Data Encryption and Transmission Technology for Cotton of IoT Security

被引:1
作者
Zhao, Xiaodong [1 ]
Qi, Lin [1 ]
Li, Yajing [1 ]
Chen, Junxia [2 ]
Shen, Huanhuan [2 ]
机构
[1] Hebei Univ Sci & Technol, Inst Informat Sci & Engn, Shijiazhuang 050018, Peoples R China
[2] Hebei Univ Sci & Technol, Inst Econ & Management, Shijiazhuang 050018, Peoples R China
来源
LISS 2014 | 2015年
关键词
Information security of IoT; Data encryption; VPN; Secure transmission;
D O I
10.1007/978-3-662-43871-8_244
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
IoT is a double-edged sword, it brings convenience to the control system, but also brings some security problems to be solved (Yang, Research on Key Technology of Control Security in IOT. Beijing University of Posts and Telecommunications. Beijing, 2013). This article describes the research on information data in cotton warehouse environment in terms of the security of IoT transmission. Through the analysis and research about data encryption algorithm and a virtual private network technology (Virtual Private Network, VPN), using data encryption technology and VPN technology combined, it is to study a scheme that send the local information of country's cotton warehouse and data to the central control center secure transmission. This will not only ensure that data will not be a attacked or tampered by a third-party during transmission, but also have important significance for modern management of cotton warehouse.
引用
收藏
页码:1695 / 1701
页数:7
相关论文
共 6 条
[1]   FOILING COMPUTER CRIME .1. DES WILL BE TOTALLY INSECURE WITHIN 10 YEARS [J].
HELLMAN, ME .
IEEE SPECTRUM, 1979, 16 (07) :32-39
[2]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[3]  
Wang J, 2006, RES RSA ENCRYPTION A
[4]  
WANG L. H, 2012, J DAQING NORM U
[5]  
Xia S, 2011, MANUF AUTOM, V1, P180
[6]  
Yang J, 2013, RES KEY TECHNOLOGY C