Application of IoT technology in cyber security prevention system

被引:0
作者
Dong, Jiahan [1 ]
Wang, Chao [1 ]
Guo, Guangxin [1 ]
Ren, Tianyu [1 ]
Sun, Hao [2 ]
机构
[1] State Grid Beijing Electric Power Research, Beijing
[2] AnHui JiYuan Inspection and Testing Technology Co., LTD, Anhui, Hefei
关键词
Effective signal-to-noise ratio; Elliptic curve encryption algorithm; Internet of Things technology; MEMM; Network security prevention system; UCB algorithm;
D O I
10.2478/amns-2024-2266
中图分类号
学科分类号
摘要
In the process of gradually expanding the scale of computer networks and the design of network systems becoming more and more complex, people pay more and more attention to the construction of network security protection systems. Starting from the blockchain encryption technology, the article establishes the authentication and access management key based on the elliptic curve encryption algorithm and combines the maximum entropy model with the hidden Markov model to construct the MEMM for intrusion detection of network security. Based on the effective signal-to-noise ratio model of the network channel, an adaptive channel selection strategy based on the UCB algorithm is proposed. The IoT security prevention system is built based on IoT technology, and each functional module of the system is designed. The system’s authentication security, network intrusion detection, adaptive channel selection, and concurrency performance were tested after the design was completed. The encryption operation time of the ECC algorithm was improved by 41.53% compared to the RSA algorithm, the average time of the MEMM network intrusion detection was 41.54ms, and the false alarm rate of the intrusion detection was kept below 16.5%. The average packet collection rate of the nodes in the adaptive channel selection algorithm is 90.98%. The maximum system throughput is up to 62.19MB, and the extreme difference in data volume between different nodes is only 38 entries. Constructing a network security prevention system based on IoT technology and combining multiple encryption techniques can ensure the secure transmission of network data. © 2024 Jiahan Dong, Chao Wang, Guangxin Guo, Tianyu Ren and Hao Sun, published by Sciendo.
引用
收藏
相关论文
共 38 条
  • [11] Sedjelmaci H., Senouci S.M., Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution, The Journal of Supercomputing, 74, 5, (2018)
  • [12] Ribeiro J., Saghezchi F.B., Mantas G., Rodriguez J., Abd-Alhameed R.A., Hidroid: prototyping a behavioral host-based intrusion detection and prevention system for android, IEEE Access, 99, (2020)
  • [13] Hijazi S., Obaidat M.S., A new detection and prevention system for arp attacks using static entry, IEEE Systems Journal, 3, pp. 1-7, (2019)
  • [14] Chountasis S., Pappas D., Sklavounos D., Network intrusion detection method based on matrix factorization of their time and frequency representations, ETRI Journal, (2020)
  • [15] Yoo S., Jo J., Kim B., Seo J., Hyperion: a visual analytics tool for an intrusion detection and prevention system, IEEE Access, 99, (2020)
  • [16] Haseeb K., Islam N., Almogren A., Din I.U., Intrusion prevention framework for secure routing in wsn-based mobile internet of things, IEEE Access, 99, (2019)
  • [17] Meng Y., Qin T., Liu Y., He C., An effective high threating alarm mining method for cloud security management, IEEE Access, 99, (2018)
  • [18] Rongrong X., Xiaochun Y., Zhiyu H., Framework for risk assessment in cyber situational awareness, IET Information Security, 13, 2, pp. 149-156, (2019)
  • [19] Zhuotao L., Hao J., Yih-Chun H., Michael B., Practical proactive ddos-attack mitigation via endpoint-driven in-network traffic control, IEEE/ACM Transactions on Networking, 26, pp. 1948-1961, (2018)
  • [20] Sou S.I., Lin C.S., Random packet inspection scheme for network intrusion prevention in lte core networks, IEEE Transactions on Vehicular Technology, 9, (2017)