M } and ρ log 2 M . Let Γ = { I d 1 , , I d M } represent the set of generation identifiers. Then, the set of native messages belonging to the i-th generation is defined as { D i , 1 , , D i , m } , where
D i , j = ( D i , j ( 1 ) , , D i , j ( n ) ) F p n , j { 1 , , m }
In this network model, the trust T between IoT devices is considered. The trusted routing device set in the next round of data transmission is selected by the trust value generated in the previous round of data transmission.

3.1.1. Trust Encoding at Data

For the j-th native messages D i , j in the i-th generation, a t-dimensional unit vector p j , with the j-th entry being the measurable trustworthiness T i , j for IoT devices and the other being 0, is appended into the native messages. Then, the corresponding augmented block c i , j is given as follows:
c i , j = ( p j , D i , j ) = ( 0 , , 0 j 1 , T i , j , 0 , , 0 t j t , D i , j ) F p t + n , j { 1 , , t } ,
according to the bi-linear map polynomial-time algorithm, the corresponding encrypted block is given by
E i , j = E n c r y p t ( h , I d i , c i , j ) = ( 0 , , 0 j 1 , e T i , j , 0 , , 0 t j t , D i , j ) ,
where h is the parameter in the bi-liner map between two multiplicative cyclic groups, and I d i is the number of IoT devices.

3.1.2. Trust Decoding for Receivers

When the network controller receives the encoding data, the data block is first decrypted and stored in the buffer. After receiving m non-linearly correlated data blocks, the network controller can recover the native messages by Gaussian elimination. Then, an ACK message will be fed back to the sender to confirm the transmission of the next generation of messages.

3.2. Adversary Model

We assume that there exists an attacker attempting to launch attacks in this network. The types of attacks are listed as follows:
  • Pollution attack: Attackers attempt to launch malicious data injection attacks to disrupt the data transmission. Then, data integrity and privacy are compromised.
  • Camouflage attack: Attackers deceive their surrounding trust evaluation devices by pretending to be the normal devices, which leads to the wrong trust measurement results.

3.3. T-S Fuzzy Trust Model

Here, the data-privacy-preserving model between IoT devices is introduced. However, we should also consider routing security issues in data transmission. With the development of trust evaluation technology in routing security, Li et al. [34] studied the trust routing model instead of the traditional cryptographic scheme to defend against malicious nodes in IoTs. In practical applications of IoTs, the degree of trustworthiness between IoT devices is usually complex and variable. In this section, we reasonably assume a T-S fuzzy model to mitigate the influence of subjective factors in trust evaluation. The T-S fuzzy model is defined as follows:
Definition 1.
Suppose that the domain X = { x 1 , x 2 , , x n } is a non-empty set, and x i ( i = 1 , 2 , , n ) is an element in X . For x i X , there is a mapping relation as follows: μ T : X [ 0 , 1 ] , x i μ T ( x i ) [ 0 , 1 ] ; then, the set T = { ( x 1 μ T ( x 1 ) ) , ( x 2 μ T ( x 2 ) ) , , ( x n μ T ( x n ) ) } is defined as a fuzzy subset ( x i X ) on X μ T ( x i ) , which is called the membership degree of x i to fuzzy subset T , and the mapping μ T is called the membership function of fuzzy subset T .
In Definition 1, X = { x 1 , x 2 , , x n } is the set of IoT devices. Here, we chose the communication trust T c and energy trust T e as the fuzzy characters z k to objectively describe the trustworthiness of IoT devices. Therefore, the vector v ( x j i ) = v j i = ( μ 1 i , μ 2 i , , μ m i ) formed by the membership degree of each subject competing for these finite fuzzy parameters z k is used as the evaluation trust vector of μ j i [ 0 , 1 ] , ( j = 1 , 2 , , l ) for x i , while v j i is the evaluation trust vector of node j to node i , and μ k i ( k = 1 , 2 , , m ) is the membership degree of node i ( x i ) to fuzzy parameter z k evaluated by node j . Then, the definition of the fuzzy rule is given as follows:
Definition 2.
IF v 1 i is X μ T ( 1 , x i ) and v 2 i is X μ T ( 2 , x i ) , , v j i is X μ T ( j , x i ) , THEN
x ˙ ( t ) = A i 1 i 2 i p x ( t ) + B i 1 i 2 i p μ ( t ) + a 1 ( t ) + B w n ( t ) y j 1 ( t ) = C j 2 x ( t ) , j 1 = 1 , , m h y j 2 ( t ) = C j 2 x ( t ) + a 2 j 2 ( t ) , j 2 = m h + 1 , , m ,
Where x ( t ) R n is the network statement, μ ( t ) R l denotes the map input, n ( t ) is the bias of noise, a 1 ( t ) R l is the attack intensity in network, a 2 ( t ) R l is the transmission bias for indirect trust evaluation, and y j 1 ( t ) R and y j 2 ( t ) R are respectively the output of direct and indirect trustworthiness in the T-S fuzzy model. In addition, m is the number of IoT devices within two hops of node x i , and h is the number of IoT devices that can communicate directly with node x i . Then, C is the measurable trustworthiness including communication trust C 1 and energy trust C 2 , while A i 1 i 2 i p , B i 1 i 2 i p , and B w are known matrices with suitable dimensions. Then, the y ( t ) and C can be rewritten as follows,
y ( t ) = y 1 ( t ) y 2 ( t ) , C = C 1 C 2 ,
Then, a singleton fuzzifier inference method with center average defuzzifiers is applied to rewrite the T-S fuzzy model as follows:
x ˙ ( t ) = 1 i 1 = 1 r 1 i 2 = 1 r 2 i p = 1 r p j = 1 p X μ T ( 1 , x i ) × i 1 = 1 r 1 i 2 = 1 r 2 i p = 1 r p j = 1 p X μ T ( 1 , x i ) × A i 1 p x ( t ) + B i 1 p μ ( t ) + a 1 ( t ) + B w n y ( t ) = C x ( t ) + a 2 ( t ) .
Therefore, we can obtain the objective T-S fuzzy set T = { y ( 1 ) , y ( 2 ) , , y ( t ) } , 1 t n .

