Research and Design of Encryption Standards Based on IoT Network Layer Information Security of Data

被引:0
|
作者
Wang, Jia [1 ]
机构
[1] Neijiang Vocat & Tech Coll, Informat & Elect Dept, Neijiang 641100, Sichuan, Peoples R China
来源
EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS | 2024年 / 11卷 / 05期
关键词
Internet of things; transport layer; information security; data enhancement security; INTERNET; THINGS;
D O I
10.4108/eetsis.5826
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
INTRODUCTION: With the rapid development of the economy, more and more devices and sensors are connected to the Internet, and a large amount of data is transmitted in the network. However, this large-scale data transmission involves the problem of information security, especially in the transport layer. Therefore, there is an urgent need to study and design an information security data enhancement security strategy for the transport layer of ubiquitous networks (i.e., IoT). OBJECTIVES: This thesis aims to research and create a data enhancement security strategy for the transport layer of the Ubiquitous Web to ensure the confidentiality and integrity of data transmitted in the Ubiquitous Web. Specific objectives include evaluating the advantages and disadvantages of current ubiquitous network transport layer lifting security techniques, proposing a new lifting security strategy applicable to the transport layer of ubiquitous networks, and verifying the feasibility and security of the proposed standard. METHODS: First, a detailed study and evaluation of the current Ubiquitous Network Transport Layer Elevated Security Techniques is conducted, including analyzing and comparing the existing elevated security algorithms and protocols. Then, based on the obtained research results, a new lifting security strategy applicable to the transport layer of ubiquitous networks is proposed. The design process takes into account the characteristics and requirements of ubiquitous networks, such as resource constraints, dynamics of network topology, and cooperative communication of multiple devices. Subsequently, the feasibility and security of the proposed standard are verified through simulations and experiments. In the experiments, real ubiquitous network devices and network environments are used to evaluate the performance and attack resistance of the enhanced security algorithms. RESULTS: Through the research and analysis of ubiquitous network transport layer lifting security techniques, some limitations of the existing lifting security algorithms are identified, such as high resource consumption, insufficient security, and limited ability to adapt to the characteristics of ubiquitous networks. Therefore, this thesis proposes a new lifting security strategy applicable to the transport layer of ubiquitous networks. The experimental results show that the standard can guarantee data confidentiality and integrity while possessing high efficiency and attack resistance. In addition, the proposed standard meets the needs of resource-constrained devices in ubiquitous networks and can operate properly under multiple network topologies and cooperative device communications. CONCLUSION: This thesis proposes a new elevated security strategy applicable to ubiquitous networks through the study and design of transport layer elevated security techniques for ubiquitous networks. This standard can effectively protect the confidentiality and integrity of data transmitted in ubiquitous networks with high efficiency and attack resistance. The proposed standard is expected to provide a feasible solution for the information security of ubiquitous networks and a more reliable guarantee for developing and applying ubiquitous networks. Future work can further improve and optimize this enhanced security strategy and validate and apply it in a wider range of ubiquitous network environments.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Proposing Encryption Selection Model for IoT Devices Based on IoT Device Design
    Saleh, Matasem
    Jhanjhi, Nz
    Abdullah, Azween
    Saher, Raazia
    2021 23RD INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT 2021): ON-LINE SECURITY IN PANDEMIC ERA, 2021, : 210 - 219
  • [22] IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework
    Wheelus, Charles
    Zhu, Xingquan
    IOT, 2020, 1 (02): : 259 - 285
  • [23] SAFETHINGS: Data Security by Design in the IoT
    Barbosa, Manuel
    Ben Mokhtar, Sonia
    Felber, Pascal
    Maia, Francisco
    Matos, Miguel
    Oliveira, Rui
    Riviere, Etienne
    Schiavoni, Valerio
    Voulgaris, Spyros
    2017 13TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2017), 2017, : 117 - 120
  • [24] Stochastic Cost Minimization Mechanism Based on Identifier Network for IoT Security
    Yao, Su
    Li, Ziwei
    Guan, Jianfeng
    Liu, Yang
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) : 3923 - 3934
  • [25] Clustering on heterogeneous IoT information network based on meta path
    Zhao, Kuo
    Zhang, Huajian
    Li, Jiaxin
    Pan, Qifu
    Lai, Li
    Nie, Yike
    Zhang, Zhongfei
    SCIENCE PROGRESS, 2024, 107 (02)
  • [26] BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network
    Rathore, Shailendra
    Kwon, Byung Wook
    Park, Jong Hyuk
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 143 : 167 - 177
  • [27] Research on the Network Information Security Based on the Cloud Computing
    Shen, Wei
    2015 2nd International Conference on Education and Education Research (EER 2015), Pt 5, 2015, 9 : 349 - 353
  • [28] A Review of Security Standards and Frameworks for IoT-Based Smart Environments
    Karie, Nickson M.
    Sahri, Nor Masri
    Yang, Wencheng
    Valli, Craig
    Kebande, Victor R.
    IEEE ACCESS, 2021, 9 : 121975 - 121995
  • [29] A Review on Attack and Security Tools at Network Layer of IoT
    Agarwal, Vidur
    Mishra, Preeti
    Kumar, Sachin
    Pilli, Emmanuel S.
    OPTICAL AND WIRELESS TECHNOLOGIES, OWT 2020, 2022, 771 : 497 - 506
  • [30] Quorum-based Blockchain Network with IPFS to Improve Data Security in IoT Network
    Balakumar, Sethuraman
    Kavitha, Angamuthu Rajasekaran
    STUDIES IN INFORMATICS AND CONTROL, 2021, 30 (03): : 85 - 98