{"title":"物联网隐私安全及应对策略研究","authors":"Bounpasong Phommasan, Zhanjun Jiang, Tao Zhou","doi":"10.1109/ICVRIS.2019.00118","DOIUrl":null,"url":null,"abstract":"Aiming at the problems of implicit security issues arising from the interconnected and the centralized management of data platforms in the IoT application system with the development of network intelligence and information technology, a design method of comprehensive privacy protection method is proposed. This method is focusing on the application security of the sensing layer and the transport layer, in the sensing layer, three factors including dedicated encryption chip, electronic key and hard disk data are combined for identity authentication, in terms of protection strategy, protect privacy with anonymization, lightweight encryption, routing protocol, etc. The experimental results show that the proposed method can prevent data leakage on related hardware effectively, and multiple security strategy can prevent data leakage in the process of transmission or at a node effectively.","PeriodicalId":294342,"journal":{"name":"2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)","volume":"62 35","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Internet of Things Privacy Security and Coping Strategies\",\"authors\":\"Bounpasong Phommasan, Zhanjun Jiang, Tao Zhou\",\"doi\":\"10.1109/ICVRIS.2019.00118\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Aiming at the problems of implicit security issues arising from the interconnected and the centralized management of data platforms in the IoT application system with the development of network intelligence and information technology, a design method of comprehensive privacy protection method is proposed. This method is focusing on the application security of the sensing layer and the transport layer, in the sensing layer, three factors including dedicated encryption chip, electronic key and hard disk data are combined for identity authentication, in terms of protection strategy, protect privacy with anonymization, lightweight encryption, routing protocol, etc. The experimental results show that the proposed method can prevent data leakage on related hardware effectively, and multiple security strategy can prevent data leakage in the process of transmission or at a node effectively.\",\"PeriodicalId\":294342,\"journal\":{\"name\":\"2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)\",\"volume\":\"62 35\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICVRIS.2019.00118\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICVRIS.2019.00118","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Internet of Things Privacy Security and Coping Strategies
Aiming at the problems of implicit security issues arising from the interconnected and the centralized management of data platforms in the IoT application system with the development of network intelligence and information technology, a design method of comprehensive privacy protection method is proposed. This method is focusing on the application security of the sensing layer and the transport layer, in the sensing layer, three factors including dedicated encryption chip, electronic key and hard disk data are combined for identity authentication, in terms of protection strategy, protect privacy with anonymization, lightweight encryption, routing protocol, etc. The experimental results show that the proposed method can prevent data leakage on related hardware effectively, and multiple security strategy can prevent data leakage in the process of transmission or at a node effectively.