4. The Energy-Efficient Privacy-Preserving Scheme Based on T-S Fuzzy Trust Model and Repeated Game Model

In this section, we introduce the framework of our privacy-preserving scheme. Figure 1 shows the relationship between fuzzy trust evaluation, the repeated game model, and the trust privacy-preserving scheme, in which the repeated game helps the network controller formulate the optimal cluster to send the data to the trust privacy-preserving scheme. The game model can obtain a balance between network performance and resource consumption so that we can ensure maximum network performance by consuming fewer resources. Here, network performance indicators include defense attack capability, energy consumption, and so on. Explanations of this can be found in [35]. Therefore, the IoT data can be safely transmitted with low energy consumption.

4.1. A Privacy-Preserving Scheme Based on T-S Fuzzy Trust Model

In this subsection, we propose a privacy-preserving scheme based on the T-S fuzzy model, which can protect data privacy against pollution attacks in coding IoT networks. Firstly, the scheme can be formulated as four steps (Encrypt, Sign, Verify, Decrypt). The details of those steps are given as follows:
  • Encrypt (h, T , I d i c ). According to Definition 1, the trust set T contains 0 and 1. When the trustworthiness of IoT devices is 1, the coding data will be received. Then, the source is generated as a series of t-bit binary strings s j j = 1 t . A keyed pseudo-random function f : { 0 , 1 } * × { 0 , 1 } * × K F p is applied to generate the encryption matrix
    E c , T = c e i , 1 c e i , t .
    Therefore, we rewrite Equation (3) as follows,
    E i , j = E n c r y p t ( h , T , I d i , c i , j ) = ( E c , T , D i , j ) .
  • Sign ( s k , I d i , c ). Suppose a full-domain hash function H : { 0 , 1 } * F p as a random oracle. The signature of source c is given by
    Δ = ζ i = 1 t + n c i s k i + i = 1 t c i H I d i s k t + n + 1 ,
    where s k is the signature key such that s k = s k 1 , , s k t + n + 1 , s k i R F p . Then, the data blocks c i i 1 σ and Δ i i 1 σ of the i-th generation are combined as follows:
    Θ i = i = 1 σ T i c i , i = 1 σ Δ T i , I d i .
  • Verify ( p k , c , I d i , Δ ). When the public key p k , a data block c , a generation I d i , and the signature Δ are given, the compared computation is given by
    η 1 = e ( Δ , o )
    and
    η 2 = e ( ζ , i = 1 t + n h i c i · i = 1 t h t + n + 1 H ( I d i ) c i ) .
    where o is the generator of G , p k = ( ζ , o , G , G D , h ) , and μ R G { 1 } . G and G D are two multiplicative cyclic groups, which satisfy e : G × G G D in a bilinear map, and h : = o s k 1 , , o s k t + n + 1 . When η 1 = η 2 , the verification is successful; otherwise, it fails.
  • Decrypt (h, T , I d i c ). When the secret key k and the pseudo-random function f are given, the decryption matrix can be computed as follows:
    DE c , T = c e i , 1 1 c e i , t 1

