2021
DOI: 10.1088/1742-6596/1757/1/012136
|View full text |Cite
|
Sign up to set email alerts
|

Research on Information Security Defense Based on Improved Identity-Based Dynamic Clustering Authentication Algorithm

Abstract: Big data and artificial intelligence technology, as the unified means and carrier for collecting, storing and computing core data of contemporary power IoT, has diverse and complex characteristics of its data sources and types. And the lack of insecure data access, abnormal response and terminal access rights control leads to the failure of the integrity and credibility of the closed-loop information defense. In particular, wireless sensor networks (WSNs) in power scenarios are more susceptible to malicious at… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…This paper analyzes the credit evaluation value chain of tobacco retail enterprises, as shown in Figure 1 1, the internal and external value of an enterprise can be divided into basic activities and supporting activities. The credit value created by different enterprises in different stages is different [16][17][18] . The business activities that really create favorable value are the "strategic advantages" of the enterprise.…”
Section: Design Of Credit Evaluation Methods For Tobacco Retail Enter...mentioning
confidence: 99%
“…This paper analyzes the credit evaluation value chain of tobacco retail enterprises, as shown in Figure 1 1, the internal and external value of an enterprise can be divided into basic activities and supporting activities. The credit value created by different enterprises in different stages is different [16][17][18] . The business activities that really create favorable value are the "strategic advantages" of the enterprise.…”
Section: Design Of Credit Evaluation Methods For Tobacco Retail Enter...mentioning
confidence: 99%
“…Similarly, the data being transmitted in the network would be safely managed for ensuring that it won't be compromised in the network processes. Guo et al [22] proposed a power IOT information defence approach depending upon enhanced IIDC. Initially, the terminal devices set the private key for resolving the key problems of terminal security authentication in the IOT module.…”
Section: Existing Security Based Solutions In Wsnmentioning
confidence: 99%