Abstract

The geographic information system (GIS) is the important system these days for navigation and directing the routes. In order to detect the security risks of the GIS efficiently and accurately and to protect the security of the GIS, a GIS security risk detection method in the Internet of Things based on network security situational awareness has been proposed. The data preprocessing method based on the operation data of the GIS is adopted. The normalized and standardized processing of the operation data of the GIS is devised to reduce the dimensional difference between the data and the geographical areas. This will facilitate the subsequent applications of the GIS to make better decisions by preserving the security. The redundant data in the GIS operation data are removed by using feature reduction algorithms through the acquisition method. The security elements based on enhanced probabilistic neural network are inferred, and the useful data samples are obtained as the security elements detection set. A rough set theory is also used to realize geographic security hidden danger identification. The experimental results show that the proposed method is efficient to maintain security and to detect the geographic security risk detection within a short span of time. The detection result accuracy is high, which meets the GIS application requirements.

References

1.
Ahmad
M.
,
Khayal
M. S. H.
, and
Tahir
A.
, “
Analysis of Factors Affecting Adoption of Volunteered Geographic Information in the Context of National Spatial Data Infrastructure
,”
ISPRS International Journal of Geo-Information
11
, no. 
2
(February
2022
): 120, https://doi.org/10.3390/ijgi11020120
2.
Shen
L.
and
Wen
Z.
, “
Research on Anomaly Detection of Network Security Situation Based on Interval Estimation
,”
Journal of Computational Methods in Sciences and Engineering
20
, no. 
1
(April
2020
):
13
24
, https://doi.org/10.3233/JCM-193574
3.
Shen
L.
and
Wen
Z.
, “
Network Security Situation Prediction in the Cloud Environment Based on Grey Neural Network
,”
Journal of Computational Methods in Sciences and Engineering
19
, no. 
1
(January
2019
):
153
167
, https://doi.org/10.3233/JCM-180873
4.
Saxena
N.
,
Grijalva
S.
,
Chukwuka
V.
, and
Vasilakos
A. V.
, “
Network Security and Privacy Challenges in Smart Vehicle-to-Grid
,”
IEEE Wireless Communications
24
, no. 
4
(August
2017
):
88
98
, https://doi.org/10.1109/MWC.2016.1600039WC
5.
Hamilton
N. J.
and
Gitchel
D.
, “
Using the QUAIT Model to Effectively Teach Research Methods Curriculum to Master’s-Level Students
,”
Rehabilitation Research, Policy, and Education
31
, no. 
1
(February
2017
):
61
68
, https://doi.org/10.1891/2168-6653.30.1.61
6.
Zaiyi
P.
, “
Network Security Situation Analysis Based on a Dynamic Bayesian Network and Phase Space Reconstruction
,”
The Journal of Supercomputing
76
, no. 
2
(February
2020
):
1342
1357
, https://doi.org/10.1007/s11227-018-2575-3
7.
Endsley
M. R.
, “
Situation Awareness Misconceptions and Misunderstandings
,”
Journal of Cognitive Engineering and Decision Making
9
, no. 
1
(March
2015
):
4
32
, https://doi.org/10.1177/1555343415572631
8.
Hasheminasab
S. A.
and
Tork Ladani
B.
, “
Security Investment in Contagious Networks
,”
Risk Analysis
38
, no. 
8
(August
2018
):
1559
1575
, https://doi.org/10.1111/risa.12966
9.
Cato
N.
, “
On Next Generation Network Security
,”
IEEE Network
31
, no. 
2
(March/April
2017
): 2, https://doi.org/10.1109/MNET.2017.7884939
10.
Habibzadeh
H.
,
Kaptan
C.
,
Soyata
T.
,
Kantarci
B.
, and
Boukerche
A.
, “
Smart City System Design: A Comprehensive Study of the Application and Data Planes
,”
ACM Computing Surveys
52
, no. 
2
(March
2020
):
1
38
, https://doi.org/10.1145/3309545
11.
Hyun
S.
,
Kim
J.
,
Kim
H.
,
Jeong
J.
,
Hares
S.
,
Dunbar
L.
, and
Farrel
A.
, “
Interface to Network Security Functions for Cloud-Based Security Services
,”
IEEE Communications Magazine
56
, no. 
1
(January
2018
):
171
178
, https://doi.org/10.1109/MCOM.2018.1700662
12.
Lu
Z.
,
Qu
G.
, and
Liu
Z.
, “
A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy
,”
IEEE Transactions on Intelligent Transportation Systems
20
, no. 
2
(February
2019
):
760
776
, https://doi.org/10.1109/TITS.2018.2818888
13.
Abdalzaher
M. S.
, “
Using Stackelberg Game to Enhance Cognitive Radio Sensor Networks Security
,”
IET Communications
11
, no. 
9
(June
2017
):
1503
1511
, https://doi.org/10.1049/iet-com.2016.1336
14.
Feng
S.
,
Xiong
Z.
,
Niyato
D.
,
Wang
P.
,
Han
Z.
, and
Kim
D. I.
, “
Joint Traffic Routing and Virtualized Security Function Activation in Wireless Multihop Networks
,”
IEEE Transactions on Vehicular Technology
68
, no. 
9
(September
2019
):
9205
9219
, https://doi.org/10.1109/TVT.2019.2930657
15.
Zhang
P.
,
Durresi
M.
, and
Durresi
A.
, “
Multi-access Edge Computing Aided Mobility for Privacy Protection in Internet of Things
,”
Computing
101
, no. 
7
(July
2019
):
729
742
, https://doi.org/10.1007/s00607-018-0639-0
This content is only available via PDF.
You do not currently have access to this content.