4.2. The Correctness and Security Analysis of Our Privacy-Preserving Sheme

In this subsection, we provide the correctness analysis of our privacy-preserving scheme with two theorems and proofs.
Theorem 1.
Given an augmented data block c i including coding vector p and native message D , Decrypt ( T , I d i Encrypt ( h , T , I d i , c ) ) = c .
Proof of Theorem 1.
According to Equation (8), the encrypted augmented data block c E is given as follows:
c E = E c , T · ( p , D ) = ( E c , T · p , E c , T · D ) ,
Then, according to our scheme, the decryption matrix can be expressed as follows:
c D = D E c , T · c E = D E c , T · ( E c , T · p , E c , T · D ) = c e 1 c e 1 · c e c e · p , c e c e · D = ( p , D ) = c
Therefore, The proof is completed. □
Theorem 2.
For any generation I d i and c F p t + n ,Verify( p k , c , I d i , Δ) is successful.
Proof of Theorem 2.
According to Equations (9)–(12), we have
η 1 = e ( Δ , o ) = e ( ζ i = 1 t + n c i s k i + i = 1 t c i H I d i s k t + n + 1 , o ) = e ( ζ , o ) i = 1 t + n c i s k i + i = 1 t c i H I d i s k t + n + 1
and
η 2 = e ( ζ , i = 1 t + n h i c i · i 1 t h t + n + 1 H ( I d i ) c i ) = e ( ζ , i = 1 t + n o s k i c i · i 1 t o s k t + n + 1 H ( I d i ) c i ) = e ( ζ , o i = 1 t + n c i s k + i = 1 t c i H I d i s k t + n + 1 ) = e ( ζ , o ) i = 1 t + n c i s k i + i = 1 t c i H I d i s k t + n + 1
Therefore, η 1 = η 2 can be held for any generation I d i and c F p t + n . □
The security of our privacy-preserving scheme relies on the hardness of the discrete logarithm over G , where for any x Z p * and given ( g , g x ) , x cannot be computed in any polynomial algorithm [36].

4.3. The Optimization Cluster Formulation Scheme Based on Repeated Game Model

After considering the data privacy and the trustworthiness of IoT devices, an effective trust cluster formulation scheme (ETCFS) is designed based on the repeated game for preserving the network stability and conserving the power consumption due to packet re-transmission. Many studies in the literature have reported that the repeated game model can solve the balance problem between network performance and resource consumption.

4.3.1. Repeated Game Model

In this sub-subsection, we first present a repeated game model based on the trustworthiness to elect the trust route IoT devices. Then, the subgame-perfect Nash equilibrium is given. Furthermore, the repeated game model is formally defined as follows:
(a)
Attackers A r = { A 1 , A 2 , , A r } and defenders D r = { D 1 , D 2 , , D r } are the cooperating parties in the repeated game, where r N + .
(b)
Given the utility function U A r and U D r , and the loss discount δ , the average utility is lim r j = 1 r U A r and lim r j = 1 r U D r , where r is number of iterations according to the lifetime of the network. Furthermore, the total payoff for both parties are respectively as follows:
U A = U A 1 + δ U A 2 + δ 2 U A 3 + + δ r 1 U A r = r = 1 r δ r 1 U A r ,
U D = U D 1 + δ U D 2 + δ 2 U D 3 + + δ r 1 U D r = r = 1 r δ r 1 U D r ,
where the weight of the current and future payoff is inconsistent, and the future payoff is generally less than the weight of the current payoff.
(c)
The proposed repeated game model is finite due to the power of the entire network being predetermined. Therefore, the finite repeated game can be solved by the backward method, which basically converges to the sub-game equilibrium.

