Abstract
Once the Internet of Things was proposed, it has received great attention from all walks of life and has become one of the top ten technologies that change the world. Therefore, more and more people are engaged in the research of the Internet of Things, after the unremitting efforts of all seniors. Now the Internet of Things has been applied to every aspect of our lives. However, in the application process of the Internet of Things, the protection of personal privacy will undoubtedly be involved. If this problem is not effectively resolved, it will become a major obstacle to the development of the Internet of Things. At present, the research of fully homomorphic technology has attracted great attention from the cryptography community. You can directly calculate the encrypted text encryption to obtain the output and decrypt the output. The result is the same as the output of the unencrypted plain text. This article first comprehensively describes the solution to the privacy protection problem in the existing Internet of Things, and then proposes to apply the fully homomorphic technology to the Internet of Things to make the services provided by the network more secure. Through the analysis of the basic composition and architecture of the existing Internet of Things system, a privacy protection interaction model for the Internet of Things is established, which uses a completely homomorphic technology. On this basis, the algorithm for implementing simple homomorphic encryption is improved, and general homomorphic encryption theory is proposed for some security issues. After using this method to encrypt privacy, the success rate of cracking dropped by 24%.
Highlights
1.1 Background and SignificanceToday, “Internet of Things” has become a new generation of popular technology concepts [1]
Its definition is according to the agreed agreement, use infrared sensors, and radio frequency identification to connect to the Internet to achieve the purpose of information exchange and communication and intelligent identification, placement, tracking, and monitoring the purpose of management and management [4]
This paper focuses on the security and privacy protection mechanism of the Internet of Things in the simulation and optimization of mechanical structures [8, 9] and discusses the successful implementation of this method
Summary
1.1 Background and SignificanceToday, “Internet of Things” has become a new generation of popular technology concepts [1]. The International Telecommunication Union published a report entitled “Internet of Things.”. The report describes the beautiful scene of the Internet age: if the driver makes a mistake while driving, the car alarm system will automatically remind; the owner will have the file when he leaves. In 1999, China proposed the concept of the Internet of Things, which was called a sensor network. Its definition is according to the agreed agreement, use infrared sensors, and radio frequency identification (laser scanner, global positioning system, and other information tracking equipment) to connect to the Internet to achieve the purpose of information exchange and communication and intelligent identification, placement, tracking, and monitoring the purpose of management and management [4]. The network concept based on the “Internet concept” expands end users into goals and objects through the “Internet of Things Thought,” and the goals and objects promote information exchange [5]
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have