Research on Network Security Technology of Internet of Things Intelligent Information Terminal under the Background of Information Technology
Author:
Liu Lijun1, Qian Jin1, Zhou Aiping1, Zhang Bin1
Affiliation:
1. College of Information Engineering , Taizhou University , Taizhou , Jiangsu , , China .
Abstract
Abstract
This paper explores the application of network security technology within intelligent information terminals of the Internet of Things (IoT). It examines existing security issues and proposes a technical framework to address them. The technical framework starts from two aspects of data encryption and intrusion detection technology, in the data encryption technology, the CCA-ANC encryption algorithm is proposed to change the attacker in ANC from pure ciphertext attack to using the method of selective ciphertext attack. In intrusion detection technology, the DAGMM algorithm has been improved and optimized. The WEFS-DAGMM improved intrusion detection algorithm has been proposed, and an intrusion detection firewall has been constructed. In the performance test, the CCA-ANC encryption algorithm completes the encryption after inputting 1024MB of data in 13.6s, and the average speed of encryption reaches 71.54MB/s. The optimized WEFS-DAGMM algorithm achieves an accuracy of 0.952, which is 0.03 higher than the original DAGMM algorithm. The recall and F1 values are 0.03 higher than the original DAGMM algorithm, respectively. The algorithms have been improved by 0.03 and 0.037, respectively. Simulation experiments are conducted on the technical framework constructed in this paper. The success rate of malicious attack detection is greater than 90%, and the security protection rate reaches more than 99% in all of them.
Publisher
Walter de Gruyter GmbH
Reference21 articles.
1. Gao, M., Wang, Q., Arafin, M. T., Lyu, Y., & Qu, G. (2017). Approximate computing for low power and security in the internet of things. Computer, 50(6), 27–34. 2. Debe, M., Salah, K., Rehman, M. H. U., & Svetinovic, D. (2020). Blockchain-based decentralized reverse bidding in fog computing. IEEE Access, 2020(99). 3. Bediya, A. K., & Kumar, R. (2021). A novel intrusion detection system for internet of things network security. Journal of information technology research(3), 14. 4. Xie, T., Tu, G. H., Li, C. Y., & Peng, C. (2020). How can iot services pose new security threats in operational cellular networks?. IEEE Transactions on Mobile Computing, PP(99), 1–1. 5. Hong, S. (2019). Authentication techniques in the internet of things environment: a survey. International Journal of Network Security, 21(3), 462–470.
|
|