Information security and storage of Internet of Things based on block chains

被引:23
|
作者
Liu, YiHe [1 ]
Zhang, Shuang [1 ,2 ,3 ,4 ]
机构
[1] Neijiang Normal Univ, Coll Comp Sci, Neijiang 641100, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Life Sci & Technol, Chengdu 611731, Sichuan, Peoples R China
[3] High Field Magnet Resonance Brain Imaging Lab Sic, Chengdu 611731, Sichuan, Peoples R China
[4] Minist Educ, Key Lab NeuroInformat, Chengdu 611731, Sichuan, Peoples R China
关键词
Block chain; Internet of Things; Information security and storage; DDOS;
D O I
10.1016/j.future.2020.01.023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With progress in science and technology and the rapid development of the Internet of Things, we have entered the intelligent era of the Internet of Things. With many devices connected to the Internet, hackers have opportunities to attack; thus, the security of the Internet of Things has attracted increased attention. In the era of big data, the demand for information storage is increasing. This paper considers block chains and proposes an ECC (Ellipse Curve Cryptography) asymmetric algorithm to encrypt information. For storage, this paper proposes compressed sensing for data compression reconstruction to improve information storage speed in the Internet of Things. The experimental results show that the proposed algorithm is superior to comparable algorithms in security and storage performance. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:296 / 303
页数:8
相关论文
共 50 条
  • [21] Research on the Forecast Model of Security Situation for Information System Based on Internet of Things
    Hao, Taiyan
    Jia, Yifan
    Tian, Xi
    2013 IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2013,
  • [22] The Perception Layer Information Security Scheme for Internet of Things based on Lightweight Cryptography
    Hu, XiangYi
    Du, LiPing
    Li, Ying
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON INFORMATION, BUSINESS AND EDUCATION TECHNOLOGY (ICIBET 2013), 2013, 26 : 23 - 29
  • [23] Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
    Sun, Ning
    Li, Tao
    Song, Gongfei
    Xia, Haoran
    MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [24] A Systematic Review of Information Security Frameworks in the Internet of Things
    Irshad, Mohammad
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 1270 - 1275
  • [25] Privacy Information Security Classification Study in Internet of Things
    Lu, Xiaofeng
    Li, Qi
    Qu, Zhaowei
    Hui, Pan
    2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 162 - 165
  • [26] Implementation of the expansion of sensor information storage based on the Internet of Things and cloud computing
    Hu, Lei
    SECURITY AND PRIVACY, 2023, 6 (02)
  • [27] Security of internet of things based on cryptographic algorithm
    Mittal, Sonam
    Singh, Soni
    Balakumaran, D.
    Hemalatha, K.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (01) : 28 - 39
  • [28] A Security Architecture for Internet of Things Based on Blockchain
    Yang, Wei
    Wang, Hao
    Wan, Yadong
    Cao, Yuanlong
    Zhang, Zhiming
    Chen, Shaolong
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 363 - 368
  • [29] RFID Security Certification based on the Internet of Things
    Zhang, Meng
    Zhao, Zhen-Yu
    Yu, Song-Sen
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 755 - 760
  • [30] Security of the Internet of Things Based on Game Algorithm
    Yi, Yue-e
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (08) : 80 - 93