Abstract
This paper relates to a security protection architecture for the Internet of Things, which aims to provide a defense in depth system with security genes to enhance the security and anti-attack ability of the Internet of things. The architecture is based on six security genes, including user, device, data, location, application and connection. By integrating trusted computing, identity mapping, mimic defense and other technologies, it realizes intelligent identity authentication, separation of access network and core network, and linkage of identity authentication and authorization. The architecture has the advantages of strong adaptability, strong security protection ability, high efficiency and reliability, and strong backward compatibility. Through this invention, the attack surface of the Internet of things can be effectively reduced, and the security and stability of the Internet of things can be improved.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu, Z., Feng, D.: Dynamic integrity measurement architecture based on trusted computing. J. Electron. Inf. 32(04), 875–879 (2010)
Fan, R.: Ecological environment monitoring analysis based on Internet of Things technology. 4(16), 28–30 (2023)
Yang, Y., Zhou, W., Zhao, S., Liu, C.: A survey of IoT security: threats, detection, and defense. J. Commun. 42(02), 188–205 (2021)
Chen, Q.: Smart grid security solutions for 5G IoT and edge computing. 23(09), 57–60 (2023)
Wu, S., Wei, Y.: Discussion on network big data technology based on cloud computing and Internet of Things. 10, 77–78 (2023)
Zhang, Y., Li, J., Song, X.: Overview of security detection of IoT devices. 60(10), 2271–2290 (2023)
Chen, L., Li, F., Ren, B., Yang, J.: Overview of software Defined Internet of Things research. Chin. J. Electron. 49(05), 1019–1032 (2021)
Blockchain-based IoT multi-domain data sharing mechanism. https://doi.org/10.16180/j.cnki. ISSN 1007-7820.2024.10.008. Accessed 11 Oct 2023
Cai, N., Liu, L.: Security sensor control technology of wheeled robot with double loop trajectory Internet of Things. 31(18), 51–54 (2023)
Kuang, B., Li, Y., Gu, F.: A review of vehicle networking security research: threats, countermeasures and future prospects. 60(10), 2304–2321 (2023)
Liu, W.: Big data and artificial intelligence technology of computer network security defense system. 10, 67–69 (2023)
Yu, H., Guo, Q., Fang, L.: Research on zero trust system technology. Commun. Technol. (8) (2020)
Zhang, J.: Application of attribute-based access control in remote first aid under zero-trust architecture. 56(02), 250–254 (2023)
Yang, F.: Application of communication engineering technology in the field of Internet of Things. 36(09), 168–170 (2023)
Wu, J.: Research on mimicry defense in cyberspace. J. Inf. Secur. 1(4) (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zuo, P., Fu, C., Liu, X., Wei, J. (2024). An Internet of Things Security Protection System Architecture. In: Dong, J., Zhang, L., Cheng, D. (eds) Proceedings of the 2nd International Conference on Internet of Things, Communication and Intelligent Technology. IoTCIT 2023. Lecture Notes in Electrical Engineering, vol 1197. Springer, Singapore. https://doi.org/10.1007/978-981-97-2757-5_19
Download citation
DOI: https://doi.org/10.1007/978-981-97-2757-5_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-2756-8
Online ISBN: 978-981-97-2757-5
eBook Packages: Computer ScienceComputer Science (R0)