scholarly journals Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Ning Sun ◽  
Tao Li ◽  
Gongfei Song ◽  
Haoran Xia

In the process of implementing the Internet of Things, the object itself has identity information and identification equipment and encounters difficulties in communication security during the process of entering the network communication. Just like the Internet and wireless sensor networks, there are security issues in information transmission. Therefore, it is of great significance to study the mobile Internet of Things network security technology depression to protect the communication information in the mobile Internet of Things. This paper mainly studies the network security technology of intelligent information terminal based on mobile Internet of Things. This article will analyze and compare the mainstream encryption algorithms of the current mobile Internet and choose a safer and more secure HASH algorithm. We study the flow of key management, key generation, key distribution, verification key distribution, key update, key storage, key backup, and key validity time setting for mobile Internet of Things, using an existing identity cryptosystem. Based on encryption, the design technology of key management and authentication in this paper is improved. Compared with other methods, the storage consumption of this method on GWN is relatively medium. In the initial stage, the storage is 32 bytes, then in registration stage 1, it reaches 84 bytes, in registration stage 2, it is 82 bytes, and then, in the login authentication phase, the number of bytes rose and reached 356 bytes in authentication phase 3. Experimental results show that this protocol has certain advantages in ensuring safety performance.

2014 ◽  
Vol 687-691 ◽  
pp. 1888-1891
Author(s):  
Yu Dong ◽  
Jun Hua Guo

As a new generation network model, Internet of Things (IOT) is the integration and expansion of traditional network and technology. Traditional network security and technical security problems still exist in the system of IOT, but it also add more private information and involve a number of confidential information. Security management, security and other information security issues has been put forward higher requirements. This paper gives simple description for the concept of things, the architecture and core technology and summarily describes the response to network security networking security technology.


Author(s):  
Ana-Maria CERNOV

Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.


Author(s):  
Nabil Djedjig ◽  
Djamel Tandjaoui ◽  
Imed Romdhani ◽  
Faiza Medjek

The internet of things (IoT) is a new paradigm where users, objects, and any things are interconnected using wired and wireless technology such as RFID, ZigBee, WSN, NFC, Bluetooth, GPRS, and LTE. In this last decade, the IoT concept has attracted significant attention from both industrial and research communities. Many application domains may have significant benefits with IoT systems. These domains range from home automation, environmental monitoring, healthcare, to logistic and smart grid. Nevertheless, the IoT is facing many security issues such as authentication, key management, identification, availability, privacy, and trust management. Indeed, establishing trust relationships between nodes in IoT represents a primary security milestone to have reliable systems that exclude malicious nodes. However, trust management in an IoT constrained and ubiquitous environment represents a real challenge. This chapter presents an overview of trust management in IoT. This overview explains and demonstrates the usefulness of trust management and how it should be exploited in IoT.


2015 ◽  
Vol 738-739 ◽  
pp. 1133-1136 ◽  
Author(s):  
Xue Lei Jing

With the popularity of the Internet and the rise of mobile Internet application, the Internet finance is growing rapidly. The Internet finance includes online shopping, mobile payment, online financial management etc. However, there exists security problems in third-party payment, online shopping, online banking, mobile payment, etc. In order to solve the security problems with Internet finance, on the one hand, government should establish and perfect law and regulation systems, standardize network security technology, strengthen the network supervision, and make more effort to crack down Internet crimes; on the other hand, Internet users need to enhance network security awareness, and network security researchers should provide methods and countermeasures to prevent the online frauds.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


Author(s):  
Aman Tyagi

Elderly population in the Asian countries is increasing at a very fast rate. Lack of healthcare resources and infrastructure in many countries makes the task of provding proper healthcare difficult. Internet of things (IoT) in healthcare can address the problem effectively. Patient care is possible at home using IoT devices. IoT devices are used to collect different types of data. Various algorithms may be used to analyse data. IoT devices are connected to the internet and all the data of the patients with various health reports are available online and hence security issues arise. IoT sensors, IoT communication technologies, IoT gadgets, components of IoT, IoT layers, cloud and fog computing, benefits of IoT, IoT-based algorithms, IoT security issues, and IoT challenges are discussed in the chapter. Nowadays global epidemic COVID19 has demolished the economy and health services of all the countries worldwide. Usefulness of IoT in COVID19-related issues is explained here.


Sign in / Sign up

Export Citation Format

Share Document