Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things

In the process of implementing the Internet of Things, the object itself has identity information and identification equipment and encounters difficulties in communication security during the process of entering the network communication. Just like the Internet and wireless sensor networks, there ar...

Full description

Bibliographic Details
Main Authors: Ning Sun, Tao Li, Gongfei Song, Haoran Xia
Format: Article
Language:English
Published: Hindawi Limited 2021-01-01
Series:Mobile Information Systems
Online Access:http://dx.doi.org/10.1155/2021/6676946
id doaj-ba7fb509953e47e9bc5a29622f4a419e
record_format Article
spelling doaj-ba7fb509953e47e9bc5a29622f4a419e2021-07-02T17:31:52ZengHindawi LimitedMobile Information Systems1875-905X2021-01-01202110.1155/2021/6676946Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of ThingsNing Sun0Tao Li1Gongfei Song2Haoran Xia3Binjiang CollegeCICAEETCICAEETCollege of Mechanical & Electrical EngineeringIn the process of implementing the Internet of Things, the object itself has identity information and identification equipment and encounters difficulties in communication security during the process of entering the network communication. Just like the Internet and wireless sensor networks, there are security issues in information transmission. Therefore, it is of great significance to study the mobile Internet of Things network security technology depression to protect the communication information in the mobile Internet of Things. This paper mainly studies the network security technology of intelligent information terminal based on mobile Internet of Things. This article will analyze and compare the mainstream encryption algorithms of the current mobile Internet and choose a safer and more secure HASH algorithm. We study the flow of key management, key generation, key distribution, verification key distribution, key update, key storage, key backup, and key validity time setting for mobile Internet of Things, using an existing identity cryptosystem. Based on encryption, the design technology of key management and authentication in this paper is improved. Compared with other methods, the storage consumption of this method on GWN is relatively medium. In the initial stage, the storage is 32 bytes, then in registration stage 1, it reaches 84 bytes, in registration stage 2, it is 82 bytes, and then, in the login authentication phase, the number of bytes rose and reached 356 bytes in authentication phase 3. Experimental results show that this protocol has certain advantages in ensuring safety performance.http://dx.doi.org/10.1155/2021/6676946
collection DOAJ
language English
format Article
sources DOAJ
author Ning Sun
Tao Li
Gongfei Song
Haoran Xia
spellingShingle Ning Sun
Tao Li
Gongfei Song
Haoran Xia
Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
Mobile Information Systems
author_facet Ning Sun
Tao Li
Gongfei Song
Haoran Xia
author_sort Ning Sun
title Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
title_short Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
title_full Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
title_fullStr Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
title_full_unstemmed Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
title_sort network security technology of intelligent information terminal based on mobile internet of things
publisher Hindawi Limited
series Mobile Information Systems
issn 1875-905X
publishDate 2021-01-01
description In the process of implementing the Internet of Things, the object itself has identity information and identification equipment and encounters difficulties in communication security during the process of entering the network communication. Just like the Internet and wireless sensor networks, there are security issues in information transmission. Therefore, it is of great significance to study the mobile Internet of Things network security technology depression to protect the communication information in the mobile Internet of Things. This paper mainly studies the network security technology of intelligent information terminal based on mobile Internet of Things. This article will analyze and compare the mainstream encryption algorithms of the current mobile Internet and choose a safer and more secure HASH algorithm. We study the flow of key management, key generation, key distribution, verification key distribution, key update, key storage, key backup, and key validity time setting for mobile Internet of Things, using an existing identity cryptosystem. Based on encryption, the design technology of key management and authentication in this paper is improved. Compared with other methods, the storage consumption of this method on GWN is relatively medium. In the initial stage, the storage is 32 bytes, then in registration stage 1, it reaches 84 bytes, in registration stage 2, it is 82 bytes, and then, in the login authentication phase, the number of bytes rose and reached 356 bytes in authentication phase 3. Experimental results show that this protocol has certain advantages in ensuring safety performance.
url http://dx.doi.org/10.1155/2021/6676946
work_keys_str_mv AT ningsun networksecuritytechnologyofintelligentinformationterminalbasedonmobileinternetofthings
AT taoli networksecuritytechnologyofintelligentinformationterminalbasedonmobileinternetofthings
AT gongfeisong networksecuritytechnologyofintelligentinformationterminalbasedonmobileinternetofthings
AT haoranxia networksecuritytechnologyofintelligentinformationterminalbasedonmobileinternetofthings
_version_ 1721325406579064832