Information security and storage of Internet of Things based on block chains

被引:23
|
作者
Liu, YiHe [1 ]
Zhang, Shuang [1 ,2 ,3 ,4 ]
机构
[1] Neijiang Normal Univ, Coll Comp Sci, Neijiang 641100, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Life Sci & Technol, Chengdu 611731, Sichuan, Peoples R China
[3] High Field Magnet Resonance Brain Imaging Lab Sic, Chengdu 611731, Sichuan, Peoples R China
[4] Minist Educ, Key Lab NeuroInformat, Chengdu 611731, Sichuan, Peoples R China
关键词
Block chain; Internet of Things; Information security and storage; DDOS;
D O I
10.1016/j.future.2020.01.023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With progress in science and technology and the rapid development of the Internet of Things, we have entered the intelligent era of the Internet of Things. With many devices connected to the Internet, hackers have opportunities to attack; thus, the security of the Internet of Things has attracted increased attention. In the era of big data, the demand for information storage is increasing. This paper considers block chains and proposes an ECC (Ellipse Curve Cryptography) asymmetric algorithm to encrypt information. For storage, this paper proposes compressed sensing for data compression reconstruction to improve information storage speed in the Internet of Things. The experimental results show that the proposed algorithm is superior to comparable algorithms in security and storage performance. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:296 / 303
页数:8
相关论文
共 50 条
  • [31] Biometric security management based on Internet of Things
    Sesha Vidhya S.
    Shanthi K.G.
    Keerthana S.
    Nisha P.
    Monisha H.
    Nandhini Devi G.
    Materials Today: Proceedings, 2023, 80 : 3204 - 3207
  • [32] Encryption and Hash based Security in Internet of Things
    Sundaram, B. Vinayaga
    Ramnath, M.
    Prasanth, M.
    Sundaram, Varsha J.
    2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
  • [33] Building the Internet of Things Using a Mobile RFID Security Protocol Based on Information Technology
    Yan, Tao
    Wen, Qiaoyan
    ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 1, 2011, 104 : 143 - 149
  • [34] Information Security Monitoring and Management Method Based on Big Data in the Internet of Things Environment
    Liang, Wuchao
    Li, Wenning
    Feng, Lili
    IEEE ACCESS, 2021, 9 : 39798 - 39812
  • [35] Security optimization algorithm for public information platform of internet of things based on open architecture
    Wang, Zhe
    SOFT COMPUTING, 2023,
  • [36] Landscape design of urban culture transmission based on the regional information security of Internet of Things
    Li, Weiting
    Yang, Zhi
    HELIYON, 2024, 10 (15)
  • [37] A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things
    Wang, Yue
    Che, Tingyu
    Zhao, Xiaohu
    Zhou, Tao
    Zhang, Kai
    Hu, Xiaofei
    SENSORS, 2022, 22 (09)
  • [38] Internet of Things Information Network Security Situational Awareness Based on Machine Learning Algorithms
    Meng, Lei
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [39] Based on the Role of Internet of Things Security in the Management of Enterprise Human Resource Information Leakage
    Zeng, Zhen
    Zhang, Jiajia
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [40] Research on consumers' personal information security and perception based on digital twins and Internet of Things
    Liu, Xiaoxia
    SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2022, 53