4.3.2. The Solution of Repeated Game Model for Optimizing Cluster Formulation

In the IoT, the various IoT devices including pads, phones, and monitors are members of the cluster (CM). The network controller hopes that the IoT devices with higher energy and trustworthiness become cluster heads (CH). Furthermore, the energy level E of IoT devices is divided into two subsets, that is, E h and E l based on the remaining energy, where E h is the set of nodes having energy more than or equal to the threshold E t h , and E l is lower than E t h . Each IoT device in the cluster can select CH or CM according to the two strategies S = C H , C M . In addition, the payoff of players can be found in Table 1.
Meanwhile, the network controller is a defender, and other IoT devices may be normal or malicious, so the utility function U A r and U D r in the iteration r can be defined as follows:
(a)
Suppose that all members of E h and E l IoT devices become CH with no CM, and the payoffs of defender and attacker are decreasing. At this time, the cluster is illegal. Therefore, the utility of defender and attacker in the iteration r can be expressed as
U D , T r = α T h 2 θ C h U A , T r = α T l ,
where α and θ are the weights of the reward and penalty, α + θ = 1 , α , θ [ 0 , 1 ] . T h and T l are the trustworthiness of low-energy and high-energy IoT devices. Meanwhile, C h and C l are the communication costs of high-energy and low-energy IoT devices.
(b)
Suppose that E h and E l IoT devices respectively become CH and CM; the payoff of the defender is the highest, and that of the attacker is the lowest. Therefore, the utility of the defender and attacker in the iteration r can be expressed as
U D , T r = 2 α T h θ C h U A , T r = α T l 2 θ C l ,
(c)
Suppose that E l and E h IoT devices respectively become CH and CM, and the payoffs of the attacker are the highest. However, the CH with E l can also help the network controller formulate a legal cluster. Therefore, the weight of reward and penalty are predefined, and the utility of defender and attacker in the iteration r are given by
U D , T r = T h θ C h U A , T r = 2 α T l θ C l ,
(d)
Suppose that E l and E h IoT devices have become CM with no CH; then, the cluster is illicit. Therefore, the respective utilities of the defender and attacker in the iteration r are given by
U D , T r = α T h 2 θ C h U A , T r = α T l θ C l ,
Then, we achieve subgame-perfect Nash equilibrium ( ψ * , ξ * ) = ( 1 , 0 ) according to the evolutionarily stable strategy (ESS) [35]. The details can be seen in Appendix A.

5. Simulation Result and Discussion

This section shows the simulation result of the energy-efficient privacy-preserving scheme and ETCFS scheme in IoTs. We use the OMNET++ simulator to construct the network model with malicious activity and compute the trustworthiness of each IoT device. The details of parameters used to configure the network model are given in Table 2. Then, we compare the ETCFS scheme with state-of-the-art TDDG [33], HIDS [37], and LHIDS [38] to show the effectiveness of the above schemes. In addition, the maximum running iteration of the simulation is 100.

5.1. Simulation Parameter Setting

In this subsection, we define the metrics, including trustworthiness, the running time of the privacy-preserving scheme, and the lifetime of the IoT, to discuss the performance of the privacy-preserving scheme and ETCFS scheme.
(a)
The trustworthiness of each IoT device consists of direct trust T d i r e c t and indirect trust T i n d i r e c t . The total trust is defined as follows:
T t o t a l = λ 1 T d i r e c t + λ 2 T i n d i r e c t
where λ 1 and λ 2 are the weight parameters of direct and indirect trust, which satisfy λ 1 + λ 2 = 1 . The trust evaluation method including direct and indirect trust can be found in [39].
(b)
The running time of the privacy-preserving scheme reflects the effectiveness of our scheme, which can run faster than previous schemes [40,41], while satisfying the demand for data privacy.
(c)
The lifetime of the IoT reflects lower resource consumption than in other literature. Furthermore, the lifetime of IoTs with our repeated game model is the highest.

5.2. Performance Comparison

In this subsection, we compare the performance of the proposed privacy-preserving and ETCFS scheme with the state-of-the-art methods under the preset network parameters.
(a)
Energy Efficiency with T-S Fuzzy Trust Model: In Figure 2 and Figure 3, the energy consumption of our T-S fuzzy trust model is compared with NCS0-, NCS1-, and ID-based schemes. The result of the simulation shows that our scheme has the lowest energy consumption. As the number of attack nodes in the IoT increases, the energy required for trust evaluation gradually increases. However, the energy consumption of our scheme has been in a stable state, and there is no significant increase. Meanwhile, our scheme has the highest remaining energy than other schemes when the i t e r a t i o n = [30–100].
(b)
Time Efficiency of Our Privacy-Preserving Scheme: In Figure 4, the runtime of our trust-based privacy-preserving scheme is the lowest compared to the other three methods. In addition, our scheme has higher stability according to the magnitude of running time variation.
(c)
Time Consumption with Cluster Formulation: In Figure 5 and Figure 6, we compare the time consumption when the hop limit is 1 and 2 under camouflage attack. Based on theoretically verifying that the proposed repeated game has effective game equilibrium, we also find our game-based cluster formulation has the lowest time consumption.

6. Conclusions

This paper investigates a novel fuzzy-based privacy-preserving scheme to defend against pollution attacks in coding IoTs and constructs a repeated game model to balance data security and energy consumption. We propose a T-S fuzzy trust evaluation method to replace the traditional cryptography scheme and reduce the energy consumption in IoTs. Then, we introduce the trust-based privacy-preserving scheme, in which the security relies on the hardness of the discrete logarithm. Finally, an optimal cluster formulation based on the repeated game model is proposed to balance the data security and energy consumption. The result shows that the cluster formulation can mitigate the camouflage attack. In addition, our scheme only considers two types of attacks in IoTs. Therefore, we will consider more kinds of attacks on IoT data, and construct more effective privacy-preserving schemes in future work.

