{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T07:18:48Z","timestamp":1767165528259,"version":"build-2238731810"},"reference-count":35,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T00:00:00Z","timestamp":1623974400000},"content-version":"vor","delay-in-days":168,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>This paper analyzes the current real\u2010time monitoring system based on grey\u2010related IoT security sensors for the detection of risk factors in the production environment of the Internet of Things and proposes a design plan for the Internet of Things environment monitoring based on the grey\u2010related Internet of Things security sensor network, and according to the reliability guarantee mechanism of the system, a three\u2010dimensional uniform IoT node deployment method suitable for IoT security monitoring is proposed. Based on the grey correlation analysis, it can provide a quantitative measurement analysis for the development and change state of a system, which is very suitable for the analysis of dynamic operating systems. As a real\u2010time dynamic system of the Internet of Things, the use of grey correlation method to analyze its network security status has good operability and practical value. According to the multisource information processing technology, the monitoring data are preprocessed by dynamic limiting filtering, and then the data are fused at the data level with the optimal weighting algorithm. Through the use of grey correlation analysis to quantify the relative impact of cyberattacks on the network within a certain period of time, the quantitative assessment of the security environment and status of the entire network is realized. Finally, the characteristics of grey relational analysis and rough set theory attribute reduction are used to form the basis of grey correlation decision\u2010level fusion algorithm, to achieve effective processing of the data of the Internet of Things security monitoring system.<\/jats:p>","DOI":"10.1155\/2021\/7504806","type":"journal-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T14:50:07Z","timestamp":1624027807000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["[Retracted] Internet of Things Security Detection Technology Based on Grey Association Decision Algorithm"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8484-482X","authenticated-orcid":false,"given":"Jie","family":"Chang","sequence":"first","affiliation":[]},{"given":"Xiaojun","family":"Zuo","sequence":"additional","affiliation":[]},{"given":"Botao","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Lipeng","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Guanghua","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"e_1_2_7_1_2","first-page":"663","article-title":"A survey on the internet of things security","volume":"20","author":"Zhao K.","year":"2020","journal-title":"Computational Intelligence and Security"},{"key":"e_1_2_7_2_2","first-page":"1","article-title":"\u201cInternet of things security,\u201d wireless technologies","volume":"6","author":"Chahid Y.","year":"2018","journal-title":"Embedded and Intelligent Systems"},{"key":"e_1_2_7_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.10.006"},{"key":"e_1_2_7_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3186268"},{"key":"e_1_2_7_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2973314"},{"key":"e_1_2_7_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.10.030"},{"key":"e_1_2_7_7_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071177"},{"key":"e_1_2_7_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-04476-9"},{"key":"e_1_2_7_9_2","doi-asserted-by":"publisher","DOI":"10.3390\/rs11192252"},{"key":"e_1_2_7_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1003-5"},{"key":"e_1_2_7_11_2","first-page":"11","article-title":"Artificial intelligence and internet of things to improve efficacy of diagnosis and remote sensing of solar photovoltaic systems: challenges, recommendations and future directions","volume":"4","author":"Mellit A.","year":"2021","journal-title":"Renewable and Sustainable Energy Reviews"},{"key":"e_1_2_7_12_2","first-page":"1","article-title":"Grey Wolf based compressive sensing scheme for data gathering in IoT based heterogeneous WSNs","volume":"2","author":"Aziz A.","year":"2018","journal-title":"Wireless Networks"},{"key":"e_1_2_7_13_2","first-page":"1222","article-title":"Design of a high-performance system for secure image communication in the internet of things","volume":"6","author":"Kougianos E.","year":"2019","journal-title":"IEEE Access"},{"key":"e_1_2_7_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1766-4"},{"key":"e_1_2_7_15_2","first-page":"1","article-title":"FOCUS: a fog computing-based security system for the Internet of Things","volume":"3","author":"Alharbi S.","year":"2019","journal-title":"IEEE Annual Consumer Communications"},{"key":"e_1_2_7_16_2","first-page":"32","article-title":"A multiuser identification algorithm based on Internet of Things","volume":"2","author":"Deng K.","year":"2019","journal-title":"Wireless Communications and Mobile Computing"},{"key":"e_1_2_7_17_2","first-page":"217","article-title":"Sensor the internet of things, wearable computing, objective metrics, and the quantified self 2.0","volume":"2","author":"Swan M.","year":"2019","journal-title":"Journal of Sensor and Actuator Networks"},{"key":"e_1_2_7_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jobcr.2021.01.015"},{"key":"e_1_2_7_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.10.006"},{"key":"e_1_2_7_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102631"},{"key":"e_1_2_7_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.021"},{"key":"e_1_2_7_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00943-0"},{"key":"e_1_2_7_23_2","first-page":"14","article-title":"An ensemble learning method for wireless multimedia device identification","volume":"20","author":"Zhang Z.","year":"2018","journal-title":"Security and Communication Networks"},{"key":"e_1_2_7_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101707"},{"key":"e_1_2_7_25_2","first-page":"23","article-title":"Anomaly detection\/prediction for internet of things: state-of-the-art and the future","volume":"4","author":"Lin X.","year":"2020","journal-title":"IEEE Network"},{"key":"e_1_2_7_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2936945"},{"key":"e_1_2_7_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3064357"},{"key":"e_1_2_7_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2019.2938462"},{"key":"e_1_2_7_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.011.2000250"},{"key":"e_1_2_7_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107275"},{"key":"e_1_2_7_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3023788"},{"key":"e_1_2_7_32_2","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2021.601109"},{"key":"e_1_2_7_33_2","doi-asserted-by":"publisher","DOI":"10.21136\/AM.2021.0069-20"},{"key":"e_1_2_7_34_2","first-page":"872","article-title":"Feature extraction algorithm of clustering based on grey relational theory","volume":"32","author":"Lu F.","year":"2012","journal-title":"Systems Engineering-Theory & Practice"},{"key":"e_1_2_7_35_2","doi-asserted-by":"publisher","DOI":"10.1177\/1473871619858933"}],"updated-by":[{"DOI":"10.1155\/2023\/9794650","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T00:00:00Z","timestamp":1692144000000},"record-id":"50796"},{"DOI":"10.1155\/2023\/9794650","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T00:00:00Z","timestamp":1692144000000}}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/7504806.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/7504806.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/7504806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T18:16:56Z","timestamp":1723227416000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/7504806"}},"subtitle":[],"editor":[{"given":"Zhihan","family":"Lv","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/7504806"],"URL":"https:\/\/doi.org\/10.1155\/2021\/7504806","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-04-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-10","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7504806"}}