Mini review Topical Sections

Microbial mobilization of rare earth elements (REE) from mineral solids—A mini review

  • In the light of an expected supply shortage of rare earth elements (REE) measures have to be undertaken for an efficient use in all kinds of technical, medical, and agricultural applications as well as—in particular—in REE recycling from post-use goods and waste materials. Biologically- based methods might offer an alternative and supplement to physico-chemical techniques for REE recovery and recycling. A wide variety of physiologically distinct microbial groups have the potential to be applied for REE bioleaching form solid matrices. This source is largely untapped until today. Depending of the type of organism, the technical process (including a series of influencing factors), the solid to be treated, and the target element, leaching efficiencies of 80 to 90% can be achieved. Bioleaching of REEs can help in reducing the supply risk and market dependency. Additionally, the application of bioleaching techniques for the treatment of solid wastes might contribute to the conversion towards a more sustainable and environmental friendly economy.

    Citation: Fabienne Barmettler, Claudio Castelberg, Carlotta Fabbri, Helmut Brandl. Microbial mobilization of rare earth elements (REE) from mineral solids—A mini review[J]. AIMS Microbiology, 2016, 2(2): 190-204. doi: 10.3934/microbiol.2016.2.190

    Related Papers:

    [1] Huqing Wang, Feng Xiang, Wenbing Zhao, Zhixin Sun . ONS resolution prediction based on Rasch model. Mathematical Biosciences and Engineering, 2019, 16(6): 6683-6695. doi: 10.3934/mbe.2019333
    [2] Dengzhi Liu, Zhimin Li, Chen Wang, Yongjun Ren . Enabling secure mutual authentication and storage checking in cloud-assisted IoT. Mathematical Biosciences and Engineering, 2022, 19(11): 11034-11046. doi: 10.3934/mbe.2022514
    [3] Kenneth Li-minn Ang, Kah Phooi Seng . Biometrics-based Internet of Things and Big data design framework. Mathematical Biosciences and Engineering, 2021, 18(4): 4461-4476. doi: 10.3934/mbe.2021226
    [4] Kittur Philemon Kibiwott , Yanan Zhao , Julius Kogo, Fengli Zhang . Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing. Mathematical Biosciences and Engineering, 2019, 16(5): 3561-3594. doi: 10.3934/mbe.2019178
    [5] Naila Naz, Muazzam A Khan, Suliman A. Alsuhibany, Muhammad Diyan, Zhiyuan Tan, Muhammad Almas Khan, Jawad Ahmad . Ensemble learning-based IDS for sensors telemetry data in IoT networks. Mathematical Biosciences and Engineering, 2022, 19(10): 10550-10580. doi: 10.3934/mbe.2022493
    [6] Jiushuang Wang, Ying Liu, Huifen Feng . IFACNN: efficient DDoS attack detection based on improved firefly algorithm to optimize convolutional neural networks. Mathematical Biosciences and Engineering, 2022, 19(2): 1280-1303. doi: 10.3934/mbe.2022059
    [7] Hongan Li, Qiaoxue Zheng, Wenjing Yan, Ruolin Tao, Xin Qi, Zheng Wen . Image super-resolution reconstruction for secure data transmission in Internet of Things environment. Mathematical Biosciences and Engineering, 2021, 18(5): 6652-6671. doi: 10.3934/mbe.2021330
    [8] Ridha Ouni, Kashif Saleem . Secure smart home architecture for ambient-assisted living using a multimedia Internet of Things based system in smart cities. Mathematical Biosciences and Engineering, 2024, 21(3): 3473-3497. doi: 10.3934/mbe.2024153
    [9] Noor Wali Khan, Mohammed S. Alshehri, Muazzam A Khan, Sultan Almakdi, Naghmeh Moradpoor, Abdulwahab Alazeb, Safi Ullah, Naila Naz, Jawad Ahmad . A hybrid deep learning-based intrusion detection system for IoT networks. Mathematical Biosciences and Engineering, 2023, 20(8): 13491-13520. doi: 10.3934/mbe.2023602
    [10] Shitharth Selvarajan, Hariprasath Manoharan, Celestine Iwendi, Taher Al-Shehari, Muna Al-Razgan, Taha Alfakih . SCBC: Smart city monitoring with blockchain using Internet of Things for and neuro fuzzy procedures. Mathematical Biosciences and Engineering, 2023, 20(12): 20828-20851. doi: 10.3934/mbe.2023922
  • In the light of an expected supply shortage of rare earth elements (REE) measures have to be undertaken for an efficient use in all kinds of technical, medical, and agricultural applications as well as—in particular—in REE recycling from post-use goods and waste materials. Biologically- based methods might offer an alternative and supplement to physico-chemical techniques for REE recovery and recycling. A wide variety of physiologically distinct microbial groups have the potential to be applied for REE bioleaching form solid matrices. This source is largely untapped until today. Depending of the type of organism, the technical process (including a series of influencing factors), the solid to be treated, and the target element, leaching efficiencies of 80 to 90% can be achieved. Bioleaching of REEs can help in reducing the supply risk and market dependency. Additionally, the application of bioleaching techniques for the treatment of solid wastes might contribute to the conversion towards a more sustainable and environmental friendly economy.


    The Internet of Things (IoT) breaks away from the traditional communication mode between people. It introduces perception of the physical world. It establishes the communication between people and things, between things and things, enabling dynamic collection, intelligent processing, seamless interaction and collaborative sharing of information. The "things" in IoT include the objects in the physical world and information world. These objects can be integrated into the communication network by being identified. In order to interconnect all things in the IoT, all these kinds of things must be effectively and uniquely identified. Through identification, the physical or logical entity object in IoT can be uniquely identified within a specified range and enable the query, management and control of the entity information can be realized. Object identification provides the basis for a variety of IoT applications. With the identity of objects, mapping the object name to the address of a server that stores the information enables the viewing the object details. Identity and mapping can be referred to as the identity and resolution mechanism of IoT [1].