Author Contributions

Conceptualization, L.C. and M.Z.; methodology, L.C.; software, M.Z.; validation, L.C. and M.Z.; formal analysis, M.Z.; investigation, L.C.; resources, M.Z.; data curation, L.C.; writing—original draft preparation, M.Z.; writing—review and editing, L.C.; visualization, M.Z.; supervision, L.C.; project administration, M.Z.; funding acquisition, L.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Nature Science Foundation of China under (grant no. 61562059, 61461027, 61462060).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Appendix A.1. The Optimizing Solution of Defenders

U D E h CH = r = 1 r δ r 1 [ ξ ( α T h 2 θ C h ) + ( 1 ξ ) ( 2 α T h θ C h ) ] U D E h CM = r = 1 r δ r 1 [ ξ ( T h θ C h ) + ( 1 ξ ) ( α T h 2 θ C h ) ] U D E l CH = r = 1 r δ r 1 [ ξ ( α T h 2 θ C h ) + ( 1 ξ ) ( T h θ C h ) ] U D E l CM = r = 1 r δ r 1 [ ξ ( 2 α T h θ C h ) + ( 1 ξ ) ( α T h 2 θ C h ) ] ,
U D ¯ = ψ U D E h CH + ( 1 ψ ) U D E h CM + ( 1 ψ ) U D E l CH + ψ U D E l CM = r = 1 r δ r 1 ψ ξ ( α T h 2 θ C h ) + ψ ( 1 ξ ) ( 2 α T h θ C h ) + ( 1 ψ ) ξ ( T h θ C h ) + ( 1 ψ ) ( 1 ξ ) ( α T h 2 θ C h ) + ( 1 ψ ) ξ ( α T h 2 θ C h ) + ( 1 ψ ) ( 1 ξ ) ( T h θ C h ) + ψ ξ ( 2 α T h θ C h ) + ψ ( 1 ξ ) ( α T h 2 θ C h ) = r = 1 r δ r 1 [ ( α T h 2 θ C h ) + ( 2 α T h θ C h ) ψ + ( T h θ C h ) ( 1 ψ ) ] = r = 1 r δ r 1 [ ( 1 + 2 ψ ) α T h 3 θ C h + T h ( 1 ψ ) ]
d ψ d r = ψ ( U D E h CH + U D E l CM U D ¯ ) = ψ r = 1 r δ r 1 ξ ( α T h 2 θ C h ) + ( 1 ξ ) ( 2 α T h θ C h ) + ξ ( 2 α T h θ C h ) + ( 1 ξ ) ( α T h 2 θ C h ) [ ( 1 + 2 ψ ) α T h 3 θ C h + T h ( 1 ψ ) ] = ψ r = 1 r δ r 1 [ ( 2 2 ψ ) α T h ( 1 ψ ) T h ) ] = r = 1 r δ r 1 ψ ( 1 ψ ) ( 2 α T h T h )
when d ψ d r = 0 , the player D achieves a stable state. Therefore, when ψ * = 0 or 1, the player D has the highest payoff.

Appendix A.2. The Optimizing Solution of Attackers

Similarly, the expression of player A is obtained as follows:
U A E h CH = r = 1 r δ r 1 [ ψ ( α T l ) + ( 1 ψ ) ( α T l 2 θ C l ) ] U A E h CM = r = 1 r δ r 1 [ ψ ( 2 α T l θ C l ) + ( 1 ψ ) ( α T l θ C l ) ] U A E l CH = r = 1 r δ r 1 [ ψ ( α T l ) + ( 1 ψ ) ( 2 α T l θ C l ) ] U A E l CM = r = 1 r δ r 1 [ ψ ( α T l 2 θ C l ) + ( 1 ψ ) ( α T l θ C l ) ]
U A ¯ = ξ U A E h CH + ( 1 ξ ) U A E h CM + ( 1 ξ ) U A E l CH + ξ U A E l CM = r = 1 r δ r 1 ξ ( α T l 2 θ C l ) + ( 1 ξ ) ( 2 α T l θ C l ) + ( 1 ψ ) ( α T l θ C l ) + ψ ( α T l ) = r = 1 r δ r 1 [ ( 3 ξ ) α T l + ( ψ ξ 2 ) θ C l ]
d ξ d r = r = 1 r δ r 1 ξ ( U A E h CM + U A E l CH U A ¯ ) = r = 1 r δ r 1 ξ ψ ( 2 α T l θ C l ) + ( 1 ψ ) ( α T l θ C l ) + ψ ( α T l ) + ( 1 ψ ) ( 2 α T l θ C l ) ( 3 ξ ) α T l ( ψ ξ 2 ) θ C l = r = 1 r δ r 1 ξ [ ( ψ + ξ ) α T l + ξ θ C l ]
When the ψ * = 0 ; the ξ * = 0 , relatively; the ψ * = 1 ; the ξ * = 0 ; and the optimizing payoffs of defender and attacker can be achieved. Furthermore, according to the reality, the subgame-perfect nash equilibrium is obtained as ( ψ * , ξ * ) = ( 1 , 0 ) .

