Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
In the process of implementing the Internet of Things, the object itself has identity information and identification equipment and encounters difficulties in communication security during the process of entering the network communication. Just like the Internet and wireless sensor networks, there ar...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2021-01-01
|
Series: | Mobile Information Systems |
Online Access: | http://dx.doi.org/10.1155/2021/6676946 |
id |
doaj-ba7fb509953e47e9bc5a29622f4a419e |
---|---|
record_format |
Article |
spelling |
doaj-ba7fb509953e47e9bc5a29622f4a419e2021-07-02T17:31:52ZengHindawi LimitedMobile Information Systems1875-905X2021-01-01202110.1155/2021/6676946Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of ThingsNing Sun0Tao Li1Gongfei Song2Haoran Xia3Binjiang CollegeCICAEETCICAEETCollege of Mechanical & Electrical EngineeringIn the process of implementing the Internet of Things, the object itself has identity information and identification equipment and encounters difficulties in communication security during the process of entering the network communication. Just like the Internet and wireless sensor networks, there are security issues in information transmission. Therefore, it is of great significance to study the mobile Internet of Things network security technology depression to protect the communication information in the mobile Internet of Things. This paper mainly studies the network security technology of intelligent information terminal based on mobile Internet of Things. This article will analyze and compare the mainstream encryption algorithms of the current mobile Internet and choose a safer and more secure HASH algorithm. We study the flow of key management, key generation, key distribution, verification key distribution, key update, key storage, key backup, and key validity time setting for mobile Internet of Things, using an existing identity cryptosystem. Based on encryption, the design technology of key management and authentication in this paper is improved. Compared with other methods, the storage consumption of this method on GWN is relatively medium. In the initial stage, the storage is 32 bytes, then in registration stage 1, it reaches 84 bytes, in registration stage 2, it is 82 bytes, and then, in the login authentication phase, the number of bytes rose and reached 356 bytes in authentication phase 3. Experimental results show that this protocol has certain advantages in ensuring safety performance.http://dx.doi.org/10.1155/2021/6676946 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ning Sun Tao Li Gongfei Song Haoran Xia |
spellingShingle |
Ning Sun Tao Li Gongfei Song Haoran Xia Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things Mobile Information Systems |
author_facet |
Ning Sun Tao Li Gongfei Song Haoran Xia |
author_sort |
Ning Sun |
title |
Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things |
title_short |
Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things |
title_full |
Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things |
title_fullStr |
Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things |
title_full_unstemmed |
Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things |
title_sort |
network security technology of intelligent information terminal based on mobile internet of things |
publisher |
Hindawi Limited |
series |
Mobile Information Systems |
issn |
1875-905X |
publishDate |
2021-01-01 |
description |
In the process of implementing the Internet of Things, the object itself has identity information and identification equipment and encounters difficulties in communication security during the process of entering the network communication. Just like the Internet and wireless sensor networks, there are security issues in information transmission. Therefore, it is of great significance to study the mobile Internet of Things network security technology depression to protect the communication information in the mobile Internet of Things. This paper mainly studies the network security technology of intelligent information terminal based on mobile Internet of Things. This article will analyze and compare the mainstream encryption algorithms of the current mobile Internet and choose a safer and more secure HASH algorithm. We study the flow of key management, key generation, key distribution, verification key distribution, key update, key storage, key backup, and key validity time setting for mobile Internet of Things, using an existing identity cryptosystem. Based on encryption, the design technology of key management and authentication in this paper is improved. Compared with other methods, the storage consumption of this method on GWN is relatively medium. In the initial stage, the storage is 32 bytes, then in registration stage 1, it reaches 84 bytes, in registration stage 2, it is 82 bytes, and then, in the login authentication phase, the number of bytes rose and reached 356 bytes in authentication phase 3. Experimental results show that this protocol has certain advantages in ensuring safety performance. |
url |
http://dx.doi.org/10.1155/2021/6676946 |
work_keys_str_mv |
AT ningsun networksecuritytechnologyofintelligentinformationterminalbasedonmobileinternetofthings AT taoli networksecuritytechnologyofintelligentinformationterminalbasedonmobileinternetofthings AT gongfeisong networksecuritytechnologyofintelligentinformationterminalbasedonmobileinternetofthings AT haoranxia networksecuritytechnologyofintelligentinformationterminalbasedonmobileinternetofthings |
_version_ |
1721325406579064832 |