Application of Internet of Things Technology in Computer Network Security and Remote-Control Analysis
Pages 1 - 18
Abstract
Internet of things computer network technology can not only speed up the information transmission, but also help to break the previous time and space restrictions and improve the actual work efficiency. However, in the practical application and development of this technology, the realization of data security technology and remote control technology is the key to improve its application effect and ensure data security. Due to the obvious openness of the internet of things computer network itself, common security risks emerge one after another. Therefore, in practical application, it is necessary to pay more attention to security management and maintain network security.
References
[1]
Aggarwal, N., Albert, L. J., Hill, T. R., & Rodan, S. A. (2020). Risk knowledge and concern as influences of purchase intention for internet of things devices. Technology in Society, 62, 101311.
[2]
Al-Sibai, H. S., Alrubaie, T., & Elmedany, W. M. (2021). IoT cybersecurity threats mitigation via integrated technical and non-technical solutions. International Journal of Electronic Security and Digital Forensics, 13(3), 298–333.
[3]
Aldaej, A. (2019). Enhancing cyber security in modern internet of things (IoT) using intrusion prevention algorithm for IoT (IPAI). IEEE Access : Practical Innovations, Open Solutions.
[4]
Alkali, Y., Routray, I., & Whig, P. (2022). Strategy for reliable, efficient and secure IoT using artificial intelligence. IUP Journal of Computer Sciences, 16(2), 16–25.
[5]
AlkaliY.RoutrayI.WhigP. (2022). Study of various methods for reliable, efficient and secured IoT using artificial intelligence. SSRN 4020364. 10.2139/ssrn.4020364
[6]
Chatfield, A. T., & Reddick, C. G. (2019). A framework for Internet of Things-enabled smart government: A case of IoT cybersecurity policies and use cases in US federal government. Government Information Quarterly, 36(2), 346–357.
[7]
Chen, L. (2021). Application of computer network communication technology in production and life. [IOP Publishing.]. Journal of Physics: Conference Series, 1744(3), 032161.
[8]
Chu, M., & Song, Y. (2021). Analysis of network security and privacy security based on AI in IOT environment. The 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE). IEEE.
[9]
Dovhan, A. D., Bernaziuk, Y. O., & Tkachuk, T. Y. (2019). Internet of things technologies in medical sector: Cyber security issues. Wiadomosci Lekarskie, 72(12, 2), 2563-2567.
[10]
He, X. (2021). RETRACTED: Analysis of network intrusion detection technology based on computer information security technology. [IOP Publishing.]. Journal of Physics: Conference Series, 1744(4), 042038.
[11]
Heriadi, H., & Pamuji, G. C. (2020). Cyber security in IoT communication (Internet of Things) on smart home. [). IOP Publishing.]. IOP Conference Series. Materials Science and Engineering, 879(1), 012043.
[12]
Isravel, D. P., Arulkumar, D., & Angelin, A. C. (2018). Cyber security threats and risk mitigation measures in internet of things. International Journal of Civil Engineering and Technology, 9(10), 1619–1628.
[13]
Javed, S. H., Ahmad, M. B., Asif, M., Almotiri, S. H., Masood, K., & Ghamdi, M. A. A. (2022). An intelligent system to detect advanced persistent threats in industrial Internet of Things (I-IoT). Electronics (Basel), 11(5), 742.
[14]
Kashiyama, M., Kashiyama, R., Seki, H., & Hosono, H. (2021). Study on cyber‐security for IoT edge utilizing pattern match accelerator. Electrical Engineering in Japan, 214(2), e23333.
[15]
Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36–49.
[16]
Li, Y. (2013). Design of a key establishment protocol for smart home energy management system. The 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks. IEEE. 10.1109/CICSYN.2013.42
[17]
Lixin, Z. (2017). Application analysis of data encryption technology in computer network communication security. Computer Knowledge and Technology: Experience Skills.
[18]
Šarac, M., Pavlović, N., Bacanin, N., Al-Turjman, F., & Adamović, S. (2021). Increasing privacy and security by integrating a blockchain secure interface into an IoT device security gateway architecture. Energy Reports, 7, 8075–8082.
[19]
Sitaraman, G. (2022). The regulation of foreign platforms. Stanford Law Review, 74, 1073.
[20]
Thota, C., Mavromoustakis, C., & Mastorakis, G. (2023). CAP2M: Contingent anonymity preserving privacy method for the Internet of Things services. Computers & Electrical Engineering, 107, 108640.
[21]
Tzafestas, S. G. (2012). Intelligent systems, control and automation: Science and engineering.
[22]
Wu, Y., Wu, Y., Guerrero, J. M., & Vasquez, J. C. (2021). A comprehensive overview of framework for developing sustainable energy internet: From things-based energy network to services-based management system. Renewable & Sustainable Energy Reviews, 150, 111409.
[23]
Yilmaz, Y., & Uludag, S. (2021). Timely detection and mitigation of IoT-based cyberattacks in the smart grid. Journal of the Franklin Institute, 358(1), 172–192.
Index terms have been assigned to the content through auto-classification.
Recommendations
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Copyright © 2024.
Publisher
IGI Global
United States
Publication History
Published: 17 April 2024
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025