References

  1. Noor, M.B.M.; Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 2018, 148, 283–294. [Google Scholar] [CrossRef]
  2. Rani, R.; Kumar, S.; Dohare, U. Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach. IEEE Internet Things J. 2019, 6, 8421–8432. [Google Scholar] [CrossRef]
  3. Wu, Y.; Kang, B.; Wu, H. Strategies of attack–defense game for wireless sensor networks considering the effect of confidence level in fuzzy environment. Eng. Appl. Artif. Intell. 2021, 102, 104238. [Google Scholar] [CrossRef]
  4. Hou, J.; Qiao, J.; Han, X. Energy-Saving Clustering Routing Protocol for Wireless Sensor Networks Using Fuzzy Inference. IEEE Sens. J. 2022, 22, 2845–2857. [Google Scholar] [CrossRef]
  5. Kumar, S.; Goswami, A.; Gupta, R.; Singh, S.P.; Lay-Ekuakille, A. A Game-Theoretic Approach for Cost-Effective Multicast Routing in the Internet of Things. IEEE Internet Things J. 2022. [Google Scholar] [CrossRef]
  6. Adil, M.; Khan, R.; Almaiah, M.A.; Binsawad, M.; Ali, J.; Saaidah, A.A.; Ta, Q.T.H. An Efficient Load Balancing Scheme of Energy Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks. IEEE Access 2020, 8, 148510–148527. [Google Scholar] [CrossRef]
  7. Zhang, P.; Wang, Y.; Kumar, N.; Jiang, C.; Shi, G. A Security and Privacy-Preserving Approach Based on Data Disturbance for Collaborative Edge Computing in Social IoT Systems. IEEE Trans. Comput. Soc. Syst. 2021, 9, 97–108. [Google Scholar] [CrossRef]
  8. Zhao, F.; Kalker, T.; Medard, M.; Han, K.J. Signatures for Content Distribution with Network Coding. In Proceedings of the 2006 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, USA, 22–24 March 2006. [Google Scholar]
  9. Peng, Z.; Jiang, Y.; Lin, C.; Yao, H.; Shen, X. Padding for orthogonality: Efficient subspace authentication for network coding. In Proceedings of the Infocom, Shanghai, China, 10–15 April 2011. [Google Scholar]
  10. Guangjun, L.; Bin, W. Secure network coding against intra/inter-generation pollution attacks. China Commun. 2013, 10, 100–110. [Google Scholar] [CrossRef]
  11. Li, Y.; Yao, H.; Chen, M.; Jaggi, S.; Rosen, A. RIPPLE Authentication for Network Coding. In Proceedings of the 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010; pp. 1–9. [Google Scholar] [CrossRef]
  12. Cheng, C.; Jiang, T. An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding. IEEE Trans. Comput. 2013, 62, 2096–2100. [Google Scholar] [CrossRef]
  13. Cheng, C.; Lee, J.; Jiang, T.; Takagi, T. Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding. IEEE Trans. Inf. Forensics Secur. 2016, 11, 993–1002. [Google Scholar] [CrossRef]
  14. Li, T.; Chen, W.; Tang, Y.; Yan, H. A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT. Secur. Commun. Netw. 2018, 2018, 9641273. [Google Scholar] [CrossRef]
  15. Fiandrotti, A.; Gaeta, R.; Grangetto, M. Simple Countermeasures to Mitigate the Effect of Pollution Attack in Network Coding-Based Peer-to-Peer Live Streaming. IEEE Trans. Multimed. 2015, 17, 562–573. [Google Scholar] [CrossRef] [Green Version]
  16. Antonopoulos, A.; Verikoukis, C. COPS: Cooperative Statistical Misbehavior Mitigation in Network-Coding-aided Wireless Networks. IEEE Trans. Ind. Inform. 2017, 14, 1436–1446. [Google Scholar] [CrossRef]
  17. Lawrence, T.; Li, F.; Ali, I.; Kpiebaareh, M.Y.; Christopher, T. An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification. J. Syst. Archit. 2021, 116, 102051. [Google Scholar] [CrossRef]
  18. Sodhro, A.H.; Sennersten, C.; Ahmad, A. Towards Cognitive Authentication for Smart Healthcare Applications. Sensors 2022, 22, 2101. [Google Scholar] [CrossRef]
  19. Li, X.J.; Yan, J.J.; Yang, G.H. Adaptive Fault Estimation for T-S Fuzzy Interconnected Systems Based on Persistent Excitation Condition via Reference Signals. IEEE Trans. Cybern. 2018, 49, 2822–2834. [Google Scholar] [CrossRef]
