| The emergence of the Internet of things(IoT)has driven the rapid development of a new generation of sensor and control applications,such as smart cities,smart health and smart homes,and is expected to have more than 20.4 billion IoT devices by 2020.Such a large network faces a series of new challenges,including security,radio spectrum scarcity,network complexity,data management and lack of standards.The new generation of wireless protocols must be applicable to such a large network,which brings the problems of dynamic spectrum management and securit y authentication in the Internet of things network.In view of this,this paper mainly does the following two aspects of work:1.A key generation scheme based on serial cascade BCH polarity code is proposedSecurity authentication is one of the key challenges facing Internet of thin gs networks,and connected devices need to be protected from potential malicious and selfish attacks.Traditional encryption methods do not easily scale up to large-scale Internet of things networks because they typically require the generation,distributio n and storage of keys in devices and are vulnerable to malicious attacks.Hardware-based security methods have been quite successful in identifying and authenticating applications,but they still do not provide a reliable solution for key generation applications because their performance is highly dependent on physical and environmental factors.Therefore,this paper proposes a new structure o f error correction and fuzzy extractor,and develops a hardware-based key generation mechanism that utilizes random changes in embedded memory in iot devices to generate reproducible and reliable keys.This method firstly designs a fuzzy extractor which USES BCH and polar coordinate encoding in series to generate the key and auxiliary data,and then sends the BCH encoded P UF data to the polar encoder to generate the noise PUF data and auxiliary data.After the former passes the key registration,the key with noise will be obtained.The noise key is combined with auxiliary data and processed by BCH decoder after polarity deco der to obtain an approximate estimate of the key.Then,the estimate is reconstructed through the fuzzy extractor "reproduce" and hashed to the server for verification.Finally,the securit y authentication process of iot devices is completed.2.Proposed a wireless spectrum management method for iot devices based on alliance formation game theoryIn this paper,a spectrum leasing mechanism based on reputation is developed,which provides a potential solution for spectrum scarcity in the Internet of things network.The current static spectrum management method leads to very inefficient utilization of spectrum resources,which is a kind of scarce resources.In recent years,the development of communication equipment leads the development of dynamic spectrum management technology.This dynamic spectrum management can take the form of spectrum sharing without involving author ized users or more complex spectrum leasing methods,and spectrum owners can voluntarily allocate a portion of their spectrum to unauthorized users.While such spectrum sharing solutions typically improve spectrum utilization and quality of service(QoS)for spectrum owners,they are highly sensitive to potential selfish attacks.A selfish user may try to use the leased spectrum for his own data transmission without allocating enough power to transmit the authorized relay user packets.Therefore,according to the alliance formation game theory,we propose a hybrid Stackelberg-coalition formation game theory model based on reputation,which enables users with low cooperative reputation to obtain spectrum access and provide them with spectrum access opportunities,so as to improve the efficiency of spectrum application. |