Paper
28 June 2023 Analysis of key technologies in IoT information security
Yabin Li
Author Affiliations +
Proceedings Volume 12720, 2022 Workshop on Electronics Communication Engineering; 127200D (2023) https://doi.org/10.1117/12.2675543
Event: 2022 Workshop on Electronics Communication Engineering (WECE 2022), 2022, Xi'an, China
Abstract
With the rapid development of China's economy and the rapid improvement of technology, the Internet of Things is gradually appearing in people's vision, the network is becoming an indispensable part of people's lives, and the use of computers, cell phones and other devices for information exchange is the most common and convenient in daily life and work. However, at this stage, the security of IoT information technology has been challenged to a certain extent, which is a big threat to China's economic development, social progress and citizens' property security. In this context, this paper discusses the key technologies in the information security of IoT. This paper first introduces the current situation of IoT information security, and then proposes the use of network diversity technology for IoT security protection, which involves the introduction of diversity technology and the role of code diversity technology for IoT security. This paper focuses on how to use diversity as a security technology to effectively protect the information security of IoT, which is of great importance to guarantee people's normal life and protect personal privacy from infringement.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yabin Li "Analysis of key technologies in IoT information security", Proc. SPIE 12720, 2022 Workshop on Electronics Communication Engineering, 127200D (28 June 2023); https://doi.org/10.1117/12.2675543
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Internet of things

Security technologies

Network security

Information technology

Computer security

Computing systems

Back to Top