Security Control Technology and Simulation of Network News Communication under the Environment of Internet of Things

Internet of Things is an application of network news communication technology. Based on the Internet, it uses physical access technologies such as radio frequency tag and wireless sensor network news communication and network news communication information transmission technology to build a network...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless communications and mobile computing 2021, Vol.2021 (1)
Hauptverfasser: Zhou, Xudong, Wang, Jing, Zhou, Xiao
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Internet of Things is an application of network news communication technology. Based on the Internet, it uses physical access technologies such as radio frequency tag and wireless sensor network news communication and network news communication information transmission technology to build a network news communication information system that can cover people and things. In the physical layer, the relative position of the object is calculated by using multipoint cooperative localization, so as to determine the minimum anonymous region. Generate and maintain the anonymous tree topology on the network news dissemination layer, and provide storage management support for multiple anonymous groups. In the application layer, the object determines the corresponding anonymity degree according to the identity and uses the frame structure to construct and return the new anonymous group consistent with the existing anonymous group, which can prevent the persistent multiprecision query attack. A real-time control method for intrusion response of a security control system is designed, which includes two stages: response task generation and integrated scheduling. An intrusion response task set generation method based on an improved nondominated sorting genetic algorithm is presented, and a distributed integrated task scheduling and optimization algorithm based on a genetic algorithm and a directed acyclic graph is designed. The numerical simulation results show that this method can quickly and smoothly implement the response strategy of information security intrusion without affecting the normal execution of system tasks.
ISSN:1530-8669
1530-8677
DOI:10.1155/2021/2730916