    IoT is characterized by mass communication. A large number of things exchange information every moment in the IoT. Identity resolution technology is a key technology to enable global information about things to be queried, located, managed and circulated across domains. During these above process, many sensitive information such as products, manufacturers and logistics may be involved [2]. Competitors or people with ulterior motives can intercept identity resolution information to gain access to trade secrets such as production and profits of goods manufacturers. Some pranksters may also deliberately tamper with the identity resolution information, resulting in substantial financial losses and disputes. The security protection of identity resolution is very important. Only the security problem of identity resolution of IoT is guaranteed, can IoT really play a role in various application fields. According to a survey of more than 5000 enterprises around the world, the top three barriers to the deployment of IoT are data security and privacy, integration with existing IT systems, and cases of lack of persuasion. The gap between the demand side and the supply side will be an important problem to be solved in the future development of IoT industry [3].

    At present, most of the researches of the identity resolution technology have focused on discussing the compatibility and efficiency of resolution procedure. There has been little new research on the security aspects of identity resolution. Some common security methods in Internet, such as identity authentication, digital signature, encrypted transmission, etc. have been adopted in the field of IoT identity resolution. These common strategies can enhance the security of identity resolution to a certain extent. However, the above security measures involve issues such as the cost of encryption mechanism, key management, anti-flow-attacks and other issues and do not take into account the special characteristics of the IoT, such as the interconnection of a large number of goods. Moreover, the identity resolution of IoT is a multi-level recursive parsing technology. The security architecture is complex and the security field covers a wide range of areas. The processing capacity of terminal devices or apparatuses connected to IoT is very different. They interaction among them and the trust relationships are complex. Therefore, it is necessary to consider the security issues of differentiated systems. Even if some security measures in Internet guarantee the security of individual resolution levels, they cannot guarantee the overall security of identity resolution in IoT, because IoT is a large system integrating multiple levels, and many security problems come from system integration.

    The security of identity resolution of IoT has become a core issue in solving IoT security problems, and it is also a major technical problem. The emphasis of our study lies in establishing a comprehensive and effective security evaluation system for identity resolution that can be applied to all levels. Based on the advantages of Analytic Hierarchy Process (AHP) in solving complex multi-objective decision-making problems, combined with the influencing factors of identity resolution security, this paper proposes an AHP-based security evaluation model of the IoT. The security influencing factors of identity resolution are first investigated, and then industry experts and front-line laboratory researchers are invited to score the influencing factors and the past behavior of each resolution server. One mathematical model based on AHP is established to obtain the comprehensive evaluation score of each resolution server. With AHP model, the qualitative problem is transformed into a quantitative problem. Through the comprehensive evaluation score, the resolution safety factor of each resolution server can be displayed intuitively, and the judgement basis for the user's trust degree of the resolution server can be made.

    The remainder of this paper is consists of the following sections. Section 2 investigates the current security technology of IoT identity resolution. Section 3 first describes the Analytic Hierarchy Process (AHP), and then applies AHP to the security evaluation model of IoT identity resolution. Section 4 shows one case analysis. Finally, we conclude this paper and propose future work in section 5.

    This section discusses the related work in the field of identity resolution security. The standardization organizations related to IoT are actively promoting the research of goods identity resolution technology, which leads to the current coexistence of various identity resolution systems. There are a variety of IoT identity resolution systems available at home and abroad, which can be divided into two categories: improved identity resolution system based on Domain Name System (DNS) and innovative identity resolution system independent of DNS [4]. IoT is an extension of Internet. Years of Internet practice has proven the success of DNS resolution system. Therefore, an improved DNS-based resolution scheme is the preferred choice for the IoT. For example, the Electronic Produce Code (EPC) technology proposed by MIT [5], Object Identifier (OID) technology jointly developed by ISO/IEC and ITU-T [6,7], entity code for IoT (Ecode for IoT) used in China [8]. Like most Internet protocols, DNS is designed with security vulnerabilities. DNS is the core of Internet, which makes it an important target for attackers. DNS resolution is implemented by domain name server, especially relying on root domain name server. It is a centralized architecture. There are problems such as central structure failure, load imbalance and over reliance on central trust [9]. At the same time, IoT involves a large amount of sensitive information including products, manufacturers and logistics, which brings higher privacy protection requirements. Due to the loopholes in its architecture, there are cache snooping, domain name hijacking, DNS spoofing, denial of service (DoS) and other security threats during DNS resolution process. User's privacy information is easily disclosed and DNS resolution record is easily changed. These seriously affect the network service quality. The main solution to the security problem of the improved DNS resolution system is to use the common security means such as identity authentication, digital signature, encrypted transmission, DNSSEC and DNSCurve in Internet [10], which can enhance the confidentiality of goods identity resolution to a certain extent. These means can prevent the resolution data from being intercepted by attackers to gain access to the user's private information. But, the cost of security means is also high. We need to consider the characteristics of the limited resources of IoT for further research.

    The innovative DNS-independent identity resolution system consists mainly of Handle, UID, and the emerging blockchain resolution technology in recent years. Handle system sets one or more administrators for each handle ID. Administrators need authentication and authority authentication before responding to any handle management request. Similarly, when the client initiates a resolution request, authentication is also required. Handle architecture designs a new application layer resolution and security protection scheme, but its identity authentication method is still realized by the traditional private key signature technology [11]. UID is a kind of environment aware technology for ubiquitous computing [12]. It identifies physical or logical objects such as objective entities, spaces, addresses, concepts, through ubiquitous codes (ucode). UID resolution system divides the security and privacy protection requirements into 7 levels to achieve differentiated security services for different applications. However, the traditional security protection technology is also used in the specific implementation. Besides, UID system is mainly used in the project of Tron (the real-time operating system nucleus) in Japan, and it is only used in some application scenarios.

