Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Application of Internet of Things Technology in Computer Network Security and Remote-Control Analysis

Published: 17 April 2024 Publication History

Abstract

Internet of things computer network technology can not only speed up the information transmission, but also help to break the previous time and space restrictions and improve the actual work efficiency. However, in the practical application and development of this technology, the realization of data security technology and remote control technology is the key to improve its application effect and ensure data security. Due to the obvious openness of the internet of things computer network itself, common security risks emerge one after another. Therefore, in practical application, it is necessary to pay more attention to security management and maintain network security.

References

[1]
Aggarwal, N., Albert, L. J., Hill, T. R., & Rodan, S. A. (2020). Risk knowledge and concern as influences of purchase intention for internet of things devices. Technology in Society, 62, 101311.
[2]
Al-Sibai, H. S., Alrubaie, T., & Elmedany, W. M. (2021). IoT cybersecurity threats mitigation via integrated technical and non-technical solutions. International Journal of Electronic Security and Digital Forensics, 13(3), 298–333.
[3]
Aldaej, A. (2019). Enhancing cyber security in modern internet of things (IoT) using intrusion prevention algorithm for IoT (IPAI). IEEE Access : Practical Innovations, Open Solutions.
[4]
Alkali, Y., Routray, I., & Whig, P. (2022). Strategy for reliable, efficient and secure IoT using artificial intelligence. IUP Journal of Computer Sciences, 16(2), 16–25.
[5]
AlkaliY.RoutrayI.WhigP. (2022). Study of various methods for reliable, efficient and secured IoT using artificial intelligence. SSRN 4020364. 10.2139/ssrn.4020364
[6]
Chatfield, A. T., & Reddick, C. G. (2019). A framework for Internet of Things-enabled smart government: A case of IoT cybersecurity policies and use cases in US federal government. Government Information Quarterly, 36(2), 346–357.
[7]
Chen, L. (2021). Application of computer network communication technology in production and life. [IOP Publishing.]. Journal of Physics: Conference Series, 1744(3), 032161.
[8]
Chu, M., & Song, Y. (2021). Analysis of network security and privacy security based on AI in IOT environment. The 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE). IEEE.
[9]
Dovhan, A. D., Bernaziuk, Y. O., & Tkachuk, T. Y. (2019). Internet of things technologies in medical sector: Cyber security issues. Wiadomosci Lekarskie, 72(12, 2), 2563-2567.
[10]
He, X. (2021). RETRACTED: Analysis of network intrusion detection technology based on computer information security technology. [IOP Publishing.]. Journal of Physics: Conference Series, 1744(4), 042038.
[11]
Heriadi, H., & Pamuji, G. C. (2020). Cyber security in IoT communication (Internet of Things) on smart home. [). IOP Publishing.]. IOP Conference Series. Materials Science and Engineering, 879(1), 012043.
[12]
Isravel, D. P., Arulkumar, D., & Angelin, A. C. (2018). Cyber security threats and risk mitigation measures in internet of things. International Journal of Civil Engineering and Technology, 9(10), 1619–1628.
[13]
Javed, S. H., Ahmad, M. B., Asif, M., Almotiri, S. H., Masood, K., & Ghamdi, M. A. A. (2022). An intelligent system to detect advanced persistent threats in industrial Internet of Things (I-IoT). Electronics (Basel), 11(5), 742.
[14]
Kashiyama, M., Kashiyama, R., Seki, H., & Hosono, H. (2021). Study on cyber‐security for IoT edge utilizing pattern match accelerator. Electrical Engineering in Japan, 214(2), e23333.
[15]
Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36–49.
[16]
Li, Y. (2013). Design of a key establishment protocol for smart home energy management system. The 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks. IEEE. 10.1109/CICSYN.2013.42
[17]
Lixin, Z. (2017). Application analysis of data encryption technology in computer network communication security. Computer Knowledge and Technology: Experience Skills.
[18]
Šarac, M., Pavlović, N., Bacanin, N., Al-Turjman, F., & Adamović, S. (2021). Increasing privacy and security by integrating a blockchain secure interface into an IoT device security gateway architecture. Energy Reports, 7, 8075–8082.
[19]
Sitaraman, G. (2022). The regulation of foreign platforms. Stanford Law Review, 74, 1073.
[20]
Thota, C., Mavromoustakis, C., & Mastorakis, G. (2023). CAP2M: Contingent anonymity preserving privacy method for the Internet of Things services. Computers & Electrical Engineering, 107, 108640.
[21]
Tzafestas, S. G. (2012). Intelligent systems, control and automation: Science and engineering.
[22]
Wu, Y., Wu, Y., Guerrero, J. M., & Vasquez, J. C. (2021). A comprehensive overview of framework for developing sustainable energy internet: From things-based energy network to services-based management system. Renewable & Sustainable Energy Reviews, 150, 111409.
[23]
Yilmaz, Y., & Uludag, S. (2021). Timely detection and mitigation of IoT-based cyberattacks in the smart grid. Journal of the Franklin Institute, 358(1), 172–192.
Index terms have been assigned to the content through auto-classification.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of Web Services Research
International Journal of Web Services Research  Volume 21, Issue 1
Jul 2024
156 pages

Publisher

IGI Global

United States

Publication History

Published: 17 April 2024

Author Tags

  1. Computer
  2. Internet of Things Technology
  3. Network Security
  4. Remote Control

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media