  20. Rajeswari, A.R.; Kulothungan, K.; Ganapathy, S.; Kannan, A. Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT. J. Intell. Fuzzy Syst. 2021, 40, 9197–9211. [Google Scholar] [CrossRef]
  21. Cao, K.-R.; Liu, J.-Q.; Huang, X.-L.; Gao, X.-Z.; Ban, X.-J. Stability Analysis of T–S Fuzzy Control Systems by Using Set Theory. J. Harbin Inst. Technol. 2012, 19, 7–11. [Google Scholar]
  22. Han, J.; Zhang, H.; Wang, Y.; Zhang, K. Fault Estimation and Fault-Tolerant Control for Switched Fuzzy Stochastic Systems. IEEE Trans. Fuzzy Syst. 2018, 26, 2993–3003. [Google Scholar] [CrossRef]
  23. Dong, J.; Wu, Y.; Yang, G.H. A New Sensor Fault Isolation Method for T–S Fuzzy Systems. IEEE Trans. Cybern. 2017, 47, 2437–2447. [Google Scholar] [CrossRef]
  24. Liu, M.; Cao, X.; Shi, P. Fuzzy-model-based fault-tolerant design for nonlinear stochastic systems against simultaneous sensor and actuator faults. IEEE Trans. Fuzzy Syst. 2012, 21, 789–799. [Google Scholar] [CrossRef]
  25. Liu, J.; Wei, L.; Xie, X.; Tian, E.; Fei, S. Quantized Stabilization for T–S Fuzzy Systems With Hybrid-Triggered Mechanism and Stochastic Cyber-Attacks. IEEE Trans. Fuzzy Syst. 2018, 26, 3820–3834. [Google Scholar] [CrossRef]
  26. Zhang, Z.; Niu, Y.; Song, J. Input-to-State Stabilization of Interval Type-2 Fuzzy Systems Subject to Cyberattacks: An Observer-Based Adaptive Sliding Mode Approach. IEEE Trans. Fuzzy Syst. 2019, 28, 190–203. [Google Scholar] [CrossRef]
  27. Yan, J.J.; Yang, G.H.; Li, X.J. Fault detection in finite frequency domain for T-S fuzzy systems with partly unmeasurable premise variables. Fuzzy Sets Syst. 2020, 421, 158–177. [Google Scholar] [CrossRef]
  28. Mohamed, A.; Karim, S.; Maha, E.; Osamu, M.; Hiroshi, F.; Adel, A.R. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey. Sensors 2016, 16, 1003. [Google Scholar]
  29. Riahi Sfar, A.; Challal, Y.; Moyal, P.; Natalizio, E. A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation. IEEE Trans. Intell. Transp. Syst. 2019, 20, 4405–4414. [Google Scholar] [CrossRef]
  30. Abdalzaher, M.S.; Seddik, K.; Muta, O.; Mohamed. Using Stackelberg game to enhance cognitive radio sensor networks security. IET Commun. 2017, 11, 1503–1511. [Google Scholar] [CrossRef]
  31. Abdalzaher, M.S.; Seddik, K.; Muta, O. An effective Stackelberg game for high-assurance of data trustworthiness in WSNs. In Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 3–6 July 2017. [Google Scholar]
  32. Abdalzaher, M.S.; Seddik, K.; Muta, O. Using repeated game for maximizing high priority data trustworthiness in Wireless Sensor Networks. In Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 3–6 July 2017. [Google Scholar]
  33. Duan, J.; Gao, D.; Yang, D.; Foh, C.H.; Chen, H.H. An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications. Internet Things J. 2014, 1, 58–69. [Google Scholar] [CrossRef]
  34. Li, Y.; Shi, L.; Chen, T. Detection against linear deception attacks on multi-sensor remote state estimation. IEEE Trans. Control. Netw. Syst. 2017, 5, 846–856. [Google Scholar] [CrossRef]
  35. Yan, S.; Peng, M.; Cao, X. A Game Theory Approach for Joint Access Selection and Resource Allocation in UAV Assisted IoT Communication Networks. IEEE Internet Things J. 2019, 6, 1663–1674. [Google Scholar] [CrossRef]
  36. Liu, X.; Huang, J.; Wu, Y.; Zong, G. A privacy-preserving signature scheme for network coding. IEEE Access 2019, 7, 109739–109750. [Google Scholar] [CrossRef]
  37. Yan, K.; Wang, S.; Wang, S.; Liu, C. Hybrid intrusion detection system for enhancing the security of a cluster-based wireless sensor network. In Proceedings of the 2010 3rd International Conference on Computer Science and Information Technology, Chengdu, China, 9–11 July 2010; Volume 1, pp. 114–118. [Google Scholar]