    In recent years, some scholars have applied the popular blockchain technology to the identity resolution. Blockchain, as a novel decentralized solution, can provide innovative ideas for flattening the DNS architecture and realizing a co-management model between global domain names service providers. Namecoin [13] is the first domain name system to realize decentralization. The cost of Namecoin is low, but it cannot prevent illegal occupation, resulting in a large number of Botnet domain names. Therefore, the domain name space is very poorly utilized. Besides, the system would be insecure if more than 60% of the computing power controlled a mining pool [14]. Namecoin enables decentralized domain name registration and distribution, which leads to the problem of domain name preemption and the lack of dispute resolution mechanism. Namecoin is difficult to be compatible with current DNS. Blockstack [15] ameliorates the security problem associated with low Namecoin node activity and is built directly on the bitcoin blockchain system. Blockstack embeds domain name data into special fields of bitcoin transaction records. With the security of the Bitcoin blockchain's network environment. Blockstack identifies and analyzes the domain name information in the new block, and realizes the establishment of a virtual domain name data link on the host blockchain [16]. Blockstack also has some problems. First of all, the technology is based on bitcoin and uses the PoW consensus algorithm. The mining capacity and transaction flow in bitcoin are still centralized, with 51% attack threat [17]. In addition, PoW is susceptible to forking, leading to inconsistent data [18]. Handshake [19] is a public chain scheme based on UTXO model. It replaces the fully trusted registration authority in DNS system and uses decentralized trust anchor to prove domain ownership. Trust anchor is composed of decentralized blockchain and incentive mechanism. It optimizes the decentralization, cooperates with the association consensus between domain name and certificate, and no longer relies on a single trusted institution. The above three schemes are innovative attempts in the application of blockchian under the identity resolution, which have opened up new ideas and new horizons [20]. However, the current research on blockchain in identity resolution is mostly academic discussion and theoretical analysis, lacking practical cases [21,22].

    The above overview study shows that the secure identity resolution method of IoT has become a very important security factor in the application of IoT. The existing solutions for the security resolution of IoT mainly have the following problems: 1)focus on the resolution security of each layer, while ignoring the integrated security of the whole resolution architecture of IoT; 2) use the traditional Internet security solutions, ignoring the particularity of IoT; 3) these methods can provide some security measures during the resolution process, but it is difficult to judge the security performance of the resolution server; 4) the research of emerging technologies such as blockchain is still at the primary stage of theoretical research, which is far from the practical application. The security problem of IoT identity resolution has become a technical problem. The quantitative and comprehensive evaluation of resolution security is of considerable importance towards the resolution server in IoT. In this paper, the area of identity resolution security is taken as the main research subject and an AHP-based security evaluation model is proposed. The construction of this model is described specifically in the following sections.

    The AHP is a decision-making method developed and used by the American operations research expert T. L. Saaty in the mid-1970s. It is usually used to solve complex multi-objective decision-making problems with a combination of qualitative and quantitative analysis [23]. The main idea is to treat a complex multi-objective decision-making problem as a system, decomposing the objective into multiple objectives or criteria, if necessary, further decomposing it into sever levels including multi-level sub indicators, calculating the hierarchical single ranking and total ranking through the fuzzy quantitative method of qualitative indicators, and making decisions according to the ranking results. AHP makes use of the characteristics of behavior science to quantify empirical judgments of decision makers. It is suitable for the situation where the structure of the objectives is complex and the necessary data is lacking. It is common tool for mathematical analysis in system science.

    AHP can transform complex and ambiguous correlation into quantitative analysis problems and effectively measure the judgment and comparison of decision makers. It is widely used in social, economic, management and other application fields [24,25]. For example, it can be used in the context of graduate employment problems. Both graduates and employers have their own selection criteria and requirements. For graduates, the relevant criteria include: matching degree of job position and specialty, higher income, a good living environment, a good reputation of the company, a good working environment, and more opportunities for future development, etc. Among those criteria, a good living environment can be divided into some molecular criteria, such as big cities and climate conditions. When a graduate is faced with a variety of choices and decisions, AHP method can be used to quantify the above criteria. The quantitative value of each optional company is calculated by weighting, and the decision can be made according to the result of ranking.

    There are many kinds and a large number of devices in IoT. These devices are easily exposed and vulnerable to security threats. To judge and select an identity resolution server with high security performance, there are many evaluation indicators, such as resolution efficiency, ease of operation, integrity of resolution results, malicious resolution behavior, etc., which also belong to a multi-objective decision-making problem. When evaluating the security performance of a resolution server, we can quantify these evaluation criteria and historical resolution behavior, and then apply AHP method to establish a hierarchical evaluation model to calculate the security performance evaluation score of the resolution server.

    In this paper, a security evaluation model for IoT identity resolution based on the AHP method is proposed. The design idea of this model is shown in Figure 1 below.

    Figure 1.  Design idea of the security evaluation model of IoT identity resolution.

    This security evaluation model is divided into the following 3 phases.

    In phase-1, based on the research of other scholars and combined with the authors' work experience, the relevant factors affecting the security evaluation mechanism of IoT identity resolution are discussed, and the evaluation indicators are selected according to the impact degree. The evaluation indicators are the basis of comprehensive evaluation research, and its rationality and comprehensiveness directly affect the results of evaluation studies.

