Skip to main content

2024 | OriginalPaper | Buchkapitel

An Internet of Things Security Protection System Architecture

verfasst von : Peiliang Zuo, Chenglong Fu, Xuewen Liu, Jiaxin Wei

Erschienen in: Proceedings of the 2nd International Conference on Internet of Things, Communication and Intelligent Technology

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper relates to a security protection architecture for the Internet of Things, which aims to provide a defense in depth system with security genes to enhance the security and anti-attack ability of the Internet of things. The architecture is based on six security genes, including user, device, data, location, application and connection. By integrating trusted computing, identity mapping, mimic defense and other technologies, it realizes intelligent identity authentication, separation of access network and core network, and linkage of identity authentication and authorization. The architecture has the advantages of strong adaptability, strong security protection ability, high efficiency and reliability, and strong backward compatibility. Through this invention, the attack surface of the Internet of things can be effectively reduced, and the security and stability of the Internet of things can be improved.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Liu, Z., Feng, D.: Dynamic integrity measurement architecture based on trusted computing. J. Electron. Inf. 32(04), 875–879 (2010)CrossRef Liu, Z., Feng, D.: Dynamic integrity measurement architecture based on trusted computing. J. Electron. Inf. 32(04), 875–879 (2010)CrossRef
2.
Zurück zum Zitat Fan, R.: Ecological environment monitoring analysis based on Internet of Things technology. 4(16), 28–30 (2023) Fan, R.: Ecological environment monitoring analysis based on Internet of Things technology. 4(16), 28–30 (2023)
3.
Zurück zum Zitat Yang, Y., Zhou, W., Zhao, S., Liu, C.: A survey of IoT security: threats, detection, and defense. J. Commun. 42(02), 188–205 (2021) Yang, Y., Zhou, W., Zhao, S., Liu, C.: A survey of IoT security: threats, detection, and defense. J. Commun. 42(02), 188–205 (2021)
4.
Zurück zum Zitat Chen, Q.: Smart grid security solutions for 5G IoT and edge computing. 23(09), 57–60 (2023) Chen, Q.: Smart grid security solutions for 5G IoT and edge computing. 23(09), 57–60 (2023)
5.
Zurück zum Zitat Wu, S., Wei, Y.: Discussion on network big data technology based on cloud computing and Internet of Things. 10, 77–78 (2023) Wu, S., Wei, Y.: Discussion on network big data technology based on cloud computing and Internet of Things. 10, 77–78 (2023)
6.
Zurück zum Zitat Zhang, Y., Li, J., Song, X.: Overview of security detection of IoT devices. 60(10), 2271–2290 (2023) Zhang, Y., Li, J., Song, X.: Overview of security detection of IoT devices. 60(10), 2271–2290 (2023)
7.
Zurück zum Zitat Chen, L., Li, F., Ren, B., Yang, J.: Overview of software Defined Internet of Things research. Chin. J. Electron. 49(05), 1019–1032 (2021) Chen, L., Li, F., Ren, B., Yang, J.: Overview of software Defined Internet of Things research. Chin. J. Electron. 49(05), 1019–1032 (2021)
9.
Zurück zum Zitat Cai, N., Liu, L.: Security sensor control technology of wheeled robot with double loop trajectory Internet of Things. 31(18), 51–54 (2023) Cai, N., Liu, L.: Security sensor control technology of wheeled robot with double loop trajectory Internet of Things. 31(18), 51–54 (2023)
10.
Zurück zum Zitat Kuang, B., Li, Y., Gu, F.: A review of vehicle networking security research: threats, countermeasures and future prospects. 60(10), 2304–2321 (2023) Kuang, B., Li, Y., Gu, F.: A review of vehicle networking security research: threats, countermeasures and future prospects. 60(10), 2304–2321 (2023)
11.
Zurück zum Zitat Liu, W.: Big data and artificial intelligence technology of computer network security defense system. 10, 67–69 (2023) Liu, W.: Big data and artificial intelligence technology of computer network security defense system. 10, 67–69 (2023)
12.
Zurück zum Zitat Yu, H., Guo, Q., Fang, L.: Research on zero trust system technology. Commun. Technol. (8) (2020) Yu, H., Guo, Q., Fang, L.: Research on zero trust system technology. Commun. Technol. (8) (2020)
13.
Zurück zum Zitat Zhang, J.: Application of attribute-based access control in remote first aid under zero-trust architecture. 56(02), 250–254 (2023) Zhang, J.: Application of attribute-based access control in remote first aid under zero-trust architecture. 56(02), 250–254 (2023)
14.
Zurück zum Zitat Yang, F.: Application of communication engineering technology in the field of Internet of Things. 36(09), 168–170 (2023) Yang, F.: Application of communication engineering technology in the field of Internet of Things. 36(09), 168–170 (2023)
15.
Zurück zum Zitat Wu, J.: Research on mimicry defense in cyberspace. J. Inf. Secur. 1(4) (2016) Wu, J.: Research on mimicry defense in cyberspace. J. Inf. Secur. 1(4) (2016)
Metadaten
Titel
An Internet of Things Security Protection System Architecture
verfasst von
Peiliang Zuo
Chenglong Fu
Xuewen Liu
Jiaxin Wei
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-2757-5_19

Premium Partner