Skip to main content

Abstract

This paper relates to a security protection architecture for the Internet of Things, which aims to provide a defense in depth system with security genes to enhance the security and anti-attack ability of the Internet of things. The architecture is based on six security genes, including user, device, data, location, application and connection. By integrating trusted computing, identity mapping, mimic defense and other technologies, it realizes intelligent identity authentication, separation of access network and core network, and linkage of identity authentication and authorization. The architecture has the advantages of strong adaptability, strong security protection ability, high efficiency and reliability, and strong backward compatibility. Through this invention, the attack surface of the Internet of things can be effectively reduced, and the security and stability of the Internet of things can be improved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, Z., Feng, D.: Dynamic integrity measurement architecture based on trusted computing. J. Electron. Inf. 32(04), 875–879 (2010)

    Article  Google Scholar 

  2. Fan, R.: Ecological environment monitoring analysis based on Internet of Things technology. 4(16), 28–30 (2023)

    Google Scholar 

  3. Yang, Y., Zhou, W., Zhao, S., Liu, C.: A survey of IoT security: threats, detection, and defense. J. Commun. 42(02), 188–205 (2021)

    Google Scholar 

  4. Chen, Q.: Smart grid security solutions for 5G IoT and edge computing. 23(09), 57–60 (2023)

    Google Scholar 

  5. Wu, S., Wei, Y.: Discussion on network big data technology based on cloud computing and Internet of Things. 10, 77–78 (2023)

    Google Scholar 

  6. Zhang, Y., Li, J., Song, X.: Overview of security detection of IoT devices. 60(10), 2271–2290 (2023)

    Google Scholar 

  7. Chen, L., Li, F., Ren, B., Yang, J.: Overview of software Defined Internet of Things research. Chin. J. Electron. 49(05), 1019–1032 (2021)

    Google Scholar 

  8. Blockchain-based IoT multi-domain data sharing mechanism. https://doi.org/10.16180/j.cnki. ISSN 1007-7820.2024.10.008. Accessed 11 Oct 2023

  9. Cai, N., Liu, L.: Security sensor control technology of wheeled robot with double loop trajectory Internet of Things. 31(18), 51–54 (2023)

    Google Scholar 

  10. Kuang, B., Li, Y., Gu, F.: A review of vehicle networking security research: threats, countermeasures and future prospects. 60(10), 2304–2321 (2023)

    Google Scholar 

  11. Liu, W.: Big data and artificial intelligence technology of computer network security defense system. 10, 67–69 (2023)

    Google Scholar 

  12. Yu, H., Guo, Q., Fang, L.: Research on zero trust system technology. Commun. Technol. (8) (2020)

    Google Scholar 

  13. Zhang, J.: Application of attribute-based access control in remote first aid under zero-trust architecture. 56(02), 250–254 (2023)

    Google Scholar 

  14. Yang, F.: Application of communication engineering technology in the field of Internet of Things. 36(09), 168–170 (2023)

    Google Scholar 

  15. Wu, J.: Research on mimicry defense in cyberspace. J. Inf. Secur. 1(4) (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chenglong Fu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zuo, P., Fu, C., Liu, X., Wei, J. (2024). An Internet of Things Security Protection System Architecture. In: Dong, J., Zhang, L., Cheng, D. (eds) Proceedings of the 2nd International Conference on Internet of Things, Communication and Intelligent Technology. IoTCIT 2023. Lecture Notes in Electrical Engineering, vol 1197. Springer, Singapore. https://doi.org/10.1007/978-981-97-2757-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-2757-5_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-2756-8

  • Online ISBN: 978-981-97-2757-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics