Otwarty dostęp

Research on Network Security Technology of Internet of Things Intelligent Information Terminal under the Background of Information Technology


Zacytuj

Gao, M., Wang, Q., Arafin, M. T., Lyu, Y., & Qu, G. (2017). Approximate computing for low power and security in the internet of things. Computer, 50(6), 27–34. Search in Google Scholar

Debe, M., Salah, K., Rehman, M. H. U., & Svetinovic, D. (2020). Blockchain-based decentralized reverse bidding in fog computing. IEEE Access, 2020(99). Search in Google Scholar

Bediya, A. K., & Kumar, R. (2021). A novel intrusion detection system for internet of things network security. Journal of information technology research(3), 14. Search in Google Scholar

Xie, T., Tu, G. H., Li, C. Y., & Peng, C. (2020). How can iot services pose new security threats in operational cellular networks?. IEEE Transactions on Mobile Computing, PP(99), 1–1. Search in Google Scholar

Hong, S. (2019). Authentication techniques in the internet of things environment: a survey. International Journal of Network Security, 21(3), 462–470. Search in Google Scholar

Abdalzaher, M. S., & Muta, O. (2020). A game-theoretic approach for enhancing security and data trustworthiness in iot applications. IEEE Internet of Things Journal, PP(99), 1–1. Search in Google Scholar

Bu, L., Isakov, M., & Kinsy, M. A. (2019). A secure and robust scheme for sharing confidential information in iot systems. Ad hoc networks, 92(SEP.), 101762.1–101762.11. Search in Google Scholar

Sequeiros, J. B. F., Chimuco, F. T., Samaila, M. G., Mário M. Freire, & Pedro R. M. Inácio. (2020). Attack and system modeling applied to iot, cloud, and mobile ecosystems: embedding security by design. ACM Computing Surveys, 53(2), 1–32. Search in Google Scholar

Liang, W., Li, W., & Feng, L. (2021). Information security monitoring and management method based on big data in the internet of things environment. IEEE Access, PP(99), 1–1. Search in Google Scholar

Kandhoul, N., Dhurandher, S. K., & Woungang, I. (2019). T_cafe: a trust based security approach for opportunistic iot. IET Communications, 13(20). Search in Google Scholar

Gebremichael, T., Ledwaba, L. P. I., Eldefrawy, M., Hancke, G. P., & Akerberg, J. (2020). Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access, PP(99), 1–1. Search in Google Scholar

Oktian, Y. E., & Lee, S. G. (2020). Borderchain: blockchain-based access control framework for the internet of things endpoint. IEEE Access, PP(99), 1–1. Search in Google Scholar

Ali, M. I., Kaur, S., Khamparia, A., Gupta, D., & Al-Turjman, F. (2020). Security challenges and cyber forensic ecosystem in iot driven byod environment. IEEE Access, 8, 172770–172782. Search in Google Scholar

Tariq, U., Aseeri, A. O., Alkatheiri, M. S., & Zhuang, Y. (2020). Context-aware autonomous security assertion for industrial iot. IEEE Access, 8, 191785–191794. Search in Google Scholar

Gomes, T., Salgado, F., Pinto, S., Cabral, J., & Tavares, A. (2018). A 6lowpan accelerator for internet of things endpoint devices. IEEE Internet of Things Journal, 5(1), 371–377. Search in Google Scholar

Lu, Z., Kuo-Hui, Y., Gerhard, H., Zhe, L., & Chunhua, S. (2018). Security and privacy for the industrial internet of things: an overview of approaches to safeguarding endpoints. IEEE Signal Processing Magazine, 35(5), 76–87. Search in Google Scholar

Dao, N. N., Phan, T. V., Sa’Ad, U., Kim, J., & Cho, S. (2021). Securing heterogeneous iot with intelligent ddos attack behavior learning. IEEE Systems Journal, PP(99), 1–10. Search in Google Scholar

Natalia, M., & Alexander, T. (2019). Internet of things: information security challenges and solutions. Cluster Computing, 1–17. Search in Google Scholar

Yang, Y., Peng, H., Li, L., & Niu, X. (2017). General theory of security and a study case in internet of things. Internet of Things Journal, IEEE, 4(2), 592–600. Search in Google Scholar

Jason, R., C., Nurse, Sadie, Creese, & David, et al. (2017). Security risk assessment in internet of things systems. IT Professional, 19(5), 20–26. Search in Google Scholar

Zou, Y., & Lv, J. (2018). Information security transmission technology in internet of things control system. International Journal of Online Engineering, 14(6), 177. Search in Google Scholar

eISSN:
2444-8656
Język:
Angielski
Częstotliwość wydawania:
Volume Open
Dziedziny czasopisma:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics