Welcome to Francis Academic Press

International Journal of Frontiers in Sociology, 2021, 3(8); doi: 10.25236/IJFS.2021.030802.

Network Security and Privacy Security in the IoT Environment

Author(s)

Haijun Xu

Corresponding Author:
Haijun Xu
Affiliation(s)

Shenzhen Zheyang Technology co., LTD, Shenzhen, 518000, Guangdong, China

Abstract

The Internet of things is the second major revolution based on the Internet. It realizes the purpose of connecting things and promotes the development of economy and society. In order to ensure the security of the Internet of things environment, network security and privacy security become the primary problem to be solved. Based on the above background, the purpose of this paper is to study the analysis of network security and privacy security in the Internet of things environment. In order to describe the implicit information among the situation elements in the index system intuitively, this paper proposes a network security and privacy security situation assessment method based on PSO-MCELman, and a network security and privacy security situation prediction method based on PSO-MCELman according to the timing characteristics of situation prediction data. When each method completes the situation prediction training, the PSO-MCELman neural network proposed in this paper The least number of network iterations is 23, which is 22, 14 and 5 times less than traditional Elman, GA-Elman and PSO-Elman neural networks. Through the prediction of network security and privacy security situation, users can be more aware of the importance of Internet of things security and privacy security, and hope to provide some help for the solution of Internet of things security and user privacy security.

Keywords

IoT Security, Privacy Protection, Convolutional Neural Network, Elman Neural Network

Cite This Paper

Haijun Xu. Network Security and Privacy Security in the IoT Environment. International Journal of Frontiers in Sociology (2021), Vol. 3, Issue 8: 5-16. https://doi.org/10.25236/IJFS.2021.030802.

References

[1] Christian Esposito, Alfredo De Santis, Genny Tortora. Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?[J]. IEEE Cloud Computing, 2018, 5(1):31-37.

[2] Anne H. Ngu, Mario Gutierrez, Vangelis Metsis. IoT Middleware: A Survey on Issues and Enabling Technologies[J]. IEEE Internet of Things Journal, 2017, 4(1):1-20.

[3] Elisa Bertino, Kim-Kwang Raymond Choo, Dimitrios Georgakopolous. Internet of Things (IoT): Smart and Secure Service Delivery[J]. Acm Transactions on Internet Technology, 2016, 16(4):1-7.

[4] Rachad Atat, Lingjia Liu, Jonathan Ashdown. A Physical Layer Security Scheme for Mobile Health Cyber-Physical Systems[J]. IEEE Internet of Things Journal, 2017, 5(1):295-309.

[5] Tan Soo Fun, Azman Samsudin. Attribute Based Encryption—A Data Centric Approach for Securing Internet of Things (IoT)[J]. Advanced Science Letters, 2017, 23(5):4219-4223.

[6] Mohammed Moness, Ahmed Mahmoud Moustafa. A Survey of Cyber-Physical Advances and Challenges of Wind Energy Conversion Systems: Prospects for Internet of Energy[J]. IEEE Internet of Things Journal, 2015, 3(2):134-145.

[7] Barbara L Filkins, Ju Young Kim, Bruce Roberts. Privacy and security in the era of digital health: What should translational researchers know and do about it?[J]. American Journal of Translational Research, 2016, 8(3):1560-1580.

[8] Xabier Larrucea, Annie Combelles, John Favaro. Software Engineering for the Internet of Things[J]. IEEE Software, 2017, 34(1):24-28.

[9] S.McKenna, D. Staheli, C. Fulcher. BubbleNet: A Cyber Security Dashboard for Visualizing Patterns[J]. Computer Graphics Forum, 2016, 35(3):281-290.

[10] Carlos Lopez, Arman Sargolzaei, Hugo Santana. Smart Grid Cyber Security: An Overview of Threats and Countermeasures[J]. Journal of Power & Energy Engineering, 2015, 9(7):632-647.

[11] Chao Lin, Debiao He, Neeraj Kumar. Security and Privacy for the Internet of Drones: Challenges and Solutions[J]. IEEE Communications Magazine, 2018, 56(1):64-69.

[12] Guobin Xu, Wei Yu, Zhijiang Chen. A cloud computing based system for cyber security management[J]. Parallel Algorithms & Applications, 2015, 30(1):29-45.

[13] Nir Kshetri. India's Cybersecurity Landscape: The Roles of the Private Sector and Public-Private Partnership[J]. IEEE Security & Privacy Magazine, 2015, 13(3):16-23.

[14] Orlando Arias, Jacob Wurm, Khoa Hoang. Privacy and Security in Internet of Things and Wearable Devices[J]. IEEE Transactions on Multi-Scale Computing Systems, 2017, 1(2):99-109.

[15] Anil Gurung, M.K. Raja. Online privacy and security concerns of consumers[J]. Information & Computer Security, 2016, 24(4):348-371.

[16] Leah Zhang-Kennedy, Sonia Chiasson, Robert Biddle. The Role of Instructional Design in Persuasion: A Comics Approach for Improving Cyber Security[J]. International Journal of Human–computer Interaction, 2016, 32(3):215-257.

[17] Nir Kshetri. India's Cybersecurity Landscape: The Roles of the Private Sector and Public-Private Partnership[J]. IEEE Security & Privacy Magazine, 2015, 13(3):16-23.

[18] Anand Shah, Shishir Dahake, Sri Hari Haran J. Valuing data security and privacy using cyber insurance[J]. ACM SIGCAS Computers and Society, 2015, 45(1):38-41.

[19] Rolf H. Weber, Evelyne Studer. Cybersecurity in the Internet of Things: Legal aspects[J]. Computer Law & Security Review the International Journal of Technology Law & Practice, 2016, 32(5):715-728.

[20] Luanne Billingsley, Shawn A. McKee. Cybersecurity in the Clinical Setting: Nurses' Role in the Expanding “Internet of Things”[J]. Journal of Continuing Education in Nursing, 2016, 47(8):347-349.