Security optimization algorithm for public information platform of internet of things based on open architecture

被引:0
|
作者
Wang, Zhe [1 ,2 ]
机构
[1] Wuhan Univ Sci & Technol, Sch Law & Econ, Wuhan 430065, Hubei, Peoples R China
[2] Hubei Res Ctr Small & Medium Sized Enterprises, Wuhan 430065, Peoples R China
关键词
Public information platform; Open architecture; Security optimization algorithm; Internet of things;
D O I
10.1007/s00500-023-08369-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
At present, with the rapid growth of electronic information and the continuous improvement of computing power, the Internet of Things (IoT) has become increasingly widely used in practical development. In the field of Public Information (PI), the IoT public Information platform has made good progress and promoted the scientific growth of public information and resource management. However, affected by its sharing and openness, its information and data security also faces large challenges. Maintaining the platform's information security and improving its reliability have become the primary task in the current public utility construction. In order to solve this dilemma, based on the research of the platform characteristics, information security issues, and the development status of the platform, combined with the open architecture, this paper conducted an in-depth study of the security optimization algorithm of the IoT public Information platform. In order to verify the security optimization algorithm effect of the IoT public Information platform based on the open architecture, this paper took an IoT public Information platform as the test environment and carried out simulation tests on its usability, execution efficiency and protection. The test results showed that, in terms of protection, the average security protection degree of the security optimization algorithm based on open architecture under 80 security risk processing requests was about 86.70%; the average security protection degree of the traditional algorithm under 80 security risk processing requests was about 75.60%. From the test results, the security optimization algorithm of IoT public Information platform based on open architecture has stronger operability.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Study on Security Architecture for Internet of Things
    Li, Hui
    Zhou, Xin
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I, 2010, : 229 - 232
  • [22] Design of Internet of Things Information Security Based on Blockchain
    Zhang, Jiasheng
    Li, Zetao
    2020 3RD WORLD CONFERENCE ON MECHANICAL ENGINEERING AND INTELLIGENT MANUFACTURING (WCMEIM 2020), 2020, : 114 - 117
  • [23] Security algorithm of Internet of Things based on ZigBee protocol
    Wang, Yongkang
    Chen, Chunxia
    Jiang, Qijie
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 14759 - 14766
  • [24] Security algorithm of Internet of Things based on ZigBee protocol
    Yongkang Wang
    Chunxia Chen
    Qijie Jiang
    Cluster Computing, 2019, 22 : 14759 - 14766
  • [25] Privacy Information Security Classification for Internet of Things Based on Internet Data
    Lu, Xiaofeng
    Qu, Zhaowei
    Li, Qi
    Hui, Pan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [26] HIP security architecture for the IP-based Internet of Things
    Meca, Francisco Vidal
    Ziegeldorf, Jan Henrik
    Sanchez, Pedro Moreno
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    Keoh, Sye Loong
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 1331 - 1336
  • [27] Blockchain-based internet of things security architecture and applications
    Chen H.
    Lei S.
    Zhang Y.
    Han X.
    Cao Y.
    Zhang Y.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (12) : 16703 - 16714
  • [28] A Blockchain-based Security Approach Architecture for the Internet of Things
    Zhang, Han
    Lang, Weimin
    Liu, Chengming
    Zhang, Bingpeng
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 310 - 313
  • [29] Research on Internet of Things security architecture based on fog computing
    Mai, Trung Dong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (11)
  • [30] An Open Architecture for Converged Internet of Things
    Zou Junwei
    Wu Yuexin
    Zhang Xiaoying
    CHINA COMMUNICATIONS, 2011, 8 (01) : 151 - 155