    In phase-2, industry experts and relevant laboratory researchers are invited to score the evaluation indicators and quantify the pairwise comparison value of each resolution server under each indicator. According to the score, the indicators judgment matrix and pairwise comparison matrix are constructed. The rationality of expert scoring and the scale of judgment matrix have an important impact on the establishment of the security evaluation model of IoT identity resolution. The experts invited in this paper are not only front-line lab researchers from the IoT industry for many years, but also the scientific experts in this field. They can effectively judge the security of the resolution server, reasonably score the impact indicators. Their expertise and industry experience qualify for the construction conditions of judgment matrix. According to the principle of AHP, the judgment matrix adopts the scale of 1–9, and the lager the number, the higher the importance.

    In phase-3, AHP is used to calculate the weight vector of each evaluation indicator. Firstly, the score of all experts is processed by arithmetic mean. Then the maximum eigenvalue and eigenvector of the matrix are calculated, and the maximum eigenvalue is used for consistency checking. If it fails to pass the consistency check, the optimization algorithm is selected to continue processing the matrix value. It is important to note that there is a certain subjectivity in the selection and scoring of experts, which leads to the probability that the construction matrix cannot pass the consistency check. This result affects the application of AHP. At this time, it is necessary to go back to the phase-1 or phase-2, reconsider the selection of evaluation indicators or reply to the experts with the feedback results and implement a new round of scoring operation. After the comparison construction matrix has passed the consistency check, the data is standardized and normalized, and the weight vector of each indicator is calculated. Based on the comparison construction matrix of all resolution servers under each indicator, a combined weight vector of each resolution server is calculated. According to the total score ranking, the maliciousness of all resolution server can be judged, and the correct decision can be made.

    Definition 1 (security evaluation model of IoT identity resolution) IIRSEM = {IIRSO, IIRSC, IIRSP}

    (1) IIRSO (IoT Identity Resolution Security Objective layer), refers to make quantitative evaluation value for the security performance of IoT identity resolution server.

    (2) IIRSC (IoT Identity Resolution Security Criteria layer), refers to the security evaluation indicators that affect the identity resolution server of IoT.

    (3) IIRSP (IoT Identity Resolution Security Plan layer), refers to the IoT identity resolution servers.

    Using the above security evaluation model of IoT identity resolution, we can quickly and effectively build a security evaluation scenario of identity resolution in IoT application field of mass devices, and then accurately evaluate the security performance and resolution efficiency of the resolution server based on the following evaluation methods, so as to promote the application security of IoT.

    AHP method is used to evaluate the security of the identity resolution of IoT, including the following steps:

    (1) Constructing the 3-level evaluation model

    Based on the definition of the above model, a 3-level evaluation model IIRSEM = {IIRSO, IIRSC, IIRSP} is constructed, as shown in Figure 2.

    Figure 2.  3-Level Evaluation Model.

    IIRSO layer: this layer has only one element, which represents the expected goal or desired outcome of the model. In our model, it is the security evaluation mechanism of IoT identity resolution.

    IIRSC layer: this layer includes the intermediate links involved in the realization of objective, and it can consist of multiple layers, including the criteria and sub criteria to be considered. There is no limit to the number of sub-criteria layers, which is related to the complexity of the problem and the degree of detail to be analyzed. On the basis of analyzing the research results of relevant scholars and combining with the previous work experience, this paper summarizes and refines the criteria layer from the two dimensions of the trust degree of the resolution server and the user experience. The evaluation factors affecting the security of IoT identity resolution are shown in figure 3 below. Among them, the trust dimension of resolution server includes historical trust, missing resolution rate and malicious resolution rate. The perceived dimension of user experience includes average resolution latency, ease of identity resolution and integrity of resolution result. It is worth noting that the above dimensions and indicators can be added, modified or removed according to the actual situation to achieve better application resilience.

    Figure 3.  Indicators of the security evaluation model.

    IIRSP layer: this layer includes various measures and decision-making schemes to achieve the goal. In our model, it represents multiple resolution servers that can provide identity resolution services.

    (2) Constructing the indicator weight pairwise comparison matrix

    The pairwise comparison matrix is used to compare the impact of each indicator on the target. This is an important step and is the beginning of the transformation from qualitative to quantitative. The main difficulty in determining the proportion of each indicator's impact on the target is that these proportions are not easy to quantify. They occupy a certain proportion of each decision maker's mind. Santy et al. proposed the method of consistent matrix:

    ① The method of comparing the indicators in pairs is used, instead of comparing them together.

    ② The relative scale is used to reduce the difficulty of comparing different indicators and improve the accuracy.

    The weight comparison matrix for each indicator is represented by the matrix $ K = {({k}_{ij})}_{m\times m} $, with m being the number of indicators. Matrix K has the following characteristics:

    ①$ {k}_{ij}>0 $

    ②$ {k}_{ij} = \frac{1}{{k}_{ji}} $

    ③$ {k}_{ii} = 1 $

    (3) Establishing the pairwise comparison matrix of all plans based on each indicator.

    In the same way, for each indicator, pairwise comparison method is used to establish the weight quantization matrix of all plans, which is represented by matrix $ {C}_{l} = {({c}_{ij})}_{n\times n} $, n is the number of plans, $ l = 1, 2, \cdots m $. Similarly, m is the number of indicators. The matrix $ {C}_{l} $ has the same characteristics as the matrix K above.

    (4) Consistency checking of all pairwise comparison matrices

    Definition 2: In a pairwise comparison matrix, property

    $ {\mathrm{a}}_{ij} = \frac{{\mathrm{a}}_{\mathrm{i}}}{{\mathrm{a}}_{\mathrm{k}}}\cdot \frac{{\mathrm{a}}_{\mathrm{k}}}{{\mathrm{a}}_{\mathrm{j}}} = {\mathrm{a}}_{ik}\cdot {\mathrm{a}}_{kj} $ is called the consistency of the matrix.

    The various pairwise comparison matrices are subjectively proposed by experienced experts and are susceptible to inconsistent contradictions due to complex factors. N-dimensional pairwise comparison matrices are tested for consistency as follows:

    Calculating the consistency index $ C.I = \frac{{\lambda }_{max}-n}{n-1} $, $ {\lambda }_{max} $ is the largest eigenvalue.

    The following table was consulted to obtain AHP average random consistency index $ R.I $.

    Table 1.  AHP average random consistency index.
    Order n R.I
    1 0
    2 0
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    0.52
    0.89
    1.12
    1.26
    1.36
    1.41
    1.46
    1.49
    1.52
    1.54
    1.56
    1.58
    1.59

     | Show Table
    DownLoad: CSV

    According to the formula $ C.R = \frac{C.I}{R.I} $, calculating the consistency ratio $ C.R $

    If $ C.R\le 0.1 $, the consistency detection of pairwise comparison matrix is passed, and the matrix can be accepted. Otherwise, some optimization algorithm is selected to modify the matrix or reconstruct the matrix.

    (5) Computing the weight vector of all pairwise comparison matrices

    Calculate maximum eigenvalues and eigenvectors for each pair of comparison matrices, including the pairwise comparison matrices for the indicators and the pairwise comparison matrices of all plans based on each indicator. The normalized eigenvectors are called weight vectors. The weight vector of the indicator pairwise comparison matrix shows the relative importance of each indicator. The weight vector of the pairwise comparison matrix of all plans based on each indicator shows the score of each plan in terms of the indicator.

    (6) Calculating the combined weight vector of each plan

    Combining with the weight vector of the indicator comparison matrix, we calculate the combination weight of plan level to criterion level. We can use the result of combination weight vector as the quantitative basis of decision-making.

    In this section, an experimental case is used to verify the validity and correctness of the AHP-based security evaluation model for IoT identity resolution. In the experimental case, three identity resolution servers are selected for security evaluation and the evaluation indicator of the criteria level includes two dimensions and six influencing factors.

    The specific steps are as follows.

    Step 1: Constructing the pairwise comparison matrix

    The author's team has been studying IoT for more than 10 years, and has made some achievements in IoT industry. The team has more than ten professors, associate professors and doctoral student. In this case, a total of 15 laboratory researchers, experts and scholars from the IoT industry were invited to score. 10 of them are members of our team, and the other 5 are experts from IoT industry outside our team. They also have extensive research experience in IoT field, are involved in the identity resolution in IoT in their work, and attached great importance to the identity resolution security of IoT. After processing the data of 15 questionnaires with arithmetic average, the pairwise comparison matrix Matrix_I of 6 indicators $ \left\{{F}_{i}, i = 1 \sim 6\right\} $ were obtained, as shown in Figure 4 below. The order of 6 indicators $ \left\{{F}_{i}, i = 1 \sim 6\right\} $ in row and column is as follows: historical trust, leakage rate, malicious resolution rate, average resolution latency, resolution ease and resolution integrity. For example, the value $ {i}_{13} = 1/9 $ in the first row and third column of Matrix_I indicates that the importance of historical trust in evaluating malicious resolution server is 1/9 of that of malicious resolution rate, in other words, the former is far less important than the latter.

    Figure 4.  The pairwise comparison matrix Matrix_I.

    Step2: Consistency checking

    Calculating the maximum eigenvalue of Matrix_I

    $ {\lambda }_{max}(Matrix\_I) $ = 6.3842;

    Calculating the consistency index of Matrix_I:

    $ \mathrm{C}.\mathrm{I}(Matrix\_I) = \frac{{\lambda }_{max}(Matrix\_I)-n}{n-1} = \frac{6.3842-6}{6-1} = 0.0768 $

    Calculating the consistency ratio:

    $ \mathrm{C}.\mathrm{R}(Matrix\_I) = \frac{C.I(Matrix\_I)}{R.I} = \frac{0.0768}{1.26} = 0.061\le 0.1 $

    Therefore, the pairwise comparison matrix $ Matrix\_I $ passed the consistency check.

    Step3: Calculating the weight coefficient of all indicators

    The eigenvector corresponding to the maximum eigenvalue $ {\lambda }_{max}(Matrix\_I) $ of $ Matrix\_I $ is as follows:

    $ \left\{{w}_{1}, {w}_{2}\cdots {w}_{6}\right\} = \left\{\mathrm{0.0449, 0.2517, 0.9146, 0.1541, 0.1247, 0.2425}\right\} $

    The above eigenvector: $ {w}_{i}^{\mathrm{\text{'}}} = {w}_{i}/\sum _{i = 1}^{6}{w}_{i} $ is normalized.

    Then

    $ \left\{{w}_{1}^{\mathrm{\text{'}}}, {w}_{2}^{\mathrm{\text{'}}}\cdots {w}_{6}^{\mathrm{\text{'}}}\right\} = \left\{\mathrm{0.026, 0.145, 0.528, 0.089, 0.072, 0.14}\right\} $

    We can derive the weight coefficient of 6 indicators under the two dimensions of resolution server trust value and the user experience, as shown in Figure 5 below.

    Figure 5.  Weight coefficient of 6 indicators.
    Figure 6.  Pairwise comparison matrix of 3 resolution servers in terms of 6 indicators.

    As can be seen from the figure, the 6 indicators are ranked in order of importance when judging insecure resolution servers: malicious resolution rate, leakage rate, resolution integrity, average resolution latency, ease of resolution, and historical trust.

    Step 4: Calculate each plan's score on each indicator

    Firstly, according to the experts' scoring, the pairwise comparison matrix of 3 resolution servers $ \left\{{IRS}_{i}, i = 1 \sim 3\right\} $ in terms of 6 indicators is constructed, as shown in the following figure:

    Then, step2 and step3 were repeated for each of the six pairwise comparison matrices, performing consistency detection and weight coefficient calculation respectively. Finally, the scores of 3 identity resolution servers in terms of 6 indicators are obtained, as shown in Table 2 below.

    Table 2.  Scores of 3 identity resolution servers in 6 indicators.
    F1 F2 F3 F4 F5 F6
    IRS1 0.635 0.672 0.088 0.682 0.705 0.06
    IRS2 0.078 0.063 0.669 0.102 0.084 0.709
    IRS3 0.287 0.265 0.243 0.216 0.211 0.231

     | Show Table
    DownLoad: CSV

    Step 5: Calculate the comprehensive score of each plan

    According to the results of step3 and step4, the comprehensive scores of each plan can be calculated, as shown in Table 3 below.

    Table 3.  comprehensive scores of each plan.
    Indicator F1 F2 F3 F4 F5 F6 Comprehensive Score
    Weight Coefficient 0.026 0.145 0.528 0.089 0.072 0.14
    IRS2 0.635 0.672 0.088 0.682 0.705 0.06 0.28
    IRS3 0.078 0.063 0.669 0.102 0.084 0.709 0.479
    IRS3 0.287 0.265 0.243 0.216 0.211 0.231 0.241

     | Show Table
    DownLoad: CSV

    The table above shows that the comprehensive scores of 3 identity resolution servers are ranked as follows: IRS2 > IRS1 > IRS3.

    That is to say, IRS2 has the highest level of maliciousness in terms of identity resolution security; conversely, IRS3 has the highest security.

    Compared to other methods of IoT identity resolution security, our model takes advantage of AHP multi decision quantitative analysis. Six evaluation factors are selected and assigned different weights. According to the score of each evaluation factor of historical resolution behavior, the combined score of three identity resolution server is calculated respectively. Finally, the total score of each resolution server can be obtained quantitatively. The total score is used to determine the security performance of each resolution server. The judgment of the security performance of a resolution server is affected by many factors, and is somewhat subjective, which is in line with the characteristics of AHP model. It is feasible to use AHP model to judge the security performance of resolution server. In our model, a number of industry experts are invited to score the weight of six impact factors. Three resolution servers in our laboratory are selected. The score of the historical resolution behavior is also scored by the front-line experts, which makes the application of the model have a certain practical significance.

    This paper introduces in detail an AHP-based security evaluation model for IoT identity resolution. The design idea and specific steps of this model are presented. A specific experimental case is conducted to illustrate the performance of the proposed model. The experiment shows that our model has good applicability to a certain extent, and can effectively determine the security performance of the resolution server. Identity resolution security plays an important role in the application security of IoT. The research results of this paper allow for quantitative and comprehensive evaluations of IoT identity resolution security.

    Based on our experience and the application scenarios of IoT in our laboratory, we select six indicators to evaluate the security of resolution server. The weight of the influence factors and the scoring of the historical resolution behavior of the three resolution servers are mainly given by the experts in our team. The above behaviors are subjective, which is where the defect of our model lie. In the future, this model can be extended to a wider range of IoT applications, and other evaluation indicators can be considered according to the actual application. When using AHP is used to determine the weight, it is necessary to collect more opinions from relevant researchers and experts to make the calculated weight more realistic and to maximize the applicability of the model. In addition, the methods to improve the objectivity of the scoring of indicators and the consistency of the paired comparison matrix are also worth studying.

    This research was supported by the National Natural Science Foundation of China under Grant (No. 61972208), the project of Nanjing University of Posts and Telecommunications (No.NY219119).

    All authors declare no conflicts of interest in this paper.

    [1] Nuwer R (2014) What is the world’s scarcest material? BBC, London. Available from: www.bbc.com/future/story/20140314-the-worlds-scarcest-material.
    [2] Zepf V, Simmons J, Reller A, et al. (2014) Materials critical to the energy sector - An introduction. 2nd ed. BP p.l.c., London.
    [3] Gibson M, Parkinson I (2011) CIBC report: A rare earth element industry overview. Toronto, Canada. Available from http://de.slideshare.net/RareEarthsRareMetals/cibc-report.
    [4] Matlin SA, Mehta G, Hopf H, et al. (2015) The role of chemistry in inventing a sustainable future. Nature Chem 7: 941–943. doi: 10.1038/nchem.2389
    [5] Castor SB, Hedrick JB (2001) Rare earth elements. J Environ Radioactiv 102: 769–792.
    [6] Kingsnorth DJ (2014) Der globale Markt der Seltenen Erden - Ein Balanceakt. In: Kausch P, Bertau M, Gutzmer J, Matschullat J. (eds.) Strategische Rohstoffe - Risikovorsorge. Springer, Berlin, Heidelberg, 97–121 [in German].
    [7] Glombitza F, Reichel S (2014) Metal-containing residues from industry and in the environment: Geobiotechnological urban mining. Adv Biochem Eng Biotechnol 141: 49–107.
    [8] Hennebel T, Boon B, Maes S, et al. (2015) Biotechnologies for critical raw material recovery from primary and secondary sources: R&D priorities and future perspectives. New Biotechnol 32: 121–127. doi: 10.1016/j.nbt.2013.08.004
    [9] Graedel TE, Allwood J, Birat JP, et al. (2011) Recycling rates of metals – A status report. UNEP, Nairobi, Kenya.
    [10] Binnemans K, Jones PT (2014) Perspectives for the recovery of rare earths from end-of-life fluorescent lamps. J Rare Earths 32: 195–200. doi: 10.1016/S1002-0721(14)60051-X
    [11] Hatje V, Bruland KW, Flegal AR (2016) Increases in anthropogenic gadolinium anomalies and rare earth element concentrations in San Francisco Bay over a 20 year record. Environ Sci Technol 50: 4159–4168. doi: 10.1021/acs.est.5b04322
    [12] Ozaki T, Gillow J, Francis A, et al. (2002) Association of Eu (III) and Cm (III) with Bacillus subtilis and Halobacterium salinarum. J Nucl Sci Technol 39(sup 3): 950–953.
    [13] Ozaki T, Suzuki Y, Nankawa T, et al. (2006) Interactions of rare earth elements with bacteria and organic ligands. J Alloys Compd 408-412: 1334–1338. doi: 10.1016/j.jallcom.2005.04.142
    [14] Horiike T, Yamashita M (2015) A new fungal isolate, Penidiella sp. strain T9, accumulates the rare earth element dysprosium. Appl Environ Microbiol 81: 3062–3068.
    [15] Bonificio WD, Clarke DR (2016) Rare-earth separation using bacteria. Environ Sci Technol Lett 3: 180–184. doi: 10.1021/acs.estlett.6b00064
    [16] Moriwaki H, Yamamoto H (2013) Interactions of microorganisms with rare earth ions and their utilization for separation and environmental technology. Appl Microbiol Biotechnol 97: 1–8. doi: 10.1007/s00253-012-4519-9
    [17] Das N, Das D (2013) Recovery of rare earth metals through biosorption: An overview. J Rare Earths 31: 933–943. doi: 10.1016/S1002-0721(13)60009-5
    [18] Ilyas S, Lee JC (2014) Biometallurgical recovery of metals from waste electrical and electronical equipment: a review. ChemBioEng Rev 1: 148–169. doi: 10.1002/cben.201400001
    [19] Nancharaiah YV, Venkata Mohan S, Lens PNL (2016) Biological and bioelectrochemical recovery of critical and scarce elements. Trends Biotechnol 34: 137–155. doi: 10.1016/j.tibtech.2015.11.003
    [20] Brandl H, Faramarzi MA (2006) Microbe-metal-interactions for the biotechnological treatment of metal-containing solid waste. China Particuol 4:93–97.
    [21] Brandl H (2001) Microbial leaching of metals. In: Rehm HJ (ed.) Biotechnology, Vol. 10. Wiley- VCH, Weinheim, 191–224.
    [22] Pol A, Barends TRM, Dietl A, et al. (2014) Rare earth metals are essential for methanotrophic life in volcanic mudpots. Environ Microbiol 16: 255–264. doi: 10.1111/1462-2920.12249
    [23] Skovran E, Martinez-Gomez NC (2015) Just add lanthanides. Science 348: 862–863. doi: 10.1126/science.aaa9091
    [24] Hibi Y, Asai K, Arafuka H, et al. (2011) Molecular structure of La3+-induced methanol dehydrogenase-like protein in Methylobacterium radiotolerans. J Biosci Bioeng 111: 547–549. doi: 10.1016/j.jbiosc.2010.12.017
    [25] Nakagawa T, Mitsui R, Tani A, et al. (2012) A catalytic role of xoxF1 as La3+-dependent methanol dehydrogenase in Methylobacterium extorquens strain AM1. PLOS ONE 7: e50480
    [26] Vu HN, Subuyuj GA, Vijayakumar S, et al. (2016) Lanthanide-dependent regulation of methanol oxidation systems in Methylobacterium extorquens AM1 and their contribution to methanol growth. J Bacteriol 198: 1250–1259. doi: 10.1128/JB.00937-15
    [27] Fitriyanto NA, Nakamura M, Muto S, et al. (2011) Ce3+-induced exopolysaccharide production by Bradyrhizobium sp. MAFF211645. J Biosci Bioeng 111: 146–152. doi: 10.1016/j.jbiosc.2010.09.008
    [28] Zhuang WQ, Fitts JP, Ajo-Franklin CM, et al. (2015) Recovery of critical metals using biometallurgy. Curr Opin Biotechnol 33: 327–335. doi: 10.1016/j.copbio.2015.03.019
    [29] Beolchini F, Fonti V, Dell’Anno A, et al. (2012) Assessment of biotechnological strategies for the valorization of metal bearing wastes. Waste Manage 32: 949–956. doi: 10.1016/j.wasman.2011.10.014
    [30] Bossard PP, Bachofen R, Brandl H. (1996) Metal leaching of fly ash from municipal waste incineration by Aspergillus niger. Environ Sci Technol 30: 3066–3070. doi: 10.1021/es960151v
    [31] Becker S, Bullmann M, Dietze HJ, et al. (1986) Mass spectrographic determination of selected chemical elements by microbial leaching of zircon. Fresenius Z Anal Chem 324:37-42 [in German]. doi: 10.1007/BF00469631
    [32] Dudeney AWL, Sbai ML (1993) Bioleaching of rare-earth-bearing phosphogypsum. In: Torma AE, Wey JE, Lakshmanan VL (eds.) Biohydrometallurgical Technologies. The Minerals, Metals, & Materials Society. Jackson Hole, 39–47.
    [33] Glombitza F, Iske U, Bullmann M, et al. (1988) Bacterial leaching of zircon mineral for obtaining trace and Rare Earth Elements (REE). In: Norris PR, Kelly DP (eds.) Biohydrometallurgy. Proceedings of the International Symposium Warwick 1987. Science and Technology Letters, Kew Surrey, UK, 407–418.
    [34] Iske U, Bullmann M, Glombitza F (1987) Organoheterotrophic leaching of resistant materials. Acta Biotechnol 7: 401–407 [in German].
    [35] Ibrahim HA, El-Sheikh EM (2011) Bioleaching treatment of Abu Zeneima uraniferous gibbsite ore material for recovering U, REEs, Al and Zn. Res J Chem Sci 1: 55–66.
    [36] Qu Y, Lian B (2013) Bioleaching of rare earth and radioactive elements from red mud using Penicillium tricolor RM-10. Bioresour Technol 136: 16–23. doi: 10.1016/j.biortech.2013.03.070
    [37] Hewedy MA, Rushdy AA, Kamal NM (2013) Bioleaching of rare earth elements and uranium from Sinai soil, Egypt using actinomycetes. Egypt J Hosp Med 53: 909–917. doi: 10.12816/0001653
    [38] Muravyov MI, Bulaev AG, Melamud VS, et al. (2015) Leaching of rare earth elements from coal ashes using acidophilic chemolithotrophic microbial communities. Mikrobiologiya 84: 216–224.
    [39] Muehe EM, Schmidt C, He J, et al. (2015) Microbially supported recovery of precious metals and rare earth elements from urban household waste incineration slag. Adv Mat Res 1130: 652–655.
    [40] Amin MM, El-Aassy IE, El-Feky MG, et al. (2014) Fungal leaching of rare earth elements from lower carboniferous shales, southwestern Sinai, Egypt. Roman J Biophys 24: 25–41.
    [41] Brisson VL, Zhuang WQ, Alvarez-Cohen L (2015) Bioleaching of rare earths elements from monazite sands. Biotechnol Bioeng 113: 339–348.
    [42] Tsaplina IA, Panyushkina AE, Grigoreva NV, et al. (2015) Growth of acidophilic chemolithotrophic microbial communities and sulfur oxidation in the presence of coal ashes. Microbiology 84: 177–189. doi: 10.1134/S0026261715020174
    [43] Hassanien WAG, Desouky OAN, Hussien SSA (2014) Bioleaching of some rare earth elements from Egyptian monazite using Aspergillus ficuum and Pseudomonas aeruginosa. Walailak J Sci Technol 11: 809–823.
    [44] Desouky OA, El-Mougith AA, Hassanien WA, et al. (2011) Extraction of some strategic elements from thorium-uranium concentrate using bioproducts of Aspergillus ficuum and Pseudomonas aeruginosa. Arab J Chem [in press].
    [45] Sapsford DJ, Bowell RJ, Geroni JN, et al. (2012) Factors influencing the release rate of uranium, thorium, yttrium, and rare earth elements from low grade ore. Miner Eng 39: 165–172 doi: 10.1016/j.mineng.2012.08.002
    [46] Peelman S, Sun ZHI, Sietsma J, et al. (2014) Leaching of rare earth elements: Past and present. Proceedings of the 1st ERES 2014 – International Conference on European Rare Earth Resources (ERES 2014), Milos, Greece, Sept 4–7, 446–456.
    [47] Mey S, Kutschke S, Pollmann K (2015) Microbial leaching of rare earth elements from fluorescent phosphor. Abstracts of the VAAM-Jahrestagung 2014, Dresden, Germany, Oct 5–8, 2014, 78–79.
    [48] Hopfe S, Kutschke S, Möckel R, et al. (2015a) Bioleaching of rare earth elements from fluorescent phosphor with the tea fungus Kombucha. Goldschmidt Abstracts 2015:1307.
    [49] Hopfe S, Kutschke S, Pollmann K, et al. (2015b) Screening of different microorganisms for the biological leaching of rare earth elements from fluorescent phosphor. Proceedings of the World Congress on New Technologies (Newtech 2015), Barcelona, Spain, July 15–17, 2015, 120-1 to 120-2.
    [50] European Commission (2013) Reducing the EU's dependency on raw materials: European Innovation Partnership launched. Press Release Database, Brussels, Belgium. Available from: http://europa.eu/rapid/press-release_MEMO-13-92_en.htm.
  • This article has been cited by:

    1. Nurdiana Jamal, Jasni Mohamad Zain, 2022, A Review on Nature, Cybercrime and Best Practices of Digital Footprints, 978-1-6654-6122-1, 1, 10.1109/ICCR56254.2022.9995834
    2. Naba M. Allifah, Imran A. Zualkernan, Ranking Security of IoT-Based Smart Home Consumer Devices, 2022, 10, 2169-3536, 18352, 10.1109/ACCESS.2022.3148140
    3. Zhiming Zheng, Tan Li, Bohu Li, Xudong Chai, Weining Song, Nanjiang Chen, Yuqi Zhou, Yanwen Lin, Runqiang Li, 2022, Chapter 19, 978-981-19-9197-4, 239, 10.1007/978-981-19-9198-1_19
    4. Wei Liu, Yi Huang, Yue Sun, Changlong Yu, Research on design elements of household medical products for rhinitis based on AHP, 2023, 20, 1551-0018, 9003, 10.3934/mbe.2023395
    5. Qi Gao, Cheng Chi, Zhaoyang Wang, Boyu Xu, Yu Zou, 2024, Digital Twin System Design for Rice Supply Chain Based on Identity Resolution, 979-8-3503-6860-4, 3982, 10.1109/CAC63892.2024.10864985
  • Reader Comments
  • © 2016 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(10947) PDF downloads(1909) Cited by(51)

Figures and Tables

Tables(2)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog