Abstract

Internet of Things is an application of network news communication technology. Based on the Internet, it uses physical access technologies such as radio frequency tag and wireless sensor network news communication and network news communication information transmission technology to build a network news communication information system that can cover people and things. In the physical layer, the relative position of the object is calculated by using multipoint cooperative localization, so as to determine the minimum anonymous region. Generate and maintain the anonymous tree topology on the network news dissemination layer, and provide storage management support for multiple anonymous groups. In the application layer, the object determines the corresponding anonymity degree according to the identity and uses the frame structure to construct and return the new anonymous group consistent with the existing anonymous group, which can prevent the persistent multiprecision query attack. A real‐time control method for intrusion response of a security control system is designed, which includes two stages: response task generation and integrated scheduling. An intrusion response task set generation method based on an improved nondominated sorting genetic algorithm is presented, and a distributed integrated task scheduling and optimization algorithm based on a genetic algorithm and a directed acyclic graph is designed. The numerical simulation results show that this method can quickly and smoothly implement the response strategy of information security intrusion without affecting the normal execution of system tasks.

Highlights

  • With the development and progress of social economy, the Internet of Things has been applied in various important fields

  • Analyzed at the technical level, the Internet of Things is similar to the Internet, so the information security problems existing in the Internet will be reflected in the Internet of Things

  • Reassessing the alert situation; Multi-level early warning; Take defensive measures; } else{ Forwarding and processing packets; } }wait(t); Algorithm 1: Security control model of network news dissemination based on bandwidth consumption attack on the Internet of Things prompts according to the different degrees of attack

Read more

Summary

Introduction

With the development and progress of social economy, the Internet of Things has been applied in various important fields. The Internet of Things technology is involved in various aspects such as transportation, military, and financial fields. These fields are closely related to the development of a country. The IoT control system is widely used in rail transit, medical and health care, aerospace, industrial manufacturing, disaster, military, and other fields. There are many methods to control network information security. Through investigation, it is found that the existing control systems or methods all have certain limitations when facing the new characteristics of big data. For big data era of network information safety control work faces new situation, only the more practical and reasonable network information security control mechanism can ensure the safety of the huge amounts of data transmission and large database storage security, and only to establish perfect network information safety evaluation system can provide effective standard for network information security work

Related Work
Detection Process of Abnormal Permission Configuration
Experimental Simulation
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.