scholarly journals Information Security Terminal Architecture of Power Transportation Mobile Internet of Things Based on Big Data Analysis

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Xianzhi Tang ◽  
Chunyan Ding

The progress of the social economy and the rapid development of the power field have created more favorable conditions for the construction of my country’s power grid. In this network age, how to further realize the connection between the power system and the Internet of Things is the key content of many scholars’ research. In the Internet of Things environment, there have been many excellent results in the collection, storage, and management of electric power big data, but the problem of information security has not been completely solved. Based on big data analysis and Internet of Things technology, this paper studies the architecture design of power information security terminals. In view of the diverse types of power grid mobile information and the large amount of data, this paper designs a power transportation mobile information security management system structure, which improves the effective management of power data by the system through big data, smart sensors, and wireless communication technology. According to the experiment, the power information security terminal constructed in this paper can effectively reduce communication resources and save communication costs in the process of aggregating multidimensional data. In the user satisfaction survey, residents’ satisfaction with the convenience and safety of the intelligent power system is also as high as 9.312 and 9.233. On the whole, the application of big data and Internet of Things technology to the construction of power information security terminals can indeed improve the service efficiency of power companies under the premise of ensuring safety and allow users to have a better experience.

Author(s):  
D. R. Kolisnyk ◽  
◽  
K. S. Misevych ◽  
S. V. Kovalenko

The article considers the issues of system architecture IoT-Fog-Cloud, considers the interaction between the three levels of IoT, Fog and Cloud for the effective implementation of programs for big data analysis and cybersecurity. The article also discusses security issues, solutions and directions for future research in the field of the Internet of Things and nebulous computing.


2021 ◽  
Author(s):  
Yew Kee Wong

In the information era, enormous amounts of data have become available on hand to decision makers.Big data refers to datasets that are not only big, but also high in variety and velocity, which makes them difficult to handle using traditional tools and techniques. Due to the rapid growth of such data, solutions need to be studied and provided in order to handle and extract value and knowledge from these datasets. The Internet of Things, or "IoT" for short, is about extending the power of the internet beyond computers and smartphones to a whole range of other things, processes and environments. IoT is at the epicentre of the Digital Transformation Revolution that is changing the shape of business, enterprise and people’s lives. This transformation influences everything from how we manage and operate our homes to automating processes across nearly all industries. This paper aims to analyse the relationships of AI, big data and IoT, as well as the opportunities provided by the applications in various operational domains.


2020 ◽  
Vol 11 (5) ◽  
pp. 259-269
Author(s):  
V. A. Galatenko ◽  
◽  
K. A. Kostyukhin ◽  

Internet of things technology is developing at an exceptionally fast pace. This applies to both industrial and consumer Internet. The "things" account for billions, and many areas of application have been formed. At the same time, the state of information security of the Internet of things is not satisfactory, and protective measures are clearly inferior to Commerce. This is especially dangerous because the Internet of things spans two worlds: digital and physical, and security breaches can cause both informational and physical damage. The Internet of things is developing rapidly, so it is natural that it experiences typical growth diseases-fragmentation and uneven development. The base for ensuring security is mostly formed (but continues to be formed), the question is how quickly there will be a harmonization of approaches, and advanced ideas will be accepted by device manufacturers. Many state and non-state agencies actively promote security tools, inform and train manufacturers and consumers. The article is an overview of the main provisions of information security of the Internet of things. An attempt is made to consider software and technical and legislative levels of Internet of things security. This makes it different from other publications of a similar nature. Only a holistic, integrated approach can improve real information security. Authors outline basic concepts and describe a reference model of Internet of things, draw attention to the peculiarities of the Internet of things that are important from the security point of view, enumerate typical threats for Internet of things. The legislative level of information security, security recommendations for the Internet of things, manufacturers description of usage, and installation of software corrections are considered in detail.


2020 ◽  
Vol 10 (1) ◽  
pp. 422-430
Author(s):  
Faris Mohammad Abd ◽  
Mehdi Ebady Manaa

AbstractOver the last few years, the huge amount of data represented a major obstacle to data analysis. Big data implies that the volume of data undergoes a faster progress than computational speeds, thereby demanding a larger data storage capacity. The Internet of Things (IoT) is a main source of data that is closely related to big data, as the former extends to a variety of fields such as healthcare, entertainment, and disaster control. Despite the different advantages associated with the composition of Big Data analytics and IoT, there are a number of complex difficulties and issues involved that need to be resolved and managed to ensure an accurate data analysis. Some of these solutions include the utilization of map-reduce techniques, processing, and large data scale, particularly for the relatively less time that this method requires to process large data from the Internet of Things. Machine learning algorithms of this kind are often implemented in the healthcare sector. Medical facilities need to be advanced so that more appropriate decisions can be made in terms of patient diagnosis and treatment options. In this work, two datasets have been used: the first set, used in the prediction of heart diseases, obtained an accuracy rate of 84.5 for RF and 83 for J48, whereas the second dataset is related to weather stations (automated sensors) and obtained accuracy rates of 88.5 and 86.5 for RF and J48, respectively.


2021 ◽  
Vol 2021 ◽  
pp. 1-5
Author(s):  
Haidong Sun ◽  
Zhengtao Zhang ◽  
Peng Li

The continuous development of information technology and various electronic devices has accelerated the process of informatization and digitization, enabling the development and application of the emerging technology of wireless communication and the Internet of Things. Since the continuous occurrence of vicious bridge collapse accidents in China in recent years, the problem of bridge inspection has become a hot topic among the people. At the same time, how to apply wireless communication and the Internet of Things technology to bridge inspection systems has also become a new research topic. This article mainly studies the design and analysis of bridge detection systems based on wireless communication and Internet of Things technology. In order to expand the field of bridge detection and standard management and improve the credibility and reliability of safety problem prediction and evaluation, the bridge detection system will integrate IoT sensing, internet, remote communication, digital signal analysis and processing, big data knowledge mining, big data prediction and other technologies, design and analysis of the main structure of roads and bridges, and other multifaceted knowledge fields and build a professional intelligent digital network based on bridge inspection data collection, monitoring, analysis, evaluation, and early warning. From design to use and maintenance of the bridge, a digital neural network spanning time and space throughout the life cycle is constructed to construct a digital brain with bridge sensing points as neurons. This paper uses high-power infrared sensor equipment, satellite positioning systems, sensor equipment, and other technical equipment to achieve the purpose of data communication and exchange and realize intelligent positioning, identification, supervision, tracking, and other functions, making the wireless communication and Internet of Things reliable transmission, comprehensive perception, intelligent processing, and other capabilities very effective in the field of bridge inspection. Through the research and analysis of this article, there are more and more bridge inspection systems developed by the Internet of Things and wireless communication technology in China, and the percentage of related equipment used can reach more than 90%. The functions of the bridge inspection system are becoming more and more complete, and the results of the inspection data are also increasing.


Sign in / Sign up

Export Citation Format

Share Document