  38. Sedjelmaci, H.; Senouci, S.M.; Taleb, T. An accurate security game for low-resource IoT devices. IEEE Trans. Veh. Technol. 2017, 66, 9381–9393. [Google Scholar] [CrossRef]
  39. Qi, C.; Huang, J.; Wang, B.; Wang, H. A Novel Privacy-Preserving Mobile-Coverage Scheme Based on Trustworthiness in HWSNs. Wirel. Commun. Mob. Comput. 2021, 2021, 9935780. [Google Scholar] [CrossRef]
  40. Boneh, D.; Freeman, D.; Katz, J.; Waters, B. Signing a linear subspace: Signature schemes for network coding. In Proceedings of the International Workshop on Public Key Cryptography, Irvine, CA, USA, 18–20 March 2009; pp. 68–87. [Google Scholar]
  41. Lin, Q.; Yan, H.; Huang, Z.; Chen, W.; Shen, J.; Tang, Y. An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 2018, 6, 20632–20640. [Google Scholar] [CrossRef]
Figure 1. The framework of the fuzzy-based privacy-preserving scheme based on the repeated game. The devices in the solid line frame are common IoT devices in the cluster, and the dotted line is the routing device that guarantees data uploading.
Figure 1. The framework of the fuzzy-based privacy-preserving scheme based on the repeated game. The devices in the solid line frame are common IoT devices in the cluster, and the dotted line is the routing device that guarantees data uploading.
Sensors 22 05674 g001
Figure 2. The energy consumption with T-S fuzzy trust model.
Figure 2. The energy consumption with T-S fuzzy trust model.
Sensors 22 05674 g002
Figure 3. The remaining energy for the T-S fuzzy trust model with different iterations.
Figure 3. The remaining energy for the T-S fuzzy trust model with different iterations.
Sensors 22 05674 g003
Figure 4. The running time of signature, encryption, and verification in different schemes against packet length.
Figure 4. The running time of signature, encryption, and verification in different schemes against packet length.
Sensors 22 05674 g004
Figure 5. The time consumption with cluster formulation under different schemes in camouflage attack (hop limit = 1).
Figure 5. The time consumption with cluster formulation under different schemes in camouflage attack (hop limit = 1).
Sensors 22 05674 g005
Figure 6. The time consumption with cluster formulation under different schemes in camouflage attack (hop limit = 2).
Figure 6. The time consumption with cluster formulation under different schemes in camouflage attack (hop limit = 2).
Sensors 22 05674 g006
Table 1. The different payoffs under different behaviors of players.
Table 1. The different payoffs under different behaviors of players.
StrategyTo Be CHTo Be CM
Normal U i , j ( N , C H ) , U i , j ( N , C H ) U i , j ( N , C M ) , U i , j ( N , C M )
Malicious U i , j ( M , C H ) , U i , j ( M , C H ) U i , j ( M , C M ) , U i , j ( M , C M )
Table 2. The simulation network parameters.
Table 2. The simulation network parameters.
ParameterValueParameterValue
Network region200 × 200 m 2 Communication radius2 m
Number of IoT devices100Sensing radius1 m
Initial trustworthiness0.6Attack intensity0.2–0.6
Packet length400–1000 α , θ , δ 0.2, 0.2, 0.4
Initial energy10 JMaximum iteration100
Eth4 JHop limit2
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Cao, L.; Zhu, M. Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model. Sensors 2022, 22, 5674. https://0-doi-org.brum.beds.ac.uk/10.3390/s22155674

AMA Style

Cao L, Zhu M. Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model. Sensors. 2022; 22(15):5674. https://0-doi-org.brum.beds.ac.uk/10.3390/s22155674

Chicago/Turabian Style

Cao, Laicheng, and Min Zhu. 2022. "Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model" Sensors 22, no. 15: 5674. https://0-doi-org.brum.beds.ac.uk/10.3390/s22155674

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop