Research and Design of Encryption Standards Based on IoT Network Layer Information Security of Data

Jia Wang
{"title":"Research and Design of Encryption Standards Based on IoT Network Layer Information Security of Data","authors":"Jia Wang","doi":"10.4108/eetsis.5826","DOIUrl":null,"url":null,"abstract":"INTRODUCTION: With the rapid development of the economy, more and more devices and sensors are connected to the Internet, and a large amount of data is transmitted in the network. However, this large-scale data transmission involves the problem of information security, especially in the transport layer. Therefore, there is an urgent need to study and design an information security data enhancement security strategy for the transport layer of ubiquitous networks (i.e., IoT). OBJECTIVES: This thesis aims to research and create a data enhancement security strategy for the transport layer of the Ubiquitous Web to ensure the confidentiality and integrity of data transmitted in the Ubiquitous Web. Specific objectives include evaluating the advantages and disadvantages of current ubiquitous network transport layer lifting security techniques, proposing a new lifting security strategy applicable to the transport layer of ubiquitous networks, and verifying the feasibility and security of the proposed standard.METHODS: First, a detailed study and evaluation of the current Ubiquitous Network Transport Layer Elevated Security Techniques is conducted, including analyzing and comparing the existing elevated security algorithms and protocols. Then, based on the obtained research results, a new lifting security strategy applicable to the transport layer of ubiquitous networks is proposed. The design process takes into account the characteristics and requirements of ubiquitous networks, such as resource constraints, dynamics of network topology, and cooperative communication of multiple devices. Subsequently, the feasibility and security of the proposed standard are verified through simulations and experiments. In the experiments, real ubiquitous network devices and network environments are used to evaluate the performance and attack resistance of the enhanced security algorithms.RESULTS: Through the research and analysis of ubiquitous network transport layer lifting security techniques, some limitations of the existing lifting security algorithms are identified, such as high resource consumption, insufficient security, and limited ability to adapt to the characteristics of ubiquitous networks. Therefore, this thesis proposes a new lifting security strategy applicable to the transport layer of ubiquitous networks. The experimental results show that the standard can guarantee data confidentiality and integrity while possessing high efficiency and attack resistance. In addition, the proposed standard meets the needs of resource-constrained devices in ubiquitous networks and can operate properly under multiple network topologies and cooperative device communications.CONCLUSION: This thesis proposes a new elevated security strategy applicable to ubiquitous networks through the study and design of transport layer elevated security techniques for ubiquitous networks. This standard can effectively protect the confidentiality and integrity of data transmitted in ubiquitous networks with high efficiency and attack resistance. The proposed standard is expected to provide a feasible solution for the information security of ubiquitous networks and a more reliable guarantee for developing and applying ubiquitous networks. Future work can further improve and optimize this enhanced security strategy and validate and apply it in a wider range of ubiquitous network environments. ","PeriodicalId":502678,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"70 11","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ICST Transactions on Scalable Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/eetsis.5826","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

INTRODUCTION: With the rapid development of the economy, more and more devices and sensors are connected to the Internet, and a large amount of data is transmitted in the network. However, this large-scale data transmission involves the problem of information security, especially in the transport layer. Therefore, there is an urgent need to study and design an information security data enhancement security strategy for the transport layer of ubiquitous networks (i.e., IoT). OBJECTIVES: This thesis aims to research and create a data enhancement security strategy for the transport layer of the Ubiquitous Web to ensure the confidentiality and integrity of data transmitted in the Ubiquitous Web. Specific objectives include evaluating the advantages and disadvantages of current ubiquitous network transport layer lifting security techniques, proposing a new lifting security strategy applicable to the transport layer of ubiquitous networks, and verifying the feasibility and security of the proposed standard.METHODS: First, a detailed study and evaluation of the current Ubiquitous Network Transport Layer Elevated Security Techniques is conducted, including analyzing and comparing the existing elevated security algorithms and protocols. Then, based on the obtained research results, a new lifting security strategy applicable to the transport layer of ubiquitous networks is proposed. The design process takes into account the characteristics and requirements of ubiquitous networks, such as resource constraints, dynamics of network topology, and cooperative communication of multiple devices. Subsequently, the feasibility and security of the proposed standard are verified through simulations and experiments. In the experiments, real ubiquitous network devices and network environments are used to evaluate the performance and attack resistance of the enhanced security algorithms.RESULTS: Through the research and analysis of ubiquitous network transport layer lifting security techniques, some limitations of the existing lifting security algorithms are identified, such as high resource consumption, insufficient security, and limited ability to adapt to the characteristics of ubiquitous networks. Therefore, this thesis proposes a new lifting security strategy applicable to the transport layer of ubiquitous networks. The experimental results show that the standard can guarantee data confidentiality and integrity while possessing high efficiency and attack resistance. In addition, the proposed standard meets the needs of resource-constrained devices in ubiquitous networks and can operate properly under multiple network topologies and cooperative device communications.CONCLUSION: This thesis proposes a new elevated security strategy applicable to ubiquitous networks through the study and design of transport layer elevated security techniques for ubiquitous networks. This standard can effectively protect the confidentiality and integrity of data transmitted in ubiquitous networks with high efficiency and attack resistance. The proposed standard is expected to provide a feasible solution for the information security of ubiquitous networks and a more reliable guarantee for developing and applying ubiquitous networks. Future work can further improve and optimize this enhanced security strategy and validate and apply it in a wider range of ubiquitous network environments. 
基于物联网网络层数据信息安全的加密标准研究与设计
引言:随着经济的快速发展,越来越多的设备和传感器连接到互联网,大量数据在网络中传输。然而,这种大规模的数据传输涉及信息安全问题,尤其是在传输层。因此,迫切需要研究和设计一种针对泛在网络(即物联网)传输层的信息安全数据增强安全策略。目标:本论文旨在研究和创建泛在网络传输层的数据增强安全策略,以确保在泛在网络中传输数据的保密性和完整性。具体目标包括评估当前泛在网络传输层提升安全技术的优缺点,提出适用于泛在网络传输层的新提升安全策略,并验证所提标准的可行性和安全性。方法:首先,对当前泛在网络传输层提升安全技术进行详细研究和评估,包括分析和比较现有的提升安全算法和协议。然后,在研究成果的基础上,提出了一种适用于泛在网络传输层的新型提升安全策略。设计过程考虑了泛在网络的特点和要求,如资源限制、网络拓扑动态性和多设备协同通信等。随后,通过模拟和实验验证了所提标准的可行性和安全性。结果:通过对泛在网络传输层提升安全技术的研究和分析,发现了现有提升安全算法的一些局限性,如资源消耗大、安全性不足、适应泛在网络特性的能力有限等。因此,本论文提出了一种适用于泛在网络传输层的新型提升安全策略。实验结果表明,该标准既能保证数据的机密性和完整性,又具有高效率和抗攻击性。结论:本论文通过对泛在网络传输层提升安全技术的研究和设计,提出了一种适用于泛在网络的新型提升安全策略。该标准可有效保护泛在网络中传输数据的机密性和完整性,并具有高效率和抗攻击性。所提出的标准有望为泛在网络的信息安全提供可行的解决方案,为泛在网络的开发和应用提供更可靠的保障。未来的工作可以进一步改进和优化这种增强型安全策略,并在更广泛的泛在网络环境中进行验证和应用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信