Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security guarantee method of internet of things sensing device cloud simulation system

A technology of perception equipment and simulation system, which is applied in the field of information security, can solve problems such as data tampering, data privacy cannot be guaranteed, and system performance is affected, so as to avoid illegal access, ensure data privacy, and access safe and reliable Effect

Active Publication Date: 2015-07-15
XIDIAN UNIV
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the cloud real-time simulation system, due to the lack of legality authentication for the IoT gateway and IoT sensing devices, some illegal devices can be connected to the system, which will affect the system performance and even cause damage to the system.
[0007] 2. The privacy of data cannot be guaranteed during real-time data transmission: in the cloud real-time simulation system, since the cloud simulation nodes need to be synchronized with the IoT sensing devices, the real-time requirements for data transmission are very high, and the data transmission In the process of data transmission, the privacy of data is not protected, and there are problems such as damage to data integrity, data tampering, and malicious program attacks. If data privacy protection is added to the process of data transmission, the real-time performance of data will be reduced. , that is, there is a contradiction between ensuring real-time data and ensuring data privacy
[0008] 3. The access control to the cloud simulation node is not realized: in the cloud real-time simulation system, all IoT sensing devices have established simulation nodes in the cloud, and the illegal access of the cloud simulation node is equivalent to the illegal access of the IoT sensing device, however In this system, if the access control to the cloud simulation node is not implemented, the cloud simulation node will have the risk of being illegally accessed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security guarantee method of internet of things sensing device cloud simulation system
  • Information security guarantee method of internet of things sensing device cloud simulation system
  • Information security guarantee method of internet of things sensing device cloud simulation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention is described below based on examples, but the present invention is not limited to these examples.

[0027] The present invention is aimed at a cloud simulation system for IoT sensing devices, which includes: IoT sensing devices for data collection, IoT gateways for access and integration, and cloud device simulation for cloud simulation center.

[0028] refer to figure 1 , the implementation method for ensuring the system information security of the present invention includes three parts: one is to perform authentication before the IoT sensing device accesses the cloud real-time simulation system, so as to ensure the legitimacy of the IoT sensing device accessing the simulation system; The second is to perform comprehensive processing of encryption, timing and real-time transmission, decryption, and verification of data in the process of real-time data transmission to ensure the privacy of the data transmission process; the third is when the cloud...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security guarantee method of an internet of things sensing device cloud simulation system. The method mainly solves the problem that an existing Internet of things sensing device cloud real-time simulation system is not safe. According to the technical scheme, the method includes the steps that 1, verification is carried out before an Internet of things sending device has access to a cloud real-time simulation system so as to guarantee legality when the Internet of things sending device has access to the cloud real-time simulation system; 2, encryption, transmission in timed and real-time modes, decryption, comprehensive processing of verification are carried out on data in the real-time data transmission process, so that privacy in the data transmission process is guaranteed; 3, when a cloud application service program has access to a cloud simulation node, access control verification is carried out on the cloud application service program so as to guarantee that illegal access of the cloud simulation node is avoided. The method improves safety of the Internet of things sensing device cloud real-time simulation system, and can be used for cloud computation and the internet of things.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an information security guarantee method for a cloud simulation system of an Internet of Things sensing device, which can be used for cloud computing and the Internet of Things. Background technique [0002] With the continuous maturity of technologies in the field of Internet of Things such as smart home, smart medical care and intelligent transportation, the number of smart devices in the Internet of Things has grown rapidly. The Internet has truly entered the era of big data, and it has also brought unprecedented threats. [0003] With the increasing number of Internet of Things sensing devices, the number of Internet of Things network access points increases, and the increase of network access points also means that the number of network intrusion points increases, and the network is more vulnerable to attacks. As the intelligence of devices increases...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 沈玉龙王建东姜仕双胡俊祝幸辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products