Method for performing network security protection on Internet of things system

An Internet of Things system and network security technology, applied in the field of network security protection for the Internet of Things system, can solve problems such as difficulty in creating and maintaining a security model, difficulty in system security integration, and reduced security

Active Publication Date: 2018-09-25
ZHEJIANG YUANWANG INFORMATION CO LTD
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. The protocols, standards and concepts used are not specially designed for the Internet of Things, and there is no unified security architecture, which is inherently insufficient in security;
[0004] 2. With the increasing number of physical devices involving different original manufacturers, there are natural contradictions between system security, flexibility, and integrability, and system security integration is becoming more and more difficult;
[0005] 3. Sensors and their application systems are becoming more and more complex, and the increasing complexity may lead to more system vulnerabilities and lower security;
[0006] 4. It is difficult to clearly define and agree on the security responsibilities of the government, administrators, and system suppliers
[0007] Therefore, in addition to the traditional security threats of the Internet system, the current IoT system is becoming more and more difficult to create and maintain a security model that can respond to dynamic changes systematically, reliably, and at low cost.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for performing network security protection on Internet of things system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. However, it should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0034] refer to figure 1 , the embodiment of the present invention provides a method for network security protection of the Internet of Things system, the method is based on a closed-loop communication security protection system composed of a security module 2, an Internet of Things system operation and maintenance safety supervision platform 3 and an information transmission network therebetw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for performing network security protection on an Internet of things system. The method is characterized in that a security module is connected in series to each Internet of things terminal at a front end of the Internet of things system; an Internet of things system operation and maintenance security supervision platform is connected in series to an Internet of things system server; the security modules perform network communication with the Internet of things system operation and maintenance security supervision platform through information transmission; communication between the Internet of things terminals and the Internet of things system server needs to be performed through the security modules and the Internet of things system operation and maintenance security supervision platform; and communication among the Internet of things terminals needs to be performed through the security modules. The method consists of server-to-end communication security protection, end-to-server communication security protection and end-to-end communication security protection. On the basis of a closed-loop communication security protection system built with the security modules, the Internet of things system operation and maintenance security supervision platform and an information transmission network therebetween, the continuous evolution of the Internet ofthings protection capability and continuous improvement of the security level are ensured.

Description

【Technical field】 [0001] The invention relates to the technical field of the Internet of Things, in particular to a method for network security protection of an Internet of Things system. 【Background technique】 [0002] The Internet of Things is developed on the basis of the Internet, which bundles physical devices with existing IT and back-end platforms and applications, and integrates different applications and systems. Due to the complexity of the IoT system, various types of devices, and extensive exposure, the difficulty of protection makes IoT devices extremely fragile, and it is easy for attackers to find and exploit vulnerabilities, making the security requirements of IoT devices increasingly prominent. The developing Internet of Things currently has the following security problems: [0003] 1. The protocols, standards and concepts used are not specially designed for the Internet of Things, and there is no unified security architecture, which is inherently insuffici...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0209H04L63/0263H04L63/1466H04L67/12
Inventor 傅如毅邵森龙安革生
Owner ZHEJIANG YUANWANG INFORMATION CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products