Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things

Author:

Sun Ning12ORCID,Li Tao2,Song Gongfei23,Xia Haoran4

Affiliation:

1. Binjiang College, Nanjing University of Information Science & Technology, Nanjing 214105, Jiangsu, China

2. CICAEET, School of Automation, Nanjing University of Information Science & Technology, Nanjing 210044, Jiangsu, China

3. Key Laboratory of Advanced Control and Optimization for Chemical Processes, Shanghai 200237, China

4. College of Mechanical & Electrical Engineering, San Jiang University, Nanjing 210012, Jiangsu, China

Abstract

In the process of implementing the Internet of Things, the object itself has identity information and identification equipment and encounters difficulties in communication security during the process of entering the network communication. Just like the Internet and wireless sensor networks, there are security issues in information transmission. Therefore, it is of great significance to study the mobile Internet of Things network security technology depression to protect the communication information in the mobile Internet of Things. This paper mainly studies the network security technology of intelligent information terminal based on mobile Internet of Things. This article will analyze and compare the mainstream encryption algorithms of the current mobile Internet and choose a safer and more secure HASH algorithm. We study the flow of key management, key generation, key distribution, verification key distribution, key update, key storage, key backup, and key validity time setting for mobile Internet of Things, using an existing identity cryptosystem. Based on encryption, the design technology of key management and authentication in this paper is improved. Compared with other methods, the storage consumption of this method on GWN is relatively medium. In the initial stage, the storage is 32 bytes, then in registration stage 1, it reaches 84 bytes, in registration stage 2, it is 82 bytes, and then, in the login authentication phase, the number of bytes rose and reached 356 bytes in authentication phase 3. Experimental results show that this protocol has certain advantages in ensuring safety performance.

Funder

National Natural Science Foundation of China

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Computer Science Applications

Reference25 articles.

1. An Assessment of Cybersecurity Technologies in the Selected Universities in Southwestern Nigeria

2. CCX Technologies releases cybersecurity hardware;M. Thurber;Aviation International News,2019

3. Legal technologies and cyber security in the singularity age

4. Dependence on blockchain technology for future cybersecurity advancement: a systematic analysis;A. A. M. Al-Dherasi;Computer Science and Information Systems,2019

5. Foresight of cyber security threat drivers and affecting technologies

Cited by 22 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3