Research on Internet of Things Privacy Security and Coping Strategies

Bounpasong Phommasan, Zhanjun Jiang, Tao Zhou
{"title":"Research on Internet of Things Privacy Security and Coping Strategies","authors":"Bounpasong Phommasan, Zhanjun Jiang, Tao Zhou","doi":"10.1109/ICVRIS.2019.00118","DOIUrl":null,"url":null,"abstract":"Aiming at the problems of implicit security issues arising from the interconnected and the centralized management of data platforms in the IoT application system with the development of network intelligence and information technology, a design method of comprehensive privacy protection method is proposed. This method is focusing on the application security of the sensing layer and the transport layer, in the sensing layer, three factors including dedicated encryption chip, electronic key and hard disk data are combined for identity authentication, in terms of protection strategy, protect privacy with anonymization, lightweight encryption, routing protocol, etc. The experimental results show that the proposed method can prevent data leakage on related hardware effectively, and multiple security strategy can prevent data leakage in the process of transmission or at a node effectively.","PeriodicalId":294342,"journal":{"name":"2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)","volume":"62 35","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICVRIS.2019.00118","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Aiming at the problems of implicit security issues arising from the interconnected and the centralized management of data platforms in the IoT application system with the development of network intelligence and information technology, a design method of comprehensive privacy protection method is proposed. This method is focusing on the application security of the sensing layer and the transport layer, in the sensing layer, three factors including dedicated encryption chip, electronic key and hard disk data are combined for identity authentication, in terms of protection strategy, protect privacy with anonymization, lightweight encryption, routing protocol, etc. The experimental results show that the proposed method can prevent data leakage on related hardware effectively, and multiple security strategy can prevent data leakage in the process of transmission or at a node effectively.
物联网隐私安全及应对策略研究
针对随着网络智能和信息技术的发展,物联网应用系统中数据平台的互联和集中管理带来的隐式安全问题,提出了一种综合隐私保护方法的设计方法。该方法侧重于感知层和传输层的应用安全,在感知层中,结合专用加密芯片、电子密钥和硬盘数据三种因素进行身份认证,在保护策略上,采用匿名化、轻量级加密、路由协议等方式保护隐私。实验结果表明,该方法可以有效防止相关硬件上的数据泄漏,多种安全策略可以有效防止传输过程中或节点上的数据泄漏。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信