Analysis of research results of different aspects of network security and Internet of Things under the background of big data

IF 1.1 Q3 COMPUTER SCIENCE, THEORY & METHODS
Ying Lu, Xiang Wang, Taotao Xie, Tian Xie
{"title":"Analysis of research results of different aspects of network security and Internet of Things under the background of big data","authors":"Ying Lu, Xiang Wang, Taotao Xie, Tian Xie","doi":"10.1515/comp-2022-0277","DOIUrl":null,"url":null,"abstract":"Abstract With the continuous development of big data (BD) and Internet of Things (IoT) technology, research in the fields of network security and IoT is also deepening. Big data provides more data support for network security and the IoT, while also bringing more security risks. Therefore, how to ensure the security of big data, prevent network attacks, and improve the security and reliability of the IoT has become a major issue in the current field of network security and the IoT. This article aims to analyze the research results of network security and the IoT in the context of big data and explore how to ensure big data security and improve the security and reliability of the IoT from a multidimensional perspective. Therefore, this article proposes BD technology, that is, through information mining, to ensure network security from the perspective of controlling information flow. At the same time, this article also proposes an LED lightweight encryption algorithm in the IOT, which is used to achieve secure communication between ordinary nodes and gateway nodes, effectively solving the security issues of data distribution in the network, resisting virus attacks and man-in--in-the--the-middle attacks, and has higher security and efficiency. Both of these methods can effectively protect network security: one is to control data flow, and the other is to start with communication protocols. Finally, this article analyzed the adoption of network security protection measures by netizens and found that only 13% of netizens frequently take network security protection measures, while 35% of netizens never take network security protection measures. This is also one of the important reasons for the increasing number of current network security issues.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"13 1","pages":""},"PeriodicalIF":1.1000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Open Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/comp-2022-0277","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

Abstract With the continuous development of big data (BD) and Internet of Things (IoT) technology, research in the fields of network security and IoT is also deepening. Big data provides more data support for network security and the IoT, while also bringing more security risks. Therefore, how to ensure the security of big data, prevent network attacks, and improve the security and reliability of the IoT has become a major issue in the current field of network security and the IoT. This article aims to analyze the research results of network security and the IoT in the context of big data and explore how to ensure big data security and improve the security and reliability of the IoT from a multidimensional perspective. Therefore, this article proposes BD technology, that is, through information mining, to ensure network security from the perspective of controlling information flow. At the same time, this article also proposes an LED lightweight encryption algorithm in the IOT, which is used to achieve secure communication between ordinary nodes and gateway nodes, effectively solving the security issues of data distribution in the network, resisting virus attacks and man-in--in-the--the-middle attacks, and has higher security and efficiency. Both of these methods can effectively protect network security: one is to control data flow, and the other is to start with communication protocols. Finally, this article analyzed the adoption of network security protection measures by netizens and found that only 13% of netizens frequently take network security protection measures, while 35% of netizens never take network security protection measures. This is also one of the important reasons for the increasing number of current network security issues.
分析大数据背景下网络安全和物联网不同方面的研究成果
随着大数据和物联网技术的不断发展,网络安全和物联网领域的研究也在不断深入。大数据为网络安全和物联网提供了更多的数据支撑,同时也带来了更多的安全风险。因此,如何保障大数据的安全,防范网络攻击,提高物联网的安全性和可靠性,成为当前网络安全和物联网领域的一大课题。本文旨在分析大数据背景下网络安全和物联网的研究成果,从多维角度探讨如何保障大数据安全,提高物联网的安全可靠性。因此,本文提出了BD技术,即通过信息挖掘,从控制信息流的角度来保证网络安全。同时,本文还提出了一种IOT中的LED轻量级加密算法,用于实现普通节点与网关节点之间的安全通信,有效解决了网络中数据分布的安全问题,抵御病毒攻击和中间人攻击,具有更高的安全性和效率。这两种方法都能有效地保护网络安全:一是控制数据流,二是从通信协议入手。最后,本文分析了网民采取网络安全保护措施的情况,发现只有13%的网民经常采取网络安全保护措施,而35%的网民从不采取网络安全保护措施。这也是当前网络安全问题日益增多的重要原因之一。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Open Computer Science
Open Computer Science COMPUTER SCIENCE, THEORY & METHODS-
CiteScore
4.00
自引率
0.00%
发文量
24
审稿时长
25 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信