Security Control Technology and Simulation of Network News Communication under the Environment of Internet of Things
Internet of Things is an application of network news communication technology. Based on the Internet, it uses physical access technologies such as radio frequency tag and wireless sensor network news communication and network news communication information transmission technology to build a network...
Gespeichert in:
Veröffentlicht in: | Wireless communications and mobile computing 2021, Vol.2021 (1) |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Internet of Things is an application of network news communication technology. Based on the Internet, it uses physical access technologies such as radio frequency tag and wireless sensor network news communication and network news communication information transmission technology to build a network news communication information system that can cover people and things. In the physical layer, the relative position of the object is calculated by using multipoint cooperative localization, so as to determine the minimum anonymous region. Generate and maintain the anonymous tree topology on the network news dissemination layer, and provide storage management support for multiple anonymous groups. In the application layer, the object determines the corresponding anonymity degree according to the identity and uses the frame structure to construct and return the new anonymous group consistent with the existing anonymous group, which can prevent the persistent multiprecision query attack. A real-time control method for intrusion response of a security control system is designed, which includes two stages: response task generation and integrated scheduling. An intrusion response task set generation method based on an improved nondominated sorting genetic algorithm is presented, and a distributed integrated task scheduling and optimization algorithm based on a genetic algorithm and a directed acyclic graph is designed. The numerical simulation results show that this method can quickly and smoothly implement the response strategy of information security intrusion without affecting the normal execution of system tasks. |
---|---|
ISSN: | 1530-8669 1530-8677 |
DOI: | 10.1155/2021/2730916 |