pisco_log
banner

Data Security and Privacy Protection Strategies in Iot Engineering

Jiawen Liu

Abstract


The Internet of Things, as an outstanding representative of the new generation of information technology, is profoundly changing
the way of life and production mode with its unique charm and infinite potential. It forms a huge network through intelligent sensing, recognition technology and universal computing and other communication sensing technology, which combines various information sensing devices
with the Internet. In this network, each device is a data node, and they constantly produce, transmit and process data, bringing great convenience to life and work. This paper will start from the reality of the Internet of Things engineering, elaborate on the importance of data security
and privacy protection, and put forward a series of comprehensive and detailed strategy system.

Keywords


Internet of Things engineering; Data security; Privacy protection; Strategy

Full Text:

PDF

Included Database


References


[1] Zhang Chi. Research on data encryption technology in computer network information security [J]. Chinese Science and Technology

Journal Database (citation edition) Engineering Technology, 2022 (11): 4.

[2] Shi Xinyao, Wang Jingyu, Liu Lixin. A distributed privacy protection data aggregation scheme in the Internet of Things environment [J].

Small Microcomputer system, 2024, 45 (8): 2026-2033.

[3] Baisong, Wang Xiaoyong, Hu Shengli. Medical Internet of Things Data Security Management System based on blockchain and agent

reencryption [J]. Journal of China University of Metrology, 2024, 35 (1): 80-88.

[4] Huang Zhiqing, Xie Luyang, Zhang Yanxin, et al. Blockchain-based reputation evaluation model of Internet of Things data services [J].

Computer Engineering, 2022, 48 (1): 33-42.




DOI: http://dx.doi.org/10.70711/aitr.v2i5.5290

Refbacks

  • There are